NIST logo

Publications Portal

You searched on:
Topic Area: Cybersecurity
Sorted by: title

Displaying records 121 to 130 of 210 records.
Resort by: Date / Title


121. NIST to Develop a Cybersecurity Framework to Protect Critical Infrastructure
Series: ITL Bulletin
Topic: Cybersecurity
Published: 3/21/2013
Author: Elizabeth B Lennon
Abstract: This ITL Bulletin describes the Cybersecurity Framework that NIST is developing to reduce cyber risks to our nation's critical infrastructure and announces the first Cybersecurity Framework Workshop.
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=913588

122. National Checklist Program for IT Products Guidelines for Checklist Users and Developers
Series: Special Publication (NIST SP)
Report Number: 800-70R1
Topic: Cybersecurity
Published: 9/30/2009
Authors: Stephen D Quinn, Karen Ann Scarfone, Murugiah P Souppaya
Abstract: A security configuration checklist is a series of instructions for configuring a product to a particular operational environment. Checklists can comprise templates or automated scripts, patches or patch descriptions, XML files, and other procedures. ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=901337

123. National Checklist Program for IT Products Guidelines for Checklist Users and Developers
Series: Special Publication (NIST SP)
Report Number: 800-70rev2
Topic: Cybersecurity
Published: 2/25/2011
Authors: Stephen D Quinn, Karen Scarfone, Melanie Cook, Murugiah P Souppaya
Abstract: Special Publication 800-70 Revision 2 - National Checklist Program for IT Products Guidelines for Checklist Users and Developers describes security configuration checklists and their benefits, and it explains how to use the NIST National Checklist Pr ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=907732

124. New Cryptographic Hash Algorithm Family: NIST Holds a Public Competition to Find New Algorithms
Series: ITL Bulletin
Topic: Cybersecurity
Published: 5/28/2008
Author: Shirley M. Radack
Abstract: This bulletin summarizes the information that was disseminated by the National Institute of Standards and Technology (NIST) in a November 2007 Federal Register Notice. NIST is soliciting candidates for a new and robust cryptographic hash algorithm f ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=152172

125. O2 A-band line parameters to support atmospheric remote sensing. Part II: The rare isotopologues
Topic: Cybersecurity
Published: 7/21/2011
Authors: Joseph Terence Hodges, David A Long, Daniel K Havey, S. S. Yu, M Okumura, Charles E Miller
Abstract: Frequency-stabilized cavity ring-down spectroscopy (FS-CRDS) was employed to measure over 100 transitions in the R-branch of the b1Σg+←X3Σg-(0,0) band for the rare O2 isotopologues. The use of 17O- and 18O-enriched mixtures allowed fo ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=907932

126. Of Passwords and People: Measuring the Effect of Password-Composition Policies
Topic: Cybersecurity
Published: 5/11/2011
Authors: Serge M. (Serge) Egelman, Saranga Komanduri, Richard Shay, Patrick Gage Kelley, Michelle L. Mazurek, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor
Abstract: Text-based passwords are the most common mechanism for authenticating humans to computer systems. To prevent users from picking passwords that are too easy for an adversary to guess, system administrators adopt password-composition policies (e.g., ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=907615

127. On Hash Functions Using Checksums
Topic: Cybersecurity
Published: 4/1/2010
Authors: Praveen Gauruvarum, John M Kelsey, L. Knudsen, S. Thomsen
Abstract: We analyse the security of iterated hash functions that compute an input dependent checksum which is processed as part of the hash computation. We show that a large class of such schemes, including those using non-linear or even one- way checksum fun ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=902682

128. On the Security of Hash Functions Employing Blockcipher Postprocessing
Topic: Cybersecurity
Published: 7/14/2011
Authors: Dong H. Chang, Mridul Nandi, Moti Yung
Abstract: Analyzing desired generic properties of hash functions is an important current area in cryptography. For example, in Eurocrypt 2009, Dodis, Ristenpart and Shrimpton [7] introduced the elegant notion of ,Preimage AwarenessŠ (PrA) of a hash function ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=907643

129. Personal Identity Verification (PIV) of Federal Employees and Contractors
Series: Federal Inf. Process. Stds. (NIST FIPS)
Report Number: 201-1
Topic: Cybersecurity
Published: 6/26/2006
Authors: William I. (William I) MacGregor, Ketan Mehta
Abstract: [Includes Change Notice 1 of June 23, 2006] This document was developed to satisfy the requirements of HSPD-12, approved by the Secretary of Commerce, and issued on March 2006. This change notice provides changes to the graphics on the back of the PI ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=50836

130. Personal Identity Verification of Federal Employees and Contractors
Series: Federal Inf. Process. Stds. (NIST FIPS)
Report Number: 201
Topic: Cybersecurity
Published: 2/1/2005
Authors: William C Barker, James F Dray Jr, Ramaswamy Chandramouli, Teresa Schwarzhoff, William T Polk, Donna F Dodson, Ketan L Mehta, S Gupta, William Edward Burr, Timothy Grance
Abstract: FIPS 201 specifies the technical and operational requirements for interoperable PIV systems that issue smart cards as identification credentials and that use the cards to authenticate an individual's identity. FIPS 201 has been issued in two pa ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=150207



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series