An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
To support NOAA's Marine Mammal Health and Stranding program, NIST Charleston was requested to investigate the feasibility of measuring polycyclic aromatic
Luis T. A. N. Brandao, Nicky W. Mouha, Apostol T. Vassilev
The Computer Security Division at the National Institute of Standards and Technology is interested in promoting the security of implementations of cryptographic
Jeanice M. Brown Thomas, David L. Duewer, Margaret C. Kline, William A. MacCrehan, Robert Paule, Reenie Parris, Willie May, Robert Schaffer
From 1984 to 2017, the National Institute of Standards and Technology (NIST) and its precursor the National Burearu of Standards (NBS) coordinated what became
Gorjan Alagic, Jacob M. Alperin-Sheriff, Daniel Apon, David Cooper, Quynh H. Dang, Carl Miller, Dustin Moody, Rene Peralta, Ray Perlner, Angela Robinson, Daniel Smith-Tone, Yi-Kai Liu
The National Institute of Standards and Technology is in the process of selecting one or more public-key cryptographic algorithms through a public competition
Julie Haney, Mary Theofanos, Yasemin Acar, Sandra Spickard Prettyman
Cryptography is an essential component of modern computing. Unfortunately, implementing cryptography correctly is a non-trivial undertaking. Past research
Kelley L. Dempsey, Nedim S. Goren, Paul Eavy, George Moore
The NISTIR 8011 volumes focus on each individual information security capability, adding tangible detail to the more general overview given in NISTIR 8011
In this report, we present network measurement of an ISA100.11a industrial wireless network operating with existing WiFi interference. The IEEE802.15.4-based
The Interagency International Cybersecurity Standardization Working Group (IICS WG) was established in December 2015 by the National Security Council's Cyber
This report documents performance of face recognition algorithms applied to the one-to-many identification of faces appearing in portrait images. The primary
Chuck Barber, Bruce A. Benner Jr., Jeanice M. Brown Thomas, Carolyn Burdette, Johanna Camara, Stephen E. Long, Jacolin Murray, Melissa M. Phillips, Benjamin Place, Kate Rimmer, Laura J. Wood, Susan Tai, Siva K. Chinthalapati, Lee L. Yu
The NIST Health Assessment Measurements Quality Assurance Program (HAMQAP) was launched in collaboration with the National Institutes of Health (NIH) Office of
NIST performed a large scale empirical evaluation of tattoo recognition algorithms. The test leveraged large operational datasets comprised of tattoo images
The document provides both an overview and technical details of test scenarios that are designed by our group. Those test scenarios can be used to verify the
Chuck Barber, Melissa M. Phillips, Laura J. Wood, Kate Rimmer, Steven J. Christopher
The NIST Dietary Supplement Laboratory Quality Assurance Program (DSQAP) was established in collaboration with the National Institutes of Health (NIH) Office of
Maria K. Dillard, Jennifer F. Helgeson, Stephen A. Cauffman
The National Institute of Standards and Technology (NIST) published the Community Resilience Planning Guide for Buildings and Infrastructure Systems (NIST SP
Dylan J. Yaga, Peter M. Mell, Nik Roby, Karen Scarfone
Blockchains are tamper evident and tamper resistant digital ledgers implemented in a distributed fashion (i.e., without a central repository) and usually
The National Institute of Standards and Technology (NIST) published the Community Resilience Planning Guide for Buildings and Infrastructure Systems (NIST SP
Chuck Barber, Melissa M. Phillips, Kate Rimmer, Laura J. Wood, Steven J. Christopher
The NIST Dietary Supplement Laboratory Quality Assurance Program (DSQAP) was established in collaboration with the National Institutes of Health (NIH) Office of
We describe models for the viscosity, thermal conductivity, and surface tension for selected fluids implemented in version 10.0 of the NIST computer program
Yee-Yin Choong, Shanee T. Dawkins, Susanne M. Furman, Kristen Greene, Sandra S. Prettyman, Mary F. Theofanos
The public safety community is in the process of transitioning from the use of land mobile radios to a technology ecosystem including a variety of broadband
This document presents a performance evaluation of Long Term Evolution (LTE) Device-to-device (D2D) communication when enabling frequency hopping resource
Jin Chu Wu, Alvin F. Martin, Gregory A. Sanders, Raghu N. Kacker
The nonparametric two-sample bootstrap is employed to estimate uncertainties of statistics of interest in receiver operating characteristic (ROC) analysis on
As shape analysis of the form presented in Srivastava and Klassens textbook Functional and Shape Data Analysis is intricately related to Lebesgue integration
Li-Anne Liew, David T. Read, Ryan M. White, Nicholas Barbosa
The LIGA process (Lithographie, Galvanoformung, Abformung, or lithography, electrodeposition, shaping) offers the possibility of mass producing strong mesoscale