NIST logo

Publications Portal

You searched on:
Topic Area: Cybersecurity
Sorted by: title

Displaying records 11 to 20 of 221 records.
Resort by: Date / Title


11. A depth-16 circuit for the AES S-box
Topic: Cybersecurity
Published: 12/1/2011
Authors: Joan Boyar, Rene C Peralta
Abstract: New techniques for reducing the depth of circuits for cryptographic applications are described and applied to the AES S-box. These techniques also keep the number of gates quite small. The result, when applied to the AES S-box, is a circuit with de ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=908382

12. Access Control Policy Combinations for the Grid Using the Policy Machine
Topic: Cybersecurity
Published: 5/14/2007
Authors: Chung Tong Hu, David F Ferraiolo, Karen Ann Scarfone
Abstract: Many researchers have tackled the architecture and requirements aspects of grid security, concentrating on the authentication or authorization mediation instead of authorization techniques, especially the topic of policy combination. Policy combinati ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=50948

13. Adaptive Preimage Resistance Analysis Revisited: Requirements, Subtleties and Implications
Topic: Cybersecurity
Published: 4/16/2012
Authors: Dong H. Chang, Moti Yung
Abstract: In the last few years, the need to design new cryptographic hash functions has led to the intense study of when desired hash multi-properties are preserved or assured under compositions and domain extensions. In this area, it is important to identify ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=906235

14. Advancing Security Automation and Standardization: Revised Technical Specifications Issued for the Security Content Automation Protocol (SCAP)
Series: ITL Bulletin
Topic: Cybersecurity
Published: 1/24/2012
Author: Shirley M. Radack
Abstract: This bulletin summarizes the information presented in NIST Special Publication (SP) 800-126 Rev. 2, The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.2. This publication was written by David Waltermire an ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=910245

15. Aggregating CVSS Base Scores for Semantics-Rich Network Security Metrics
Topic: Cybersecurity
Published: 10/11/2012
Authors: Pengsu Cheng, Lingyu Wang, Sushil Jajodia, Anoop Singhal
Abstract: A network security metric is desirable in evaluating the effectiveness of security solutions in distributed systems. Aggregating CVSS scores of individual vulnerabilities provides a practical approach to network security metric. However, existing app ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911327

16. An Attack Graph Based Probabilistic Security Metric
Topic: Cybersecurity
Published: 7/21/2008
Authors: Lingyu Wang, Anoop Singhal
Abstract: In today's networked environments, protecting critical resources usually requires us to understand and measure the likelihood of multi-step attacks that combine different vulnerabilities for reaching the attack goal.  Such a measurement is n ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=152107

17. An Efficient Approach to Assessing the Risk of Zero-Day Vulnerabilities
Topic: Cybersecurity
Published: 7/30/2013
Authors: Anoop Singhal, M. Albanese, Sushil Jajodia, Lingyu Wang
Abstract: Computer systems are vulnerable to both known and zero-day attacks. Although known attack patterns can be easily modeled, thus enabling the development of suitable hardening strategies, handling zero-day vulnerabilities is inherently difficult due to ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=913051

18. An IEEE 1588 Performance Testing Dashboard for Power Industry Requirements
Topic: Cybersecurity
Published: 9/12/2011
Authors: Julien Marc Amelot, YaShian Li-Baboud, Clement Vasseur, Jeffrey Fletcher, Dhananjay Anand, James Moyne
Abstract: The numerous time synchronization performance requirements in the Smart Grid entails the need for a set of common metrics and test methods to verify the ability of the network system and its components to meet the power industry‰s accuracy, reliabili ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=909255

19. An Inconvenient Truth About Tunneled Authentications
Topic: Cybersecurity
Published: 10/10/2010
Authors: Katrin Hoeper, Lidong Chen
Abstract: In recent years, it has been a common practice to execute client authentications for network access inside a protective tunnel. Man-in-the-middle (MitM) attacks on such tunneled authentications have been discovered early on and cryptographic bindings ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=906200

20. An Overview and Analysis of PDA Forensic Tools
Topic: Cybersecurity
Published: 4/2/2005
Authors: Wayne Jansen, Richard P Ayers
Abstract: Mobile handheld devices are becoming evermore affordable and commonplace in society. When they are involved in a security incident or crime, forensic specialists require tools that allow proper extraction and speedy examination of any digital evidenc ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=150216



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series