An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Mobile applications have become an integral part in the mission of the federal government and public safety. There exist many techniques that seek to assure...
Richard Candell, Mohamed T. Hany, Kang B. Lee, Yongkang Liu, Jeanne T. Quimby, Catherine A. Remley
This document is intended to be a practical guide used by engineers and managers facilitating them to go through the process of defining the objectives of their...
Jeanice M. Brown Thomas, David L. Duewer, Margaret C. Kline, Willie May, Emil Schonberger
From 1984 to 2017, the National Institute of Standards and Technology coordinated the Micronutrients Measurement Quality Assurance Program (MMQAP) for...
Additive manufacturing (AM) is a revolutionary manufacturing technique, which is expected to reshape the future manufacturing industries. While various...
Akobuije D. Chijioke, Nicholas A. Vlajic, Enrico Lucon, Edward C. Mulhern
In this Technical Note, we report on investigations toward an SI-traceable dynamic calibration of instrumented Charpy strikers, performed at NIST from January...
Richard Ayers, Benjamin R. Livelsberger, Barbara Guttman
This guide provides procedures for documenting and populating various data elements typically found within the contents of a mobile device, e.g., mobile phone...
The set of software metrics introduced by Maurice H. Halstead in the 1970's has seen much scrutiny and not infrequent criticism. This article takes a fresh look...
This document provides technical guidelines and recommendations supporting resiliency of platform firmware and data against potentially destructive attacks. The...
Michael A. Boss, Andrew M. Dienstfrey, Zydrunas Gimbutas, Kathryn E. Keenan, Jolene D. Splett, Karl F. Stupic, Stephen E. Russek
This document describes the calibration service to measure proton spin relaxation times, T1 and T2, of materials used in phantoms (calibration artifacts) to...
Gregory P. Fiumara, Elham Tabassi, Patricia A. Flanagan, John D. Grantham, Kenneth Ko, Karen Marshall, Matthew Schwarz, Bryan Woodgate, Christopher Boehnen
In September 2017, the Intelligence Advanced Research Projects Activity held a fingerprint data collection as part of the Nail to Nail Fingerprint Challenge...
Refrigerant working fluids have been predicted to be large contributors to the increase in radiative forcing of the earth. Consequently, existing compounds will...
The National Institute of Standards and Technology coordinated an interlaboratory study for laboratories that use photoacoustic spectroscopy to measure and...
The manufacturing atmosphere is continually changing with new technologies and standards being swiftly developed. Firms create competitive advantages using...
This bulletin summarizes the information found in NIST SP 1800-6: Domain Name System-Based Electronic Mail Security, which describes a security platform for...
New software, in the form of Microsoft Excel 2016 spreadsheets, has been created for the analysis and qualification of Charpy Verification Lots, to be used by...
Frederic J. de Vaulx, Eric D. Simmon, Robert B. Bohn
With cloud computing in the mainstream, there is a preponderance of cloud based services in the market and the choices for consumers increase daily. However...
Melanie Cook, Dragos Prisaca, Stephen D. Quinn, David A. Waltermire
This report defines the requirements and associated test procedures necessary for products or modules to achieve one or more Security Content Automation...
The Homeland Security Presidential Directive HSPD-12 called for new standards to be adopted governing the interoperable use of identity credentials to allow...
George W. Quinn, James R. Matey, Patrick J. Grother
Iris Exchange (IREX) IX is an evaluation of automated iris recognition algorithms. The first part of the evaluation is a performance test of both verification...
The Software Assurance Reference Dataset (SARD) is a growing collection of over 170 000 programs with precisely located bugs. The programs are in C, C++, Java...
This Recommendation specifies techniques for the derivation of keying material from a shared secret established during a key-establishment scheme defined in...
Elaine B. Barker, Lidong Chen, Allen L. Roginsky, Apostol T. Vassilev, Richard Davis
This Recommendation specifies key-establishment schemes based on the discrete logarithm problem over finite fields and elliptic curves, including several...