Take a sneak peek at the new NIST.gov and let us know what you think!
(Please note: some content may not be complete on the beta site.).

View the beta site
NIST logo

Publications Portal

You searched on: Topic Area: Information Technology Sorted by: date

Displaying records 41 to 50 of 735 records.
Resort by: Date / Title

41. Face Recognition Vendor Test (FRVT) - Performance of Automated Gender Classification Algorithms
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 8052
Topic: Information Technology
Published: 4/20/2015
Authors: Mei L Ngan, Patrick J Grother
Abstract: Facial gender classification is an area studied in the Face Recognition Vendor Test (FRVT) with Still Facial Images Track. While peripheral to automated face recognition, it has become a growing area of research, given its potential use in vari ...

42. Nanoscale Spin Valve Josephson Junction Devices
Topic: Information Technology
Published: 4/14/2015
Authors: Burm Baek, William H Rippard, Matthew R Pufall, Samuel Paul Benz, Stephen E Russek, Horst Rogalla, Paul David Dresselhaus
Abstract: Traditionally, superconductivity and magnetism have had a mutually exclusive relationship. However, the physics of superconductor-ferromagnet hybrid structures turned out to be far from being simply destructive, which has led to the hope of a new ...

43. TRECVID 2014 -- An Overview of the Goals, Tasks, Data, Evaluation Mechanisms, and Metrics
Topic: Information Technology
Published: 3/26/2015
Authors: Paul Douglas Over, Jonathan G Fiscus, Gregory A Sanders, David M Joy, Martial Michel, George Awad, Alan Smeaton, Wessel Kraaij, Georges Quenot
Abstract: The TREC Video Retrieval Evaluation (TRECVID) 2014 was a TREC-style video analysis and retrieval evaluation, the goal of which remains to promote progress in content-based exploitation of digital video via open, metrics-based evaluation. Over the ...

44. Guidance for Secure Authorization of Mobile Applications in the Corporate Environment
Series: ITL Bulletin
Topic: Information Technology
Published: 3/19/2015
Authors: Athanasios T Karygiannis, Stephen Quirolgico, Larry Feldman, Gregory A. Witte
Abstract: This bulletin provides an overview of NIST Special Publication (SP) 800-163, "Vetting the Security of Mobile Applications." The NIST SP helps organizations understand the process for vetting the security of mobile applications, plan for the implement ...

45. The Multiplicative Complexity of Boolean Functions on Four and Five Variables
Topic: Information Technology
Published: 3/17/2015
Authors: Meltem Sonmez Turan, Rene C Peralta
Abstract: A generic way to design lightweight cryptographic primitives is to construct simple rounds using small nonlinear components such as 4x4 S-boxes and use these iteratively (e.g., PRESENT and SPONGENT). In order to efficiently implement the primitiv ...

46. National Voluntary Laboratory Accreditation Program (NVLAP) Common Criteria Testing
Series: Handbook (NIST HB)
Report Number: 150-20
Topic: Information Technology
Published: 3/4/2015
Author: Dana Smith Leaman
Abstract: NIST Handbook 150-20 represents the technical requirements and guidance for the accreditation of laboratories under the National Voluntary Laboratory Accreditation Program (NVLAP) Information Technology Security Testing: Common Criteria Testing. It ...

47. IT Security
Topic: Information Technology
Published: 2/4/2015
Authors: Morris Chang, David R Kuhn, Timothy Weil
Abstract: How can IT professionals adapt to ever-changing security challenges quickly and without draining their organizations' resources? Articles in this issue highlight emerging trends and suggest ways to approach and address cybersecurity challenges. [gue ...

48. Release of NIST Special Publication 800-53A, Revision 4, Assessing Security and Privacy Controls in Federal Information Systems and Organizations
Series: ITL Bulletin
Topic: Information Technology
Published: 1/29/2015
Authors: Kelley L Dempsey, Larry Feldman, Gregory A. Witte
Abstract: NIST has published an updated version of Special Publication (SP) 800-53A, Assessing Security and Privacy Controls in Federal Information Systems and Organizations. SP 800-53A provides guidelines for building effective security assessment plans and p ...

49. A Logic Based Network Forensics Model for Evidence Analysis
Topic: Information Technology
Published: 1/28/2015
Authors: Changwei Liu, Anoop Singhal, Duminda Wijesekera
Abstract: Many attackers tend to use sophisticated multi-stage and/or multi-host attack techniques and anti-forensic tools to cover their traces. Due to the limitations of current intrusion detection and network forensic analysis tools, reconstructing attack s ...

50. Defensive code's impact on software performance
Series: Technical Note (NIST TN)
Report Number: 1860
Topic: Information Technology
Published: 1/26/2015
Author: David W Flater
Abstract: Defensive code is instructions added to software for the purpose of hardening it against uncontrolled failures and security problems. It is often assumed that defensive code causes a significant reduction in software performance, which justifies ...

Search NIST-wide:

(Search abstract and keywords)

Last Name:
First Name:

Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series