NIST logo

Publications Portal

You searched on:
Topic Area: Information Technology
Sorted by: title

Displaying records 771 to 780 of 994 records.
Resort by: Date / Title


771. Security of Bluetooth Systems and Devices: Updated Guide Issued by the National Institute of Standards and Technology (NIST)
Series: ITL Bulletin
Topic: Information Technology
Published: 8/13/2012
Author: Shirley M. Radack
Abstract: This bulletin summarizes the information that is included in NIST Special Publication (SP) 121, Revision 1, Guide to Bluetooth Security: Recommendations of the National Institute of Standards and Technology. This guide was revised by John Padgette o ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911947

772. Security of Cell Phones and PDAs
Series: ITL Bulletin
Topic: Information Technology
Published: 1/29/2009
Author: Shirley M. Radack
Abstract: This bulletin summarizes the information disseminated in NIST Special Publication (SP) 800-124, Guidelines on Cell Phone and PDA Security: Recommendations of the National Institute of Standards and Technology, which was written by Wayne Jansen and K ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=901496

773. Security of Personal Computer Systems: A Management Guide
Series: Special Publication (NIST SP)
Report Number: 500-120
Topic: Information Technology
Published: 1/1/1985
Author: Dennis D. Steinauer
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=900373

774. Security of SQL-Based Implementations of Product: Data Exchange Using Step
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 5283
Topic: Information Technology
Published: 10/1/1993
Authors: Lawrence E Bassham, William T Polk
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=900694

775. Selecting Information Technology Security Products
Series: ITL Bulletin
Topic: Information Technology
Published: 4/28/2004
Author: Shirley M. Radack
Abstract: This bulletin summarizes NIST Special Publication 800-36, "Guide to Selecting Information Technology Security Products." The selection of IT security products is an integral part of the design, development and maintenance of an IT security infrastruc ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=150432

776. Selection of Microcomputer Systems
Series: Special Publication (NIST SP)
Report Number: 500-112
Topic: Information Technology
Published: 3/1/1984
Authors: John Barkley, D Gilbert, A Hankinson
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=900365

777. Self-Deployment Algorithms for Coverage Problem in a Network of Mobile Sensors with Unidentical Sensing Range
Topic: Information Technology
Published: 12/6/2009
Authors: Vladimir V Marbukh, Kamran Sayrafian, Hamid Mahboubi, Kaveh Moezzi, Amir G. Aghdam
Abstract: In this paper, efficient sensor deployment algorithms are proposed to improve the coverage area in the target field. The proposed algorithms calculate the position of the sensors iteratively based on the existing coverage holes in the target field. T ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=906722

778. Sensor Location through Linear Programming with Arrival Angle Constraints
Topic: Information Technology
Published: 3/14/2007
Authors: Camillo A Gentile, J Shiu
Abstract: In previous work, we established a linear programming framework to determine sensor location from measured link distances between neighboring nodes in a network. Besides providing greater accuracy compared to other techniques, linear programs in part ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=51155

779. Sequential Time-Bin Entanglement Generation Using Periodically Poled KTP Waveguide
Topic: Information Technology
Published: 1/7/2009
Authors: Lijun Ma, Oliver T Slattery, Xiao Tang, Tiejun Chang
Abstract: We demonstrated non-degenerate sequential time-bin entanglement using periodically poled KTP waveguide at a repetition rate of 1 GHz. The wavelengths of signal and idler are 895 and 1310 nm. The two-photon-interference-fringe visibility is 79%.
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=901108

780. Service Model Driven Variations in Security Measures for Cloud Environments
Topic: Information Technology
Published: 11/6/2011
Author: Ramaswamy Chandramouli
Abstract: With the increasing adoption of cloud computing service models - Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS), proper implementation of adequate and appropriate security protection measures has bec ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=909131



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series