NIST logo

Publications Portal

You searched on:
Topic Area: Information Technology

Displaying records 91 to 100 of 992 records.
Resort by: Date / Title

91. Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography
Series: Special Publication (NIST SP)
Report Number: 800-56A Rev 2
Topic: Information Technology
Published: 6/5/2013
Authors: Elaine B Barker, Lidong Chen, Allen L Roginsky, Miles Smid
Abstract: This Recommendation specifies key-establishment schemes based on the discrete logarithm problem over finite fields and elliptic curves, including several variations of Diffie-Hellman and Menezes-Qu- Vanstone(MQV) key establishment schemes. [Supers ...

92. Modeling a Nationwide Public Safety Broadband Network
Topic: Information Technology
Published: 6/1/2013
Authors: Richard Antoine Rouil, Antonio Izquierdo Manzanares, Michael R Souryal, Camillo A Gentile, David Wesley Griffith, Nada T Golmie
Abstract: As governments plan nationwide, interoperable broadband networks for their public safety services, the challenge arises of determining how and where to invest limited resources to meet demanding requirements. The United States is at the early st ...

93. Perron-Frobenius Measure of Systemic Risk of Cascading Overload in Complex Clouds: Work in Progress
Topic: Information Technology
Published: 5/27/2013
Author: Vladimir V Marbukh
Abstract: Dynamic resource sharing has both positive and negative effects on the system performance. Current research mostly concentrates on the positive effect resulting from the statistical multiplexing gain. However, the negative effect resulting from ...

94. A case study of performance degradation attributable to run-time bounds checks on C++ vector access
Series: Journal of Research (NIST JRES)
Report Number: 118.012
Topic: Information Technology
Published: 5/22/2013
Authors: David W Flater, William F Guthrie
Abstract: Programmers routinely omit run-time safety checks from applications because they assume that these safety checks would degrade performance. The simplest example is the use of arrays or array-like data structures that do not enforce the constrain ...

95. The Economic Benefits from Improved Cyber Security Infrastructure
Topic: Information Technology
Published: 5/22/2013
Author: Gregory C. Tassey
Abstract: Leading government officials have warned that a "cyber 9/11" could happen at any time. A coordinated terrorist cyber attack on a massive scale could potentially shut down the domestic economy. Even without such a pervasive assault, banks, utilities ...

96. Guide to Industrial Control Systems (ICS) Security
Series: Special Publication (NIST SP)
Report Number: 800-82 Rev 1
Topic: Information Technology
Published: 5/14/2013
Authors: Keith A Stouffer, Joseph A Falco, Karen Ann Scarfone
Abstract: This document provides guidance on how to secure Industrial Control Systems (ICS), including Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems (DCS), and other control system configurations such as Programmable ...

97. Writing Guidelines to Develop an Memorandum of Understanding for Interoperable Automated Fingerprint Identification Systems
Series: Special Publication (NIST SP)
Report Number: 1156
Topic: Information Technology
Published: 5/14/2013
Authors: Susan M Ballou, Michael D Garris, Anthony Clay, Joi Dickerson, Peter T Higgins, Lisa Jackson, Joe Morrissey, Beth Owens, Joe Polski, Janet Hoin, Leo Norton, Melissa K Taylor
Abstract: This is one of a series of documents prepared by the Latent Print Automated Fingerprint Identification System (AFIS) Interoperability Working Group. The purpose of these documents is to provide guidance and a framework to those involved in the id ...

98. Secure Sealed-Bid Online Auctions Using Discreet Cryptographic Proofs
Topic: Information Technology
Published: 5/10/2013
Authors: Rene C Peralta, Jose Antonio Montenegro, Javier Lopez
Abstract: This work describes the design and implementation of an auction system using secure multiparty computation techniques. Our aim is to produce a system that is practical under actual eld constraints on computation, mem- ory, and communication. The ...

99. ITL Publishes Security and Privacy Controls for Federal Agencies
Series: ITL Bulletin
Topic: Information Technology
Published: 5/1/2013
Author: Elizabeth B Lennon
Abstract: This ITL Bulletin for May 2013 announces the publication of NIST Special Publication 800-53, Revision 4, Security and Privacy Controls for Federal Information Systems and Organizations. Developed by the Joint Task Force Transformation Initiative Inte ...

100. Security and Privacy Controls for Federal Information Systems and Organizations
Series: Special Publication (NIST SP)
Report Number: 800-53 Rev 4
Topic: Information Technology
Published: 4/30/2013
Author: Ronald S Ross
Abstract: **Includes updates through 5/7/13. [Superseded by NIST SP 800-53 Rev. 4 (April 2013 including updates through 1/15/14):] This publication provides a catalog of security and privacy c ...

Search NIST-wide:

(Search abstract and keywords)

Last Name:
First Name:

Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series