NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.
Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.
An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
John Kucklick, Jessica Reiner, Michele M. Schantz, Jennifer Lynch, Jennifer Hoguet, Kate Rimmer, Rebecca Pugh, Jody Rhoderick, Jennifer Ness, Paul R. Becker, Danielle Peterson
Liver and blubber samples from 50 juvenile male northern fur seals (Callorhinus ursinus) were collected on St. Paul Island from four different seal rookeries
David J. Lechevalier, Anantha Narayanan Narayanan, Katherine C. Morris, Sean Reidy, Sudarsan Rachuri
The NIST Ontological Visualization Interface for Standards (NOVIS) was developed at the National Institute of Standards and Technology (NIST) to provide an
Leticia S. Pibida, Ronaldo Minniti, Larry L. Lucas, C M. O'Brien
In this work we studied the response of two different Victoreen® instruments as a function of the exposure rate, the instrument orientation and photon energy
This Certification Report documents the procedures used to develop certified values of maximum force (Fm) and absorbed energy (KV) for the following KLST-type
Title III of the E-Government Act of 2002, entitled the Federal Information Security Management Act (FISMA) of 2002, requires NIST to prepare an annual public
Malware, also known as malicious code, refers to a program that is covertly inserted into another program with the intent to destroy data, run destructive or
NIST has been designated by the Federal Chief Information Officer (CIO) to accelerate the federal governments secure adoption of cloud computing by leading
National Institute of Standards and Technology (NIST), Elaine Barker
This Standard specifies a suite of algorithms that can be used to generate a digital signature. Digital signatures are used to detect unauthorized modifications
A method is described for the computation of axis orthogonality errors in 3-axis accelerometers, based on the application of gravitational force at known angles
This ITL Bulletin announces the publication of NIST Special Publication 800-124 Revision 1, Guidelines for Managing the Security of Movile Devices in the
Amy S. Rushing, Joshua D. Kneifel, Barbara C. Lippiatt
This is the 2013 edition of energy price indices and discount factors for performing life-cycle cost analyses of energy and water conservation and renewable
Patrick J. Grother, Wayne J. Salamon, Ramaswamy Chandramouli
Homeland Security Presidential Directive HSPD-12, Policy for a Common Identification Standard for Federal Employees and Contractors [HSPD-12], called for new
Patrick J. Grother, James R. Matey, Elham Tabassi, George W. Quinn, Michael Chumakov
Background: Stability is a required definitional property for a biometric to be useful. Quantitative statements of stability are operationally important as they
George W. Quinn, Patrick J. Grother, Mei L. Ngan, James R. Matey
IREX IV aims to provide a fair and balanced scientific evaluation of the performance of automated iris recognition algorithms. IREX IV evaluated the performance
The National Strategy for Trusted Identities in Cyberspace (NSTIC) offers a vision of more secure, efficient, and cost-effective authentication through