NIST logo

Publications Portal

You searched on:
Topic Area: Information Technology
Sorted by: title

Displaying records 851 to 860 of 987 records.
Resort by: Date / Title


851. The Cryptographic Hash Algorithm Family: Revision of the Secure Hash Standard and Ongoing Competition for New Hash Algorithms
Series: ITL Bulletin
Topic: Information Technology
Published: 3/25/2009
Author: Shirley M. Radack
Abstract: This bulletin summarizes information disseminated in Federal Information Processing Standard (FIPS) 180-3, Secure Hash Standard; NIST Special Publication (SP) 800-107, Recommendation for Applications Using Approved Hash Algorithms, by Quynh Dang; SP ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=902326

852. The Date-Time Vocabulary
Topic: Information Technology
Published: 7/28/2012
Authors: Mark H Linehan, Edward J Barkmeyer, Stan Hendryx
Abstract: The Date-Time Vocabulary is a new OMG specification that models continuous time, discrete time, the relationship of events and situations to time, language tense and aspect, time indexicals, timetables, and schedules. It offers a "business vocabulary ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911074

853. The Economic Benefits from Improved Cyber Security Infrastructure
Topic: Information Technology
Published: 5/22/2013
Author: Gregory C. Tassey
Abstract: Leading government officials have warned that a "cyber 9/11" could happen at any time. A coordinated terrorist cyber attack on a massive scale could potentially shut down the domestic economy. Even without such a pervasive assault, banks, utilities ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=913775

854. The Effect of Training Dynamics on Neural Network Performance
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 5696
Topic: Information Technology
Published: 8/1/1995
Authors: Charles L. Wilson, J L. Blue, O M Omidvar
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=900764

855. The Exact Multiplicative Complexity of the Hamming Weight Function
Topic: Information Technology
Published: 9/13/2005
Authors: Rene C Peralta, Joan Boyar
Abstract: We consider the problem of computing the Hamming weight of an n-bit vector using a circuit with gates for addition and multiplication modulo 2 (alternatively, XOR and conjunction gates) only. The number of multiplications necessary and sufficient to ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=150712

856. The Exchange of Health Care Information: Designing a Security Architecture to Protect Information Security and Privacy
Series: ITL Bulletin
Topic: Information Technology
Published: 11/23/2010
Author: Shirley M. Radack
Abstract: This bulletin summarizes the information presented in NISTIR 7497, Security Architecture Design Process for Health Information Exchanges (HIEs). The publication describes a systematic approach to designing a technical security architecture for the ex ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=907383

857. The First Census Optical Character Recognition Systems Conference
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 4912
Topic: Information Technology
Published: 8/1/1992
Authors: R A Wilkinson, Geist, Wilson, Vogl, Hull, Stanley Janet, Patrick J Grother
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=900652

858. The First Text REtrieval Conference (TREC-1)
Series: Special Publication (NIST SP)
Report Number: 500-207
Topic: Information Technology
Published: 5/1/1993
Author: Donna K. Harman
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=900456

859. The Fourth PASCAL Recognizing Textual Entailment Challenge
Topic: Information Technology
Published: 10/30/2009
Authors: Hoa Trang Dang, Danilo Giampiccolo, Bernardo Magnini, Ido Dagan, Elena Cabrio, Bill Dolan
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=902260

860. The Future of Cybersecurity Education
Topic: Information Technology
Published: 8/19/2014
Authors: Ernest Leroy McDuffie, V. P. Piotrowski
Abstract: By fostering public-private partnerships in cybersecurity education, the US government is motivating federal agencies, industry, and academia to work more closely together to defend cyberspace.
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=917265



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series