NIST logo

Publications Portal

You searched on:
Topic Area: Information Technology
Sorted by: title

Displaying records 871 to 880 of 995 records.
Resort by: Date / Title


871. The Internet of Things: A Reality Check
Topic: Information Technology
Published: 6/11/2012
Authors: George Hurlburt, Jeffrey Mark Voas, Keith Miller
Abstract: The short persepctive explains the concept behind Internet of Things (IoT). The publication is a perspectives piece for an IEEE magazine and not intended to be technical. This is intended to be published in a specific column in the magazine.
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=910478

872. The Keyed-Hash Message Authentication Code (HMAC)
Series: Federal Inf. Process. Stds. (NIST FIPS)
Report Number: 198-1
Topic: Information Technology
Published: 7/16/2008
Author: Quynh H Dang
Abstract: This Standard describes a keyed-hash message authentication code (HMAC), a mechanism for message authentication using cryptographic hash functions. HMAC can be used with any iterative Approved cryptographic hash function, in combination with a shared ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=901614

873. The Matrix Market Exchange Formats: Initial Design
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 5935
Topic: Information Technology
Published: 12/1/1996
Authors: Ronald F Boisvert, Roldan Pozo, K Remington
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=900799

874. The Naming Forum: Proceedings of the IRDS Workshop on Data Entity Naming Conventions
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 4374
Topic: Information Technology
Published: 7/1/1990
Author: J J Newton
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=900572

875. The National Institute of Standards and Technology: NIST Contributions to Biometrics Technology
Topic: Information Technology
Published: 8/1/2013
Author: Bradford J Wing
Abstract: NIST has been at the forefront of information technology in its application to biometrics for almost 50 years. Early work revolved around developing hardware and software to perform automated analysis of fingerprint images and development of voice ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=914337

876. The National Strategy for Trusted Identities in Cyberspace (Enhancing Online Choice, Efficiency, Security, and Privacy through Standards)
Topic: Information Technology
Published: 11/1/2011
Author: Jeremy A Grant
Abstract: Dear Password, It‰s time for you to retire. You‰ve served us well, but the reality is that you‰re woefully outdated and fundamentally insecure. Moreover, our reliance on you is making it difficult to move some very interesting and valuable types of ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=909550

877. The New Golden Age of Algorithms and Data Structures
Topic: Information Technology
Published: 10/29/2012
Author: Paul E Black
Abstract: Before 1976 Communications of the ACM printed (and numbered!) new algorithms every issue. Quicksort was invented in 1960, Boyer-Moore string search in 1977, and combsort in 1980. I haven't seen a new, general sorting algorithm in over a decade. The l ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=912693

878. The OOF Manual: Version 1.0
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 6256
Topic: Information Technology
Published: 11/1/1998
Authors: W C Carter, Stephen A Langer, Lin-Sien H Lum
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=900862

879. The Rich Transcription 2004 NISTSPring Meeting Recognition Evaluation
Series: Special Publication (NIST SP)
Report Number: 500-257
Topic: Information Technology
Published: 1/1/2005
Author: John S Garofolo
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=900490

880. The Role of Engineering Statistics in a Reference Benchmark Approach to Verification and Validation of Multi-Physics Simulations of High-Consequence Engineering Systems
Topic: Information Technology
Published: 10/1/2005
Author: Jeffrey T Fong
Abstract: We begin this expository essay by reviewing with examples what a typical engineer already knows about statistics. We then consider a central question in engineering decision making, i.e., given a computer simulation of high-consequence systems, how ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=150013



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series