NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.
Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.
An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Scott W. Rose, Oliver Borchert, Stuart Mitchell, Sean Connelly
Zero trust (ZT) is the term for an evolving set of cybersecurity paradigms that move defenses from static, network- based perimeters to focus on users, assets
Jeffrey A. Jargon, Dylan F. Williams, Angela C. Stelson, Christian J. Long, Aaron M. Hagerstrom, Paul D. Hale, John R. Stoup, Eric S. Stanfield, Wei Ren
In this report, we document the models and dimensional traceability of our WR15 rectangular waveguide standards for performing multiline thru-reflect-line
We present a method to calculate dielectric and refractivity virial coefficients using the path-integral Monte Carlo formulation of quantum statistical
Roger V. Bostelman, YaShian Li-Baboud, Karl Van Wyk, Mili Shah
Exoskeletons are now being marketed by several manufacturers and yet there are currently no defined methods to measure the exoskeleton fit to the user. Proper
NIST Handbook 150 contains the general procedures and requirements under which NVLAP operates as an unbiased third-party accreditation body. This handbook
This manual describes the computer program CONTAM version 3.4, developed by NIST. CONTAM is a multizone indoor air quality and ventilation analysis program
Every day, in order to perform their jobs, workers exchange files over the Internet through email attachments, file sharing services, and other means. To help
Martin Herman, Michaela Iorga, Ahsen Michael Salim, Robert H Jackson, Mark R Hurst, Ross Leo, Richard Lee, Nancy M Landreville, Anand Kumar Mishra, Yien Wang, Rodrigo Sardinas
James Cline, Marcus Mendenhall, Joseph J. Ritter, David R. Black, Albert Henins, John E. Bonevich, Pamela S. Whitfield, James J. Filliben
This rather long-standing project has resulted in a National Institute of Standards and Technology (NIST) Standard Reference Material (SRM) for the analysis of
This document presents cloud access control characteristics and a set of general access control guidance for cloud service models: IaaS (Infrastructure as a
Thrombin, the proteolytic enzyme that catalyzes the transformation of soluble fibrinogen to the polymerized fibrin clot, participates in multiple reactions in
This document is a companion of NIST Special Publication 260-136 (2020 Edition), intended for users of NIST reference materials, that explains how NIST
A smart grid messaging framework is known as an Open Field Message Bus (OpenFMB, which was ratified by the North American Energy Standards Board (NAESB) in
System models and model-based engineering methods have the promise of transforming the way that industrial engineers interact with production and logistics
Ronald S. Lankone, Li Piin Sung, David G. Goodwin, Andrew Fairbrother
The Polymer Surface/Interface (PSI) consortium held a two-day workshop at the National Institute of Standards and Technology (NIST) in Gaithersburg, MD on
Ellen Voorhees, Nick Craswell, Bhaskar Mitra, Daniel Campos, Emine Yilmaz
The Deep Learning Track is a new track for TREC 2019, with the goal of studying ad hoc ranking in a large data regime. It is the first track with large human
Michael J. Hegetschweiler, John L. Pagliaro, Lukas Berger, Raik Hesse, Joachim Beeckmann, Heinz Pitsch, Gregory T. Linteris
The burning velocity of mixtures of the refrigerant R-32 (CH2F2) with air over a range of equivalence ratios are studied via spherically expanding flames SEFs
This is the first of a series of reports on the performance of face recognition algorithms on faces occluded by masks, run under the Ongoing Face Recognition
Emily H. Walpole, Erica D. Kuligowski, Lauren B. Cain, Alicea N. Fitzpatrick, Christin Salley
To gain insight into the emergency communication and evacuation decision-making surrounding the 2016 Chimney Tops 2 fire, NIST conducted (via a small business
Dustin Moody, Gorjan Alagic, Daniel C. Apon, David A. Cooper, Quynh H. Dang, John M. Kelsey, Yi-Kai Liu, Carl A. Miller, Rene C. Peralta, Ray A. Perlner, Angela Y. Robinson, Daniel C. Smith-Tone, Jacob Alperin-Sheriff
The National Institute of Standards and Technology is in the process of selecting one or more public-key cryptographic algorithms through a public, competition