Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

NIST Interagency/Internal Report (NISTIR)

Workshop Report: Standards and Performance Metrics for On-Road Autonomous Vehicles

Author(s)
Craig I. Schlenoff, Suzanne Lightman, Vinh Nguyen, Prem Rachakonda, Tao Zhang, Omar Aboul-Enein, Nicholas Barbosa, C Cameron Miller, Daniel Sawyer, Ann Virts
On-road autonomous vehicles are expected to significantly influence key aspects of everyday life. However, these complex systems can pose a safety risk in the...

CSAFE Bitemark Thinkshop Report

Author(s)
NFN CSAFE, Kelly Sauerwein
This is supplemental information to NISTIR 8352 Bitemark Analysis: A NIST Scientific Foundation Review. NIST asked the Center for Statistics and Applications in...

Standards and Guidelines in Forensic Odontology

Author(s)
Karen Reczek
This report provides supplemental information to NISTIR 8352 Bitemark Analysis: A NIST Scientific Foundation Review. Standards and guidelines from the American...

Bitemark Analysis Reference List

Author(s)
Kelly Sauerwein
This report provides supplemental information to NISTIR 8352 Bitemark Analysis: A NIST Scientific Foundation Review. Publicly available resources relating to...

Status Report on the Third Round of the NIST Post-Quantum Cryptography Standardization Process

Author(s)
Gorjan Alagic, Daniel Apon, David Cooper, Quynh Dang, Thinh Dang, John M. Kelsey, Jacob Lichtinger, Yi-Kai Liu, Carl A. Miller, Dustin Moody, Rene Peralta, Ray Perlner, Angela Robinson, Daniel Smith-Tone
The National Institute of Standards and Technology is in the process of selecting public-key cryptographic algorithms through a public, competition-like process...

Profile of the IoT Core Baseline for Consumer IoT Products

Author(s)
Katerina N. Megas, Michael Fagan, Jeffrey Marron, Paul Watrobski, Barbara Bell Cuthill
This publication documents the consumer profile of NIST's Internet of Things (IoT) core baseline and identifies cybersecurity capabilities commonly needed for...

Advanced Communications Technologies Standards

Author(s)
Chris Greer, Robert B. Bohn, Tao Zhang
This report of the Advanced Communications Technologies Working Group of the Interagency Committee on Standards Policy (ICSP) provides an overview of Federal...

Status Report on the Third Round of the NIST Post-Quantum Cryptography Standardization Process

Author(s)
Gorjan Alagic, David Cooper, Quynh Dang, Thinh Dang, John M. Kelsey, Jacob Lichtinger, Yi-Kai Liu, Carl A. Miller, Dustin Moody, Rene Peralta, Ray Perlner, Angela Robinson, Daniel Smith-Tone, Daniel Apon
The National Institute of Standards and Technology is in the process of selecting public-key cryptographic algorithms through a public, competition-like process...

Blockchain for Access Control Systems

Author(s)
Vincent C. Hu
The rapid development and wide application of distributed network systems have made network security – especially access control and data privacy – ever more...

SCAP Composer User Guide

Author(s)
Joshua Lubell
SCAP Composer is a software application from the National Institute of Standards and Technology (NIST) for creating Security Content Automation Protocol (SCAP –...

Hardware-Enabled Security: Enabling a Layered Approach to Platform Security for Cloud and Edge Computing Use Cases

Author(s)
Murugiah Souppaya, Michael Bartock, Karen Scarfone, Ryan Savino, Tim Knoll, Uttam Shetty, Mourad Cherfaoui, Raghu Yeluri, Don Banks, Akash Malhotra, Michael Jordan, Dimitrios Pendarakis, Peter Romness
In today's cloud data centers and edge computing, attack surfaces have shifted and, in some cases, significantly increased. At the same time, hacking has become...

Hardware-Enabled Security: Policy-Based Governance in Trusted Container Platforms

Author(s)
Michael Bartock, Murugiah Souppaya, Haidong Xia, Raghu Yeluri, Uttam Shetty, Brandon Lum, Mariusz Sabath, Harmeet Singh, Alaa Youssef, Gosia Steinder, Yu Cao, Jayashree Ramanathan
In today's cloud data centers and edge computing, attack surfaces have significantly increased, cyber attacks are industrialized, and most security control...
Was this page helpful?