An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
This Recommendation specifies the Galois/Counter Mode (GCM), an algorithm for authenticated encryption with associated data, and its specialization, GMAC, for...
Iadh Ounis, Maarten de Rijke, Craig Macdonald, Gilad Mishne, Ian Soboroff
The Blog track began this year, with the aim to explore the information seeking behaviour in the blogosphere. For this purpose, a new large-scale test...
This bulletin summarizes the guidance developed by NIST and published in SP 800-111 to help organizations secure their end user devices, and deter unauthorized...
The 92nd Annual Meeting of the National Conference on Weights and Measures was held in Salt Lake City, Utah, July 8 - 13, 2007. The theme of the conference was...
This report provides an overview of the fifteenth Text REtrieval Conference, TREC 2006. TREC 2006 was held at NIST on November 16-19, 2006. The conference was...
Karen A. Scarfone, Murugiah P. Souppaya, Matt Sexton
Many threats against end user devices, such as desktop and laptop computers, smart phones, personal digital assistants, and removable media, could cause...
The goal of the Building Information Services and Control System (BISACS) is to create a computer supported system that will allow external users to be...
This paper is a HLPR Chair (Home Lift, Position, and Rehabilitation Chair) design document that includes a brief introduction of the need for this technology...
In its decade of systematic research (1997-2006), the NGP revitalized the field of fire suppression science. The NGP arose as a result of a discovery that...
Xiaoyu X. Li, Thomas Scott, Christopher L. Cromer, David Cooper, Steven Comisford
We report the results of a high-energy laser calorimeter comparison conducted by the National Institute of Standards and Technology (NIST), Boulder, Colorado...
In this report is described the work effort by Reaction Engineering International (REI) to develop, demonstrate and deliver to the National Institute of...
The goal of the Building Infonnation Services and Control System (BISACS) is to create a computer based system that will allow external users to be verified and...
The Thermal Protective Perfonnance (TPP) test was developed to quantify the performance of fire fighter protective clothing ensembles under an intense thermal...
REFLEAK estimates composition changes of zeotropic mixtures in leak and recharge processes. The leak/recharge simulation program consists of three parts: 1) the...
A series of six experiments was conducted in a high-rise apartment building in Chicago, Illinois. One experiment on each of the fire floors utilized portable...
The Thermal Protective Performance (TPP) test was developed to quantify the performance of fire fighter protective clothing ensembles under an intense thermal...
David Flater, Philippe A. Martin, Michelle L. Crane
We describe a modification of the Petri Net Linear Form notation to support the rendering of Unified Modeling Language (UML) Activity Diagrams as human-readable...
We consider an arbitrary mapping for , some number of quantum bits. Using calls to a classical oracle evaluating and an classical bit data store, it is possible...
Linda D. Crown, Tina Butcher, Steven E. Cook, L T. Sebring, R C. Suiter
Handbook 44 was first published in 1949, having been preceded by similar handbooks of various designations and in several forms. This 2008 edition was developed...
This paper reports work investigating resource allocation in a simulated grid compute economy where consumers and providers employ software components...
1. Table 23-2-(3.25030)-db ?o Pages db-2188.0 to db-2188.2 New table for 1-cyclopentyl-4-(3-cyclopentylpropyl)dodecane containing the density for the real fluid...
Robert N. Goldberg, Yadu D. Tewari, Talapady N. Bhat
This review serves to update previously published evaluations of equilibrium constants and enthalpy changes for enzyme catalyzed reactions. For each reaction...
This bulletin summarizes the guidance developed by NIST and published in NISTIR 7435 to help IT managers to make sense of data about the vulnerabilities of...
This brochure describes the programs of the Information Technology Laboratory (ITL). Following a letter from the ITL Director, ITL's nine programs are described...
The report summarized the discussions from a one-day planning workshop held at NIST to consider the basis for a new program on the mathematical foundations of...
A Bouras, Sudarsan Rachuri, Eswaran Subrahmanian, Jean-Philippe Legrange
Innovation is becoming more and more dependent on global networks of resources and skills. Research plays a critical role in the innovation process, providing a...
As cargo container security is a critical component in the U.S. homeland security, the communication among people in a chain of custody of a container needs to...
Miles C. Tracy, Wayne Jansen, Karen A. Scarfone, Theodore Winograd
Web servers are often the most targeted and attacked hosts on organizations' networks. As a result, it is essential to secure Web servers and the network...