An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Kevin B. McGrattan, Randall J. McDermott, Craig G. Weinschenk, Glenn P. Forney
This document provides the theoretical basis for the Fire Dynamics Simulator (FDS), following the general framework set forth in the Standard Guide for...
Energy efficiency requirements in current commercial building energy codes vary across states. Energy standards that are currently adopted by states range from...
The National Institute of Standards and Technology (NIST) received funding through the American Recovery and Reinvestment Act (ARRA) to construct a Net Zero...
The Domain Name System (DNS) is a distributed computing system that enables access to Internet resources by user-friendly domain names rather than IP addresses...
William E. Burr, Donna F. Dodson, Elaine M. Newton, Ray A. Perlner, William T. Polk, Sarbari Gupta, Emad A. Nabbus
This recommendation provides technical guidelines for Federal agencies implementing electronic authentication and is not intended to constrain the development...
Smokeview is a software tool designed to visualize numerical calculations generated by fire models such as the Fire Dynamics Simulator (FDS), a computational...
Smokeview is a software tool designed to visualize numerical calculations generated by the Fire Dynamics Simulator (FDS), a computational fluid dynamics (CFD)...
Smokeview is a software tool designed to visualize numerical calculations generated by fire models such as the Fire Dynamics Simulator (FDS), a computational...
Elaine B. Barker, Miles Smid, Dennis Branstad, Santosh Chokhani
This Framework for Designing Cryptographic Key Management Systems (CKMS) contains topics that should be considered by a CKMS designer when developing a CKMS...
There is a general concern that the US manufacturing industry has lost competitiveness with other nations. Additive manufacturing may provide an important...
This Certification Report documents the procedures used to develop certified values of maximum force (Fm) and absorbed energy (KV) for the following KLST-type...
Title III of the E-Government Act of 2002, entitled the Federal Information Security Management Act (FISMA) of 2002, requires NIST to prepare an annual public...
Patch management is the process for identifying, acquiring, installing, and verifying patches for products and systems. Patches correct security and...
Malware, also known as malicious code, refers to a program that is covertly inserted into another program with the intent to destroy data, run destructive or...
NIST has been designated by the Federal Chief Information Officer (CIO) to accelerate the federal governments secure adoption of cloud computing by leading...
Patrick J. Grother, Wayne J. Salamon, Ramaswamy Chandramouli
Homeland Security Presidential Directive HSPD-12, Policy for a Common Identification Standard for Federal Employees and Contractors [HSPD-12], called for new...
The TREC Medical Records track fosters research that allows electronic health records to be retrieved based on the semantic content of free-text fields. The...
Mobile devices, such as smart phones and tablets, typically need to support multiple security objectives: confidentiality, integrity, and availability. To...
Elaine B. Barker, Lidong Chen, Allen L. Roginsky, Miles Smid
This Recommendation specifies key-establishment schemes based on the discrete logarithm problem over finite fields and elliptic curves, including several...
Julian S. Taurozzi, Vincent A. Hackley, Mark R. Wiesner
Toxicity and fate assessment are key elements in the evaluation of the environmental, health and safety risks of engineered nanomaterials (ENMs). While...
In response to the increasing losses due to WUI fires and to ensure that measurement science keeps pace with needed improvements in materials, fire-resistant...
Susan M. Ballou, Michael Garris, Anthony Clay, Joi Dickerson, Peter T. Higgins, Lisa Jackson, Joe Morrissey, Beth Owens, Joe Polski, Janet Hoin, Leo Norton, Melissa Taylor
This is one of a series of documents prepared by the Latent Print Automated Fingerprint Identification System (AFIS) Interoperability Working Group. The purpose...
Kuldeep R. Prasad, Kevin Li, Elizabeth F. Moore, Rodney A. Bryant, Aaron N. Johnson, James R. Whetstone
The burning of fossil fuels remains a major source of greenhouse gases responsible for global warming and climate change. In order to reduce greenhouse gas...
Susan M. Ballou, Michael Garris, Anthony Clay, Joi Dickerson, Peter T. Higgins, Janet Hoin, Lisa Jackson, Mike Lesko, Joe Morrissey, Leo Norton, Beth Owens, Joe Polski, Melissa Taylor
This is one of a series of documents prepared by the Latent Print Automated Fingerprint Identification System (AFIS) Interoperability Working Group. The purpose...