NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.
Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.
An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Michael D. Indovina, R. A. Hicklin, G I. Kiebuzinski
ELFT-EFS Evaluation 1 is an evaluation of the accuracy of latent matching using features marked by experienced human latent fingerprint examiners. The purpose
Patrick J. Grother, Wayne J. Salamon, Craig I. Watson, Michael D. Indovina, Patricia A. Flanagan
The MINEX II trials have been conducted to evaluate the accuracy and speed of MATCH-ON-CARD verification algorithms. These run on ISO/IEC 7816 smartcards. They
Ram D. Sriram, Conrad E. Bock, Fabian M. Neuhaus, Evan K. Wallace, Mary C. Brady, Mark Musen, Joanne Luciano
The National Institute for Standards and Technology sponsored a workshop in October, 2007, on the subject of ontology evaluation. An international group of
J. R. Beveridge, P. Jonathon Phillips, Geof H. Givens, Bruce A. Draper, Mohammad N. Teli, David Bolme
In face recognition, quality is typically thought of as a property of individual images, not image pairs. The implicit assumption is that high-quality images
Alice J. O'Toole, P. Jonathon Phillips, Xiaobo An, Joseph Dunlop
The intended applications of automatic face recognition systems include venues that vary widely in demographic diversity. Formal evaluations of algorithms do
P J. Phillips, J. R. Beveridge, Bruce A. Draper, Geof H. Givens, Alice J. O'Toole, David Bolme, Joseph Dunlop, Yui M. Lui, Hassan A. Sahibzada, Samuel Weimer
The Good, the Bad, & the Ugly Face Challenge Problem was created to encourage the development of algorithms that are robust to recognition across changes in
Sarah E. Baker, Patrick J. Flynn, Kevin W. Bowyer, P. Jonathon Phillips
We present results of the first systematic study to investigate the degree to which template aging occurs for iris biometrics. Our experiments use an image data
This report recommends best practices for development and deployment of modeling, simulation and analysis (MS&A) tools for homeland security applications. The
In video communications the compressed video stream is very likely to be corrupted by channel errors. In order to combat these channel errors, many methods have
The success of biometric applications is particularly dependent on the interoperability of biometric systems. Deploying these systems requires a comprehensive
Meltem Sonmez Turan, Ray A. Perlner, Lawrence E. Bassham, William E. Burr, Dong H. Chang, Shu-jen H. Chang, Morris J. Dworkin, John M. Kelsey, Souradyuti Paul, Rene C. Peralta
The National Institute of Standards and Technology (NIST) opened a public competition on November 2, 2007 to develop a new cryptographic hash algorithm - SHA-3
This glossary of key information security terms has been extracted from NIST Federal Information Processing Standards (FIPS), Special Publication (SP) 800
Diane Mauchant, Michael A. Riley, Kirk D. Rice, Amanda L. Forster, Dennis D. Leber, Daniel V. Samarov
The performance standard for ballistic-resistant body armor published by the National Institute of Justice (NIJ), NIJ Standard 0101.06, recommends estimating
Output of the NIST Smart Grid Interoperability Panel's Priority Action Plan 2: Wireless Communication for smart Grid, working group. It contains a methodology
The American Concrete Institute in 2010 defined internal curing as supplying water throughout a freshly placed cementitious mixture using reservoirs, via pre
The so-called 20 kips frame (MTS table-top machine), equipped with a 100 kN load cell with serial No. 850, was used in the period April-December 2010 to perform
This report summarizes the technical work of the Applied and Computational Sciences Division (ACMD) of NIST s Information Technology Laboratory. Part I
Dale P. Bentz, Chiara F. Ferraris, James J. Filliben
One major objective of the sustainable construction movement is to decrease the energy and carbon dioxide footprints of concrete. Since the production of
The advent of new imaging technologies has allowed faster and higher-resolution cellular image acquisition by light microscopy. This has directly aided clinical
A mixture fraction formulation is used to numerically simulate the two-dimensional structure of diluted axisymmetric methane-air nonpremixed counterflow flames
The Time and Frequency Bulletin provides information on performance of time scales and a variety of broadcasts (and related information) to users of the NIST
The Common Configuration Scoring System (CCSS) is a set of measures of the severity of software security configuration issues. CCSS is derived from the Common
In large-scale distributed systems, the interactions of many independent components may lead to emergent global behaviors with unforeseen, often detrimental
On July 13, 2010, 27 roundtable discussion participants and more than 100 other attendees gathered at the National Institute of Standards and Technology (NIST)
Usability has been a topic of considerable interest in the health IT community. This document provides NIST guidance for those developing electronic health
Elizabeth N. Fong, Charline Cleraux, Frederick E. Boland Jr.
Is trustworthiness of software measurable? The determination of trustworthiness of a piece of software is difficult. There may be different quantifiable
David E. Gilsinn, Kiran Bhadriraju, John T. Elliott
Biological cells are composed of many subsystems and organelles. The subsystem called the cytoskeleton is composed of long rod-shaped structures. They give the
This paper investigates an issue with the Wavelet Scalar Quantization (WSQ) compression algorithm which causes severe degradation of the compressed image. The