NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.
Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.
An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Transport Layer Security (TLS) provides mechanisms to protect sensitive data during electronic dissemination across the Internet. This Special Publication
This document was created as part of a fire model verification and validation study conducted by the U.S. Nuclear Regulatory Commission (NRC), the Electric
Linda D. Crown, Tina G. Butcher, Richard A. Harshman, David A. Sefcik, Lisa Warfield
The 98th Annual Meeting of the National Conference on Weights and Measures (NCWM) was held July 14 to 18, 2013, at the Seelbach Hilton Louisville, Louisville
Shahram Orandi, John M. Libert, John D. Grantham, Kenneth Ko, Stephen S. Wood, Frederick R. Byers, Bruce Bandini, Stephen G. Harvey, Michael D. Garris
This special publication provides guidance for compression of 1000 ppi friction ridge imagery as well as an interoperability pathway between legacy 500 ppi
Michael T. Postek, Andras Vladar, Bin Ming, Bunday Benjamin
Reference Material (RM) 8820 is a multipurpose instrument calibration standard available from NIST. This is a dimensional standard initially developed to
Jodie G. Pope, John D. Wright, Aaron N. Johnson, Christopher J. Crowley
This document provides a description of the 2.5 L/s and 0.1 L/s liquid flow calibration standards operated by the National Institute of Standards and Technology
Erica D. Kuligowski, Long Phan, Marc L. Levitan, David P. Jorgensen
This is a report on the National Institute of Standards and Technology (NIST) reconnaissance to collect information on the performance of one critical facility
Kevin B. McGrattan, Randall J. McDermott, Craig G. Weinschenk, Glenn P. Forney
This document provides the theoretical basis for the Fire Dynamics Simulator (FDS), following the general framework set forth in the Standard Guide for
The National Institute of Standards and Technology (NIST) received funding through the American Recovery and Reinvestment Act (ARRA) to construct a Net Zero
Energy efficiency requirements in current commercial building energy codes vary across states. Energy standards that are currently adopted by states range from
The Domain Name System (DNS) is a distributed computing system that enables access to Internet resources by user-friendly domain names rather than IP addresses
William E. Burr, Donna F. Dodson, Elaine M. Newton, Ray A. Perlner, William T. Polk, Sarbari Gupta, Emad A. Nabbus
This recommendation provides technical guidelines for Federal agencies implementing electronic authentication and is not intended to constrain the development
Smokeview is a software tool designed to visualize numerical calculations generated by the Fire Dynamics Simulator (FDS), a computational fluid dynamics (CFD)
Smokeview is a software tool designed to visualize numerical calculations generated by fire models such as the Fire Dynamics Simulator (FDS), a computational
Smokeview is a software tool designed to visualize numerical calculations generated by fire models such as the Fire Dynamics Simulator (FDS), a computational
Elaine B. Barker, Miles Smid, Dennis Branstad, Santosh Chokhani
This Framework for Designing Cryptographic Key Management Systems (CKMS) contains topics that should be considered by a CKMS designer when developing a CKMS
There is a general concern that the US manufacturing industry has lost competitiveness with other nations. Additive manufacturing may provide an important
This Certification Report documents the procedures used to develop certified values of maximum force (Fm) and absorbed energy (KV) for the following KLST-type
Title III of the E-Government Act of 2002, entitled the Federal Information Security Management Act (FISMA) of 2002, requires NIST to prepare an annual public
Malware, also known as malicious code, refers to a program that is covertly inserted into another program with the intent to destroy data, run destructive or
NIST has been designated by the Federal Chief Information Officer (CIO) to accelerate the federal governments secure adoption of cloud computing by leading
Patrick J. Grother, Wayne J. Salamon, Ramaswamy Chandramouli
Homeland Security Presidential Directive HSPD-12, Policy for a Common Identification Standard for Federal Employees and Contractors [HSPD-12], called for new
The TREC Medical Records track fosters research that allows electronic health records to be retrieved based on the semantic content of free-text fields. The
Mobile devices, such as smart phones and tablets, typically need to support multiple security objectives: confidentiality, integrity, and availability. To