NIST logo

Publications Portal

You searched on:
Topic Area: Cybersecurity
Sorted by: date

Displaying records 161 to 170 of 228 records.
Resort by: Date / Title


161. Recommendation for Digital Signature Timeliness
Series: Special Publication (NIST SP)
Report Number: 800-102
Topic: Cybersecurity
Published: 9/23/2009
Author: Elaine B Barker
Abstract: Establishing the time when a digital signature was generated is often a critical consideration. A signed message that includes the (purported) signing time provides no assurance that the private key was used to sign the message at that time unless th ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=901593

162. Recommendation for Pair-Wise Key Establishment Schemes Using Integer Factorization Cryptography
Series: Special Publication (NIST SP)
Report Number: 800-56B
Topic: Cybersecurity
Published: 8/28/2009
Authors: Elaine B Barker, Lidong Chen, Andrew Richard Regenscheid, Miles E. Smid
Abstract: [Superseded by SP 800-56B Rev. 1 (September 2014): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=916341] This recommendation specifies key establishment schemes using integer factorization cryptography, based on ANS X9 44, Key Establis ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=903082

163. Recommended Security Controls for Federal Information Systems and Organizations
Series: Special Publication (NIST SP)
Report Number: 800-53 Rev 3
Topic: Cybersecurity
Published: 8/3/2009
Author: Ronald S Ross
Abstract: **Includes updates through 5/1/2010. [Superseded by NIST SP 800-53, Rev. 4 (April 2013): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=913693] The objective of NIST SP 800-53 is to provide a set of security controls that can satisfy th ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=903280

164. Fast and Secure CBC Type MAC Algorithms
Topic: Cybersecurity
Published: 7/21/2009
Author: Mridul Nandi
Abstract: The CBC-MAC, or cipher block chaining message authentication code, is a well-known method to generate message authentication codes. Unfortunately, it is not forgery-secure over an arbitrary domain. There are several secure variants of CBC-MAC, among ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=901030

165. Digital Signature Standard (DSS)
Series: Federal Inf. Process. Stds. (NIST FIPS)
Report Number: 186-3
Topic: Cybersecurity
Published: 6/25/2009
Author: Elaine B Barker
Abstract: [Superseded by FIPS 186-4(July 2013): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=914162] The Standard specifies a suite of algorithms that can be used to generate a digital signature. Digital signatures are used to detect unauthori ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=902984

166. Static Analysis Tool Exposition (SATE) 2008
Series: Special Publication (NIST SP)
Report Number: 500-279
Topic: Cybersecurity
Published: 6/22/2009
Authors: Vadim Okun, Romain Gaucher, Paul E Black
Abstract: The NIST SAMATE project conducted the first Static Analysis Tool Exposition (SATE) in 2008 to advance research in static analysis tools that find security defects in source code. The main goals of SATE were to enable empirical research based on large ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=902679

167. Guide to Enterprise Telework and Remote Access Security
Series: Special Publication (NIST SP)
Report Number: 800-46 Rev 1
Topic: Cybersecurity
Published: 6/16/2009
Authors: Karen Ann Scarfone, Paul Hoffman, Murugiah P Souppaya
Abstract: Many organizations employees and contractors use enterprise telework technologies to perform work from external locations. Most teleworkers use remote access technologies to interface with an organization s non-public computing resources. The nature ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=902685

168. Surviving Insecure IT: Effective Patch Management
Topic: Cybersecurity
Published: 3/21/2009
Authors: Simon Liu, David R Kuhn, Hart Rossman
Abstract: The amount of time to protect enterprise systems against potential vulnerability continues to shrink. Enterprises need an effective patch management mechanism to survive the insecure IT environment. Effective patch management is a systematic and repe ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=901613

169. Randomized Hashing for Digital Signatures
Series: Special Publication (NIST SP)
Report Number: 800-106
Topic: Cybersecurity
Published: 2/25/2009
Author: Quynh H Dang
Abstract: NIST-approved digital signature algorithms require the use of an approved cryptographic hash function in the generation and verification of signatures. Approved cryptographic hash functions and digital signature algorithms can be found in FIPS 180-3, ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=901182

170. Property Verification for Generic Access Control Models
Topic: Cybersecurity
Published: 12/20/2008
Authors: Chung Tong Hu, David R Kuhn, Tao Xie
Abstract: To formally and precisely capture the security properties that access control should adhere to, access control models are usually written to bridge the rather wide gap in abstraction between policies and mechanisms. In this paper, we propose a new ge ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=51328



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series