Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

NIST Pubs

Guide to IPsec VPNs

Author(s)
Elaine B. Barker, Quynh H. Dang, Sheila E. Frankel, Karen Scarfone, Paul Wouters
Internet Protocol Security (IPsec) is a widely used network layer security control for protecting communications. IPsec is a framework of open standards for

NIST Privacy Framework: An Overview

Author(s)
Kaitlin R. Boeckl, Naomi B. Lefkovitz
This bulletin summarizes the information found in the voluntary NIST Privacy Framework: A Tool for Improving Privacy through Enterprise Risk Management (Version

STEP File Analyzer and Viewer User Guide (Update 6)

Author(s)
Robert Lipman, Soonjo Kwon
The STEP File Analyzer and Viewer opens a STEP (ISO 10303 - STandard for Exchange of Product model data) Part 21 file and (1) generates a spreadsheet or CSV

Analysis of Iris Images from Twins Day – 2010

Author(s)
James R. Matey, Patrick J. Grother, George W. Quinn
Each year since 1976, the town of Twinsburg, Ohio has held a Twins Day Festival. Over the past 43 years over $77,000$ sets of twins and multiples have attended

Securing Web Transactions TLS Server Certificate Management

Author(s)
Murugiah P. Souppaya, William A. Haag Jr., Mehwish Akram, William C. Barker, Rob Clatterbuck, Brandon Everhart, Brian Johnson, Alexandros Kapasouris, Dung Lam, Brett Pleasant, Mary Raguso, Susan Symington, Paul Turner, Clint Wilson, Donna F. Dodson
Transport Layer Security (TLS) server certificates are critical to the security of both internet- facing and private web services. Despite the critical

NVLAP Carpet and Carpet Cushion

Author(s)
Timothy W. Rasinski
NIST Handbook 150-6 specifies the technical requirements and provides guidance for the accreditation of laboratories under the NVLAP Carpet and Carpet Cushion

Recommendation for Cryptographic Key Generation

Author(s)
Elaine B. Barker, Allen L. Roginsky, Richard Davis
Cryptography is often used in an information technology security environment to protect data that is sensitive, has a high value, or is vulnerable to

Securing web transactions TLS server certificate management:

Author(s)
Mehwish Akram, William C Barker, Rob Clatterbuck, Donna Dodson, Brandon Everhart, Jane Gilbert, William Haag, Brian Johnson, Alexandros Kapasouris, Dung Lam, Brett Pleasant, Mary Raguso, Murugiah Souppaya, Susan Symington, Paul Turner, Clint Wilson

Guide to IPsec VPNs:

Author(s)
Elaine Barker, Quynh Dang, Sheila Frankel, Karen Scarfone, Paul Wouters
Was this page helpful?