NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.
Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.
An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Fahim H. Sadek, Joseph Main, Hai S. Lew, Stephen D. Robert, Vincent Chiarito, Sherif El-Tawil
This report presents an experimental and computational study of two steel beam-column assemblies, each comprising three columns and two beams. The two beam
The success of biometric applications is particularly dependent on the interoperability of biometric systems. Deploying these systems requires a comprehensive
When an emergency occurs, it is not always sufficient to simply initiate alarm bells. Individuals may not know what the alarm bell means and, in turn, may
Elizabeth N. Fong, Paul E. Black, Michael J. Kass, Hsiao-Ming M. Koo
Software assurance tools are a fundamental resource to improve assurance in today's software applications. Some tools analyze software requirements or design
This publication provides recommendations for using two vulnerability naming schemes: Common Vulnerabilities and Exposures (CVE) and Common Configuration
David A. Waltermire, Stephen D. Quinn, Karen Scarfone
This document provides the definitive technical specification for Version 1.1 of the Security Content Automation Protocol (SCAP). SCAP consists of a suite of
Meltem Sonmez Turan, Ray A. Perlner, Lawrence E. Bassham, William E. Burr, Dong H. Chang, Shu-jen H. Chang, Morris J. Dworkin, John M. Kelsey, Souradyuti Paul, Rene C. Peralta
The National Institute of Standards and Technology (NIST) opened a public competition on November 2, 2007 to develop a new cryptographic hash algorithm - SHA-3
This glossary of key information security terms has been extracted from NIST Federal Information Processing Standards (FIPS), Special Publication (SP) 800
Jolene D. Splett, Dominic F. Vecchia, Loren F. Goodrich
We compare methods for estimating the residual resistivity ratio (RRR) of high-purity niobium samples and investigate the effects of using different functional
Through its Metrics and Tools for Sustainable Buildings project, NIST is taking a lead role in providing science-based guidance to the building community on the
Detecting the small signals of climate change for the most essential climate variables requires that satellite sensors make highly accurate and consistent
Diane Mauchant, Michael A. Riley, Kirk D. Rice, Amanda L. Forster, Dennis D. Leber, Daniel V. Samarov
The performance standard for ballistic-resistant body armor published by the National Institute of Justice (NIJ), NIJ Standard 0101.06, recommends estimating
Output of the NIST Smart Grid Interoperability Panel's Priority Action Plan 2: Wireless Communication for smart Grid, working group. It contains a methodology
The American Concrete Institute in 2010 defined internal curing as supplying water throughout a freshly placed cementitious mixture using reservoirs, via pre
The so-called 20 kips frame (MTS table-top machine), equipped with a 100 kN load cell with serial No. 850, was used in the period April-December 2010 to perform
This report summarizes the technical work of the Applied and Computational Sciences Division (ACMD) of NIST s Information Technology Laboratory. Part I
Dale P. Bentz, Chiara F. Ferraris, James J. Filliben
One major objective of the sustainable construction movement is to decrease the energy and carbon dioxide footprints of concrete. Since the production of
High-temperature metallic seal performance tests were performed. All the tests were conducted at either 800 °C or 427 °C for 9 hours in a electrical furnace. In
In operational ROC (receiver operating characteristic) analysis of fingerprint-image matching algorithms on large datasets, the measures and their accuracies
A formulation of the problem of combining data from several sources is discussed in terms of random effects models. The unknown measurement precision is not
This bulletin summarizes the information presented in NIST Special Publication (SP) 800-119, Guidelines for the Secure Deployment of IPv6. Written by Sheila
Murugiah P. Souppaya, Karen Scarfone, Paul Hoffman
The purpose of SP 800-125 is to discuss the security concerns associated with full virtualization technologies for server and desktop virtualization, and to
William F. Young, Catherine A. Remley, David W. Matolak, Qian Zhang, Christopher L. Holloway, Chriss A. Grosvenor, Camillo A. Gentile, Galen H. Koepke, Qiong Wu
We report on measured peer-to-peer (ground-based) wireless channel characteristics for an urban environment in two public safety frequency bands. Results are
The advent of new imaging technologies has allowed faster and higher-resolution cellular image acquisition by light microscopy. This has directly aided clinical
A mixture fraction formulation is used to numerically simulate the two-dimensional structure of diluted axisymmetric methane-air nonpremixed counterflow flames