Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Special Publication (NIST SP)

Quick Start Guide for Populating Mobile Test Devices

Author(s)
Richard Ayers, Benjamin R. Livelsberger, Barbara Guttman
This guide provides procedures for documenting and populating various data elements typically found within the contents of a mobile device, e.g., mobile phone...

Platform Firmware Resiliency Guidelines

Author(s)
Andrew R. Regenscheid
This document provides technical guidelines and recommendations supporting resiliency of platform firmware and data against potentially destructive attacks. The...

Cloud Computing Service Metrics Description

Author(s)
Frederic J. de Vaulx, Eric D. Simmon, Robert B. Bohn
With cloud computing in the mainstream, there is a preponderance of cloud based services in the market and the choices for consumers increase daily. However...

Fog Computing Conceptual Model

Author(s)
Michaela Iorga, Larry Feldman, Robert Barton, Michael J. Martin, Nedim S. Goren, Charif Mahmoudi
Managing the data generated by Internet of Things (IoT) sensors and actuators is one of the biggest challenges faced when deploying an IoT system. Traditional...

Future Generation Wireless R&D Gaps Report

Author(s)
Nada T. Golmie
This report identifies and describes several of the most significant gaps within various components of the wireless industry. This report is intended to serve...

Domain Name System-Based Electronic Mail Security

Author(s)
Scott W. Rose, Karen M. Waltermire, Santos Jha, Chinedum Irrechukwu, William C. Barker
This document describes a security platform for trustworthy email exchanges across organizational boundaries. The project includes reliable authentication of...

Recommendation for the Entropy Sources Used for Random Bit Generation

Author(s)
Meltem Sonmez Turan, Elaine B. Barker, John M. Kelsey, Kerry A. McKay, Mary L. Baish, Mike Boyle
This Recommendation specifies the design principles and requirements for the entropy sources used by Random Bit Generators, and the tests for the validation of...

Guide to LTE Security

Author(s)
Jeffrey A. Cichonski, Joshua M. Franklin, Michael J. Bartock
Cellular technology plays an increasingly large role in society as it has become the primary portal to the internet for a large segment of the population. One...

Road Mapping Workshop Report on Overcoming Barriers to Adoption of Composites in Sustainable Infrastructure

Author(s)
Richard J. Sheridan, Jeffrey W. Gilman, John Busel, David Hartman, Gale A. Holmes, Daniel Coughlin, Paul Kelley, Dustin Troutman, Jim Gutierrez, Charles Bakis, Robert Moser, Ellen Lackey, James R. Fekete, Stephanie S. Watson, Jae Hyun Kim, Aaron M. Forster, Ajay Krishnamurthy, Bharath NMN Natarajan, William O'Donnell
The February 2017 “Road Mapping Workshop on Overcoming Barriers to Adoption of Composites in Infrastructure” brought together designers, manufacturers...
Was this page helpful?