NIST logo

Publications Portal

You searched on: Topic Area: Information Technology Sorted by: date

Displaying records 11 to 20 of 698 records.
Resort by: Date / Title


11. Face Recognition Vendor Test (FRVT) - Performance of Automated Gender Classification Algorithms
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 8052
Topic: Information Technology
Published: 4/20/2015
Authors: Mei L Ngan, Patrick J Grother
Abstract: Facial gender classification is an area studied in the Face Recognition Vendor Test (FRVT) with Still Facial Images Track. While peripheral to automated face recognition, it has become a growing area of research, given its potential use in vari ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=918054

12. TRECVID 2014 -- An Overview of the Goals, Tasks, Data, Evaluation Mechanisms, and Metrics
Topic: Information Technology
Published: 3/26/2015
Authors: Paul Douglas Over, Jonathan G Fiscus, Gregory A Sanders, David M Joy, Martial Michel, George Awad, Alan Smeaton, Wessel Kraaij, Georges Quenot
Abstract: The TREC Video Retrieval Evaluation (TRECVID) 2014 was a TREC-style video analysis and retrieval evaluation, the goal of which remains to promote progress in content-based exploitation of digital video via open, metrics-based evaluation. Over the ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=918038

13. Guidance for Secure Authorization of Mobile Applications in the Corporate Environment
Series: ITL Bulletin
Topic: Information Technology
Published: 3/19/2015
Authors: Athanasios T Karygiannis, Stephen Quirolgico, Larry Feldman, Gregory A. Witte
Abstract: This bulletin provides an overview of NIST Special Publication (SP) 800-163, "Vetting the Security of Mobile Applications." The NIST SP helps organizations understand the process for vetting the security of mobile applications, plan for the implement ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=918252

14. The Multiplicative Complexity of Boolean Functions on Four and Five Variables
Topic: Information Technology
Published: 3/17/2015
Authors: Meltem Sonmez Turan, Rene C Peralta
Abstract: A generic way to design lightweight cryptographic primitives is to construct simple rounds using small nonlinear components such as 4x4 S-boxes and use these iteratively (e.g., PRESENT and SPONGENT). In order to efficiently implement the primitiv ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=916439

15. National Voluntary Laboratory Accreditation Program (NVLAP) Common Criteria Testing
Series: Handbook (NIST HB)
Report Number: 150-20
Topic: Information Technology
Published: 3/4/2015
Author: Dana Smith Leaman
Abstract: NIST Handbook 150-20 represents the technical requirements and guidance for the accreditation of laboratories under the National Voluntary Laboratory Accreditation Program (NVLAP) Information Technology Security Testing: Common Criteria Testing. It ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915925

16. IT Security
Topic: Information Technology
Published: 2/4/2015
Authors: Morris Chang, David R Kuhn, Timothy Weil
Abstract: How can IT professionals adapt to ever-changing security challenges quickly and without draining their organizations' resources? Articles in this issue highlight emerging trends and suggest ways to approach and address cybersecurity challenges. [gue ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=917217

17. Release of NIST Special Publication 800-53A, Revision 4, Assessing Security and Privacy Controls in Federal Information Systems and Organizations
Series: ITL Bulletin
Topic: Information Technology
Published: 1/29/2015
Authors: Kelley L Dempsey, Larry Feldman, Gregory A. Witte
Abstract: NIST has published an updated version of Special Publication (SP) 800-53A, Assessing Security and Privacy Controls in Federal Information Systems and Organizations. SP 800-53A provides guidelines for building effective security assessment plans and p ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=917886

18. Defensive code's impact on software performance
Series: Technical Note (NIST TN)
Report Number: 1860
Topic: Information Technology
Published: 1/26/2015
Author: David W Flater
Abstract: Defensive code is instructions added to software for the purpose of hardening it against uncontrolled failures and security problems. It is often assumed that defensive code causes a significant reduction in software performance, which justifies ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=917376

19. Vetting the Security of Mobile Applications
Series: Special Publication (NIST SP)
Report Number: 800-163
Topic: Information Technology
Published: 1/26/2015
Authors: Stephen Quirolgico, Jeffrey Mark Voas, Athanasios T Karygiannis, Christoph Michael, Karen Scarfone
Abstract: The purpose of this document is to help organizations (1) understand the process for vetting the security of mobile applications, (2) plan for the implementation of an app vetting process, (3) develop app security requirements, (4) understand the typ ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=917674

20. Security and Privacy Controls for Federal Information Systems and Organizations [including updates as of 1/22/2015]
Series: Special Publication (NIST SP)
Report Number: 800-53 Rev 4
Topic: Information Technology
Published: 1/22/2015
Author: Ronald S Ross
Abstract: This publication provides a catalog of security and privacy controls for federal information systems and organizations and a process for selecting controls to protect organizational operations (including mission, functions, image, and reputation), or ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=917904



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series