Skip to main content

NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.

Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.

U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

NIST Interagency/Internal Report (NISTIR)

NIST Workshop on Ontology Evaluation (NISTIR 7774)

Author(s)
Ram D. Sriram, Conrad E. Bock, Fabian M. Neuhaus, Evan K. Wallace, Mary C. Brady, Mark Musen, Joanne Luciano
The National Institute for Standards and Technology sponsored a workshop in October, 2007, on the subject of ontology evaluation. An international group of

When High-Quality Face Images Match Poorly

Author(s)
J. R. Beveridge, P. Jonathon Phillips, Geof H. Givens, Bruce A. Draper, Mohammad N. Teli, David Bolme
In face recognition, quality is typically thought of as a property of individual images, not image pairs. The implicit assumption is that high-quality images

An Introduction to the Good, the Bad, & the Ugly Face Recognition Challenge Problem

Author(s)
P J. Phillips, J. R. Beveridge, Bruce A. Draper, Geof H. Givens, Alice J. O'Toole, David Bolme, Joseph Dunlop, Yui M. Lui, Hassan A. Sahibzada, Samuel Weimer
The Good, the Bad, & the Ugly Face Challenge Problem was created to encourage the development of algorithms that are robust to recognition across changes in

Status Report on the Second Round of the SHA-3 Cryptographic Hash Algorithm Competition

Author(s)
Meltem Sonmez Turan, Ray A. Perlner, Lawrence E. Bassham, William E. Burr, Dong H. Chang, Shu-jen H. Chang, Morris J. Dworkin, John M. Kelsey, Souradyuti Paul, Rene C. Peralta
The National Institute of Standards and Technology (NIST) opened a public competition on November 2, 2007 to develop a new cryptographic hash algorithm - SHA-3

Security Considerations for Remote Electronic UOCAVA Voting

Author(s)
Nelson Hastings, Rene Peralta, Stefan Popoveniuc, Andrew Regenscheid
This whitepaper for the Technical Guidelines Development Committee (TGDC) identifies desirable security properties of remote electronic voting systems

Glossary of Key Information Security Terms

Author(s)
Richard L. Kissel
This glossary of key information security terms has been extracted from NIST Federal Information Processing Standards (FIPS), Special Publication (SP) 800

Internal Curing: A 2010 State-of-the-Art Review

Author(s)
Dale P. Bentz, Jason Weiss
The American Concrete Institute in 2010 defined internal curing as supplying water throughout a freshly placed cementitious mixture using reservoirs, via pre

NIST Time and Frequency Bulletin

Author(s)
Petrina C. Potts
The Time and Frequency Bulletin provides information on performance of time scales and a variety of broadcasts (and related information) to users of the NIST
Was this page helpful?