NIST logo

Publications Portal

You searched on: Topic Area: Information Technology Sorted by: date

Displaying records 1 to 10 of 692 records.
Resort by: Date / Title


1. The Authentication Equation: A Tool to Visualize the Convergence of Security and Usability of Text-Based Passwords
Topic: Information Technology
Published: 8/4/2015
Authors: Cathryn Alicia Ploehn, Kristen Greene
Abstract: Password management is the ubiquitous struggle of the modern human. Despite usability playing a vital role in authentication, many password policies and requirements focus on security without sufficient consideration of human factors. In fact, ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=917889

2. Human Generated Passwords - the Impacts of Password Requirements and Presentation Styles
Topic: Information Technology
Published: 8/2/2015
Authors: Paul Y Lee, Yee-Yin Choong
Abstract: The generation stage of the user password management lifecycle is arguably the most important yet perilous step. Fulfilling minimum length and character type requirements while attempting to create something memorable can become an arduous task, leav ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=917941

3. A Framework to Canonicalize Manufacturing Service Capability Models
Topic: Information Technology
Published: 5/15/2015
Authors: Boonserm Kulvatunyou, Yunsu Lee, Nenad Ivezic, Yun Peng
Abstract: The ability to share precise models of suppliers‰ manufacturing service capability (MSC) information is necessary to develop reliable methods that enable Original Equipment Manufacturers (OEMs) to efficiently configure agile and responsive supply cha ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=912725

4. Introducing Combinatorial Testing in a Large Organization
Topic: Information Technology
Published: 4/23/2015
Authors: Jon Hagar, Thomas Wissink, David R Kuhn, Raghu N Kacker
Abstract: A two-year study of eight pilot projects to introduce combinatorial testing in a large aerospace corporation found that the new methods were practical, significantly lowered development costs, and improved test coverage by 20 to 50 percent.
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=913242

5. Face Recognition Vendor Test (FRVT) - Performance of Automated Gender Classification Algorithms
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 8052
Topic: Information Technology
Published: 4/20/2015
Authors: Mei L Ngan, Patrick J Grother
Abstract: Facial gender classification is an area studied in the Face Recognition Vendor Test (FRVT) with Still Facial Images Track. While peripheral to automated face recognition, it has become a growing area of research, given its potential use in vari ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=918054

6. TRECVID 2014 -- An Overview of the Goals, Tasks, Data, Evaluation Mechanisms, and Metrics
Topic: Information Technology
Published: 3/26/2015
Authors: Paul Douglas Over, Jonathan G Fiscus, Gregory A Sanders, David M Joy, Martial Michel, George Awad, Alan Smeaton, Wessel Kraaij, Georges Quenot
Abstract: The TREC Video Retrieval Evaluation (TRECVID) 2014 was a TREC-style video analysis and retrieval evaluation, the goal of which remains to promote progress in content-based exploitation of digital video via open, metrics-based evaluation. Over the ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=918038

7. Guidance for Secure Authorization of Mobile Applications in the Corporate Environment
Series: ITL Bulletin
Topic: Information Technology
Published: 3/19/2015
Authors: Athanasios T Karygiannis, Stephen Quirolgico, Larry Feldman, Gregory A. Witte
Abstract: This bulletin provides an overview of NIST Special Publication (SP) 800-163, "Vetting the Security of Mobile Applications." The NIST SP helps organizations understand the process for vetting the security of mobile applications, plan for the implement ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=918252

8. The Multiplicative Complexity of Boolean Functions on Four and Five Variables
Topic: Information Technology
Published: 3/17/2015
Authors: Meltem Sonmez Turan, Rene C Peralta
Abstract: A generic way to design lightweight cryptographic primitives is to construct simple rounds using small nonlinear components such as 4x4 S-boxes and use these iteratively (e.g., PRESENT and SPONGENT). In order to efficiently implement the primitiv ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=916439

9. National Voluntary Laboratory Accreditation Program (NVLAP) Common Criteria Testing
Series: Handbook (NIST HB)
Report Number: 150-20
Topic: Information Technology
Published: 3/4/2015
Author: Dana Smith Leaman
Abstract: NIST Handbook 150-20 represents the technical requirements and guidance for the accreditation of laboratories under the National Voluntary Laboratory Accreditation Program (NVLAP) Information Technology Security Testing: Common Criteria Testing. It ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915925

10. IT Security
Topic: Information Technology
Published: 2/4/2015
Authors: Morris Chang, David R Kuhn, Timothy Weil
Abstract: How can IT professionals adapt to ever-changing security challenges quickly and without draining their organizations' resources? Articles in this issue highlight emerging trends and suggest ways to approach and address cybersecurity challenges. [gue ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=917217



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series