Take a sneak peek at the new NIST.gov and let us know what you think!
(Please note: some content may not be complete on the beta site.).

View the beta site
NIST logo

Publications Portal

You searched on: Topic Area: Information Technology

Displaying records 41 to 50 of 732 records.
Resort by: Date / Title

41. Guidance for Secure Authorization of Mobile Applications in the Corporate Environment
Series: ITL Bulletin
Topic: Information Technology
Published: 3/19/2015
Authors: Athanasios T Karygiannis, Stephen Quirolgico, Larry Feldman, Gregory A. Witte
Abstract: This bulletin provides an overview of NIST Special Publication (SP) 800-163, "Vetting the Security of Mobile Applications." The NIST SP helps organizations understand the process for vetting the security of mobile applications, plan for the implement ...

42. The Multiplicative Complexity of Boolean Functions on Four and Five Variables
Topic: Information Technology
Published: 3/17/2015
Authors: Meltem Sonmez Turan, Rene C Peralta
Abstract: A generic way to design lightweight cryptographic primitives is to construct simple rounds using small nonlinear components such as 4x4 S-boxes and use these iteratively (e.g., PRESENT and SPONGENT). In order to efficiently implement the primitiv ...

43. National Voluntary Laboratory Accreditation Program (NVLAP) Common Criteria Testing
Series: Handbook (NIST HB)
Report Number: 150-20
Topic: Information Technology
Published: 3/4/2015
Author: Dana Smith Leaman
Abstract: NIST Handbook 150-20 represents the technical requirements and guidance for the accreditation of laboratories under the National Voluntary Laboratory Accreditation Program (NVLAP) Information Technology Security Testing: Common Criteria Testing. It ...

44. IT Security
Topic: Information Technology
Published: 2/4/2015
Authors: Morris Chang, David R Kuhn, Timothy Weil
Abstract: How can IT professionals adapt to ever-changing security challenges quickly and without draining their organizations' resources? Articles in this issue highlight emerging trends and suggest ways to approach and address cybersecurity challenges. [gue ...

45. Release of NIST Special Publication 800-53A, Revision 4, Assessing Security and Privacy Controls in Federal Information Systems and Organizations
Series: ITL Bulletin
Topic: Information Technology
Published: 1/29/2015
Authors: Kelley L Dempsey, Larry Feldman, Gregory A. Witte
Abstract: NIST has published an updated version of Special Publication (SP) 800-53A, Assessing Security and Privacy Controls in Federal Information Systems and Organizations. SP 800-53A provides guidelines for building effective security assessment plans and p ...

46. A Logic Based Network Forensics Model for Evidence Analysis
Topic: Information Technology
Published: 1/28/2015
Authors: Changwei Liu, Anoop Singhal, Duminda Wijesekera
Abstract: Many attackers tend to use sophisticated multi-stage and/or multi-host attack techniques and anti-forensic tools to cover their traces. Due to the limitations of current intrusion detection and network forensic analysis tools, reconstructing attack s ...

47. Defensive code's impact on software performance
Series: Technical Note (NIST TN)
Report Number: 1860
Topic: Information Technology
Published: 1/26/2015
Author: David W Flater
Abstract: Defensive code is instructions added to software for the purpose of hardening it against uncontrolled failures and security problems. It is often assumed that defensive code causes a significant reduction in software performance, which justifies ...

48. Vetting the Security of Mobile Applications
Series: Special Publication (NIST SP)
Report Number: 800-163
Topic: Information Technology
Published: 1/26/2015
Authors: Stephen Quirolgico, Jeffrey Mark Voas, Athanasios T Karygiannis, Christoph Michael, Karen Scarfone
Abstract: The purpose of this document is to help organizations (1) understand the process for vetting the security of mobile applications, (2) plan for the implementation of an app vetting process, (3) develop app security requirements, (4) understand the typ ...

49. Security and Privacy Controls for Federal Information Systems and Organizations [including updates as of 1/22/2015]
Series: Special Publication (NIST SP)
Report Number: 800-53 Rev 4
Topic: Information Technology
Published: 1/22/2015
Author: Ronald S Ross
Abstract: This publication provides a catalog of security and privacy controls for federal information systems and organizations and a process for selecting controls to protect organizational operations (including mission, functions, image, and reputation), or ...

50. Spin-transfer torque switching observed in nanopillar superconducting-magnetic hybrid Josephson junctions
Topic: Information Technology
Published: 1/9/2015
Authors: Burm Baek, William H Rippard, Matthew R Pufall, Samuel Paul Benz, Stephen E Russek, Horst Rogalla, Paul David Dresselhaus
Abstract: Combining superconducting and magnetic materials to create novel superconducting devices has been motivated by the discovery of the Josephson critical current (Ics) oscillations with magnetic layer thickness and the demonstration of devices with ...

Search NIST-wide:

(Search abstract and keywords)

Last Name:
First Name:

Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series