Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

NIST Pubs

Standard Reference Data Workshop Report

Author(s)
Debra L. Kaiser, Neil Alderoty, Richard R. Cavanagh, Barbara Guttman, Robert J. Hanisch, Adam G. Morey, Jeanita Pritchett, Yuri Ralchenko, Stacy S. Schuur, William E. Wallace
On October 17, 2017, the ODI sponsored a day-long Standard Reference Data Workshop. More than 120 NIST staff members and associates from four NIST laboratories

Standard reference data workshop report:

Author(s)
Debra Kaiser, Neil Alderoty, Richard Cavanagh, Barbara Guttman, Robert Hanisch, Adam Morey, Jeanita Pritchett, Yuri Ralchenko, Stacy Schuur, William Wallace

Protecting Software Integrity Through Code Signing

Author(s)
David A. Cooper, Leonard Feldman, Gregory A. Witte
This bulletin summarizes the information found in the white paper Security Considerations for Code Signing, which describes features and architectural

Guide to Industrial Wireless Systems Deployments

Author(s)
Richard Candell, Mohamed T. Hany, Kang B. Lee, Yongkang Liu, Jeanne T. Quimby, Catherine A. Remley
This document is intended to be a practical guide used by engineers and managers facilitating them to go through the process of defining the objectives of their

Quick Start Guide for Populating Mobile Test Devices

Author(s)
Richard Ayers, Benjamin R. Livelsberger, Barbara Guttman
This guide provides procedures for documenting and populating various data elements typically found within the contents of a mobile device, e.g., mobile phone

Platform Firmware Resiliency Guidelines

Author(s)
Andrew R. Regenscheid
This document provides technical guidelines and recommendations supporting resiliency of platform firmware and data against potentially destructive attacks. The
Was this page helpful?