An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Paul Watrobski, Murugiah Souppaya, Joshua Klosterman, William C. Barker, Jeffrey Marron, Blaine Mulugeta
This report describes an approach to capturing and documenting the network communication behavior of Internet of Things (IoT) devices. From this information...
Brian Lang, Thomas Vetter, John Molloy, Antonio Possolo
The 3180 series Standard Reference Materials (SRMs) are single anion solutions intended for use as primary calibration standards for the quantitative...
Juan Fung, Michael Hall, Jennifer Helgeson, Alden Dima, Anne Andrews, Jennifer Benkstein
This report presents the design and methodology of a survey conducted to evaluate the impact of changes to the organizational publication review policy at the...
Morphing of face photographs present a threat to identity processes; for example, two people being able to use one passport. The threat exists in applications...
This introductory guide provides small businesses with a high level overview of NIST Special Publication (SP) 800-171 Revision 3, Protecting Controlled...
Maria Dillard, Michael Gerst, Tiffany Cousins, Donghwan Gu
The National Institute of Standards and Technology (NIST) operates the Community Resilience Program (CRP) to help communities and stakeholders develop...
Joshua Bienfang, Thomas Gerrits, Paulina Kuo, Alan Migdall, Sergey Polyakov, Oliver Slattery
The intention of this dictionary is to define relevant terms and metrics used in the characterization of single-photon detectors and sources with the goal to...
David Temoshok, Yee-Yin Choong, Ryan Galluzzo, Marie LaSalle, Andrew Regenscheid, Diana Proud-Madruga, Sarbari Gupta, Naomi Lefkovitz
These guidelines cover identity proofing, authentication, and federation of users (such as employees, contractors, or private individuals) interacting with...
David Temoshok, Yee-Yin Choong, Ryan Galluzzo, Marie LaSalle, Andrew Regenscheid, Christine Abruzzi, James L. Fenton, Naomi Lefkovitz
This guideline focuses on identity proofing and enrollment for use in digital authentication. During the process of identity proofing, an applicant provides...
David Temoshok, Yee-Yin Choong, Andrew Regenscheid, Ryan Galluzzo, James L. Fenton, Justin Richer, Naomi Lefkovitz
This guideline focuses on the authentication of subjects who interact with government information systems over networks to establish that a given claimant is a...
Justin Richer, James L. Fenton, Naomi Lefkovitz, David Temoshok, Ryan Galluzzo, Andrew Regenscheid, Yee-Yin Choong
This guideline focuses on the use of federated identity and the use of assertions to implement identity federations. Federation allows a given credential...
NIST Handbook 150-3 presents the technical requirements and guidance for the accreditation of laboratories under the National Voluntary Laboratory Accreditation...
Elizabeth Benham, Kristen Dill, Dinelka Jagoda, Maryanne Amanze, Yoon Thwel
The metric system (International System of Units, SI) is easy to use and learn. The Metric System Estimation Game is a fun, hands-on activity that helps...
Alec Saville, Jake Benzing, Fan Zhang, Joseph Aroh, Jordan Weaver, Russell Evans, Nicholas Derimow, Samantha Webster, Nikolas Hrabe, Cassidy Allen, Newell Moser, May Martin, Jason Holm, Christin Aumayr, Tilman Seifert, Michael Hirtler
Supply chain challenges and health concerns have spurred the development of new Co-free, Cr-containing maraging steels with several new alloys already...
This work provides recommendations for best practices that enable simplified, cost-effective interference testing that incorporates relevant aspects of...
Lingnan Lin, Natascha Milesi-Ferretti, Glen Glaeser, Kyu Young Kim
Measurement and Uncertainty Analysis of Pressure Losses in a Push-to-Connect Elbow and Coupling The data on pressure losses in an elbow and a coupling are...
This report summarizes recent technical work of the Applied and Computational Mathematics Division of the Information Technology Laboratory at the National...
Tibor Furtenbacher, Allan Harvey, Attila G Császár
Based on the direct summation technique, improved ideal-gas partition functions and related thermochemical quantities are reported for the parent isotopologues...
John McGuire, David Sefcik, Katrice Lippa, Scott Dolan, Isabel Baucom
This guide was developed to provide retailers with information about the best practice requirements for the unit pricing of commodities. The guide consists of...
Community resilience planning often requires quantifying and understanding the trade-offs that communities make between the benefits and costs of different...
In this work, we propose a comprehensive framework to analyze threats related to semiconductor supply chain. The framework introduces a metric which quantifies...
Modern enterprise IT systems rely on a family of application programming interfaces (APIs) for integration to support organizational business processes. Hence...
Hariharan Iyer, Seungmin Seo, Lukas Diduch, Kay Peterson, George Awad, Yooyoung Lee
The 2024 NIST Generative AI (GenAI) Pilot Study focuses on evaluating text-to-text (T2T) generation and discrimination tasks to assess the capabilities and...
Community resilience refers to the concept of a community being able to prepare, respond, recover, and adapt to disruptions in a way that does not compromise...
Christopher Brown, Alexander Maranghides, Giovanni Di Cristina Torres, Diana Bailey, Lucy Fox, Eric Link, Selvarajah Ramesh, Monica Flores, Shonali Nazare, J. Houston Miller, Erin McCaughey
This report documents a series of full-scale fire experiments conducted at the National Institute of Standards and Technology (NIST) to characterize the...
Few software development life cycle (SDLC) models explicitly address software security in detail, so secure software development practices usually need to be...
Few software development life cycle (SDLC) models explicitly address software security in detail, so secure software development practices usually need to be...
Few software development life cycle (SDLC) models explicitly address software security in detail, so secure software development practices usually need to be...