NIST logo

Publications Portal

You searched on:
Topic Area: Cybersecurity
Sorted by: title

Displaying records 121 to 130 of 240 records.
Resort by: Date / Title


121. Logic Minimization Techniques with Applications to Cryptology
Topic: Cybersecurity
Published: 4/1/2013
Authors: Joan Boyar, Philip Matthews, Rene C Peralta
Abstract: A new technique for combinational logic optimization is described. The technique is a two-step process. In the rst step, the non-linearity of a circuit { as measured by the number of non-linear gates it contains { is reduced. The second step reduc ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=908384

122. Maintaining and Using Key History on Personal Identity Verification (PIV) Cards
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7676
Topic: Cybersecurity
Published: 6/18/2010
Author: David A Cooper
Abstract: NIST Special Publication 800-73-3 introduces the ability to store retired Key Management Keys within the Personal Identity Verification (PIV) Card Application on a PIV Card. This paper complements SP 800-73-3 by providing some of the rationale for t ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=905913

123. Managing Identity Requirements for Remote Users of Information Systems to Protect System Security and Information Privacy
Series: ITL Bulletin
Topic: Cybersecurity
Published: 1/29/2013
Author: Shirley M. Radack
Abstract: This bulletin summarizes the information presented in NISTIR 7817, A Credential Reliability and Revocation Model for Federated Identities, written by Hildegard Ferraiolo. The publication analyzes the different types of digital credentials used in aut ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=913241

124. Managing Information Security Risk: Organization, Mission, and Information System View
Series: ITL Bulletin
Topic: Cybersecurity
Published: 3/22/2011
Author: Shirley M. Radack
Abstract: This bulletin summarizes the information presented in NIST Special Publication (SP) 800-39, Integrated Enterprise-Wide Risk Management: Organization, Mission and Information System View. This publication was developed by the Joint Task Force Transf ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=908207

125. Managing Risk from Information Systems - Second Public Draft
Series: Special Publication (NIST SP)
Report Number: 800-39
Topic: Cybersecurity
Published: 4/9/2008
Authors: Ronald S Ross, Stuart William Katzke, Marianne M. Swanson, L A. Johnson, G Stoneburner
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=906396

126. Managing Security: The Security Content Automation Protocol
Topic: Cybersecurity
Published: 2/4/2011
Authors: Shirley M. Radack, David R Kuhn
Abstract: Managing information systems security is an expensive and challenging task. Many different and complex software components- including firmware, operating systems, and applications-must be configured securely, patched when needed, and continuously mon ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=907372

127. Managing the Configuration of Information Systems with a Focus on Security
Series: ITL Bulletin
Topic: Cybersecurity
Published: 9/26/2011
Author: Shirley M. Radack
Abstract: This bulletin summarizes the information presented in NIST Special Publication (SP) 800-128, Guide to Security-Focused Configuration Management of Information Systems. The publication was written by Arnold Johnson, Kelley Dempsey, and Ron Ross of NI ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=909644

128. Metastability of Fair Bandwidth Sharing Under Fluctuating Demand and Necessity of Flow Admission control
Topic: Cybersecurity
Published: 9/17/2007
Author: Vladimir V Marbukh
Abstract: A flow-level Markov model for fair bandwidth sharing with packet retransmissions under random flow arrivals/departures is proposed and discussed. Fluctuations in the numbers of flows in progress cause the network instability even under light load. Th ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=51233

129. Mobile Application Device Power Usage Measurements
Topic: Cybersecurity
Published: 7/31/2012
Authors: Rahul Murmuria, Jeffrey Medsger, Angelos Stavrou, Jeffrey Mark Voas
Abstract: Reducing power consumption has become a crucial design tenet for both mobile and other small computing devices that are not constantly connected to a power source. However, unlike devices that have a limited and predefined set of functionality, recen ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911099

130. Mobile-App Addiction: Threat to Security?
Topic: Cybersecurity
Published: 11/1/2011
Authors: George Hurlburt, Jeffrey Mark Voas, Keith Miller
Abstract: Giving individuals this kind of information processing power, along with unprecedented connectivity, might be the single most impressive technical achievement of the 21st century. Nobody knows what the full impact of this transformation will be, but ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=907101



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series