NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.
Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.
An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Tina G. Butcher, Linda D. Crown, Richard A. Harshman, David Sefcik, Lisa Warfield
The 101st Annual Meeting of the National of the National Conference on Weights and Measures (NCWM) was held July 24-28, 2016, at the Grand Hyatt Denver Hotel
Access control systems are among the most critical of computer security components. Faulty policies, misconfigurations, or flaws in software implementations can
We present a software package aimed at simulating photon-number probability distributions of a range of naturally occurring classical and non-classical states
Edward R. Griffor, Christopher Greer, David A. Wollman, Martin J. Burns
Cyber-Physical Systems (CPS) comprise interacting digital, analog, physical, and human components engineered for function through integrated physics and logic
Edward R. Griffor, Christopher Greer, David A. Wollman, Martin J. Burns
Cyber-Physical Systems (CPS) comprise interacting digital, analog, physical, and human components engineered for function through integrated physics and logic
Michael Nieles, Kelley L. Dempsey, Victoria Y. Pillitteri
Organizations rely heavily on the use of information technology (IT) products and services to run their day-to-day activities. Ensuring the security of these
Paul A. Grassi, James L. Fenton, Naomi B. Lefkovitz, Jamie M. Danker, Yee-Yin Choong, Kristen Greene, Mary F. Theofanos
These guidelines provide technical requirements for federal agencies implementing digital identity services and are not intended to constrain the development or
Paul A. Grassi, Elaine M. Newton, Ray A. Perlner, Andrew R. Regenscheid, William E. Burr, Justin P. Richer, Naomi B. Lefkovitz, Jamie M. Danker, Yee-Yin Choong, Kristen Greene, Mary F. Theofanos
These guidelines provide technical requirements for federal agencies implementing digital identity services and are not intended to constrain the development or
Paul A. Grassi, Michael E. Garcia, James L. Fenton
These guidelines provide technical requirements for federal agencies implementing digital identity services and are not intended to constrain the development or
Paul A. Grassi, Ellen M. Nadeau, Justin P. Richer, Sarah K. Squire, James L. Fenton, Naomi Lefkovitz, Jamie M. Danker, Yee-Yin Choong, Kristen K. Greene
This document and its companion documents, SP 800-63, SP 800-63A, and SP 800-63B, provide technical and procedural guidelines to agencies for the implementation
This bulletin summarizes the information in NISTIR 8114: Report on Lightweight Cryptography which provides an overview of the lightweight cryptography project
Robert D. Chirico, Andrei F. Kazakov, Ala Bazyleva, Vladimir Diky, Kenneth Kroenlein, Vladimir N. Emel'yanenko, Sergey P. Verevkin
Thermodynamic properties of the twelve monohalobenzoic acids are critically evaluated through application of computational chemistry methods for the ideal-gas
Partial ionization cross sections are the absolute yields of specific ions from an electron- molecule collision. They are necessary for modeling plasmas and for
Catherine C. Cooksey, David W. Allen, Benjamin K. Tsai
This data set contains 100 reference reflectance spectra of human skin, spanning the wavelength region from 250 nm to 2500 nm. The spectra were acquired with a
Alden A. Dima, Kenneth G. Kroenlein, Sharief S. Youssef, Yuanyuan Feng
The goal of this work is to explore the feasibility of using open-source-based document classification techniques using features generated via topic modeling on
The NISTIR 8011 volumes focus on each individual information security capability, adding tangible detail to the more general overview given in NISTIR 8011
This volume introduces concepts to support automated assessment of most of the security controls in NIST Special Publication (SP) 800-53. Referencing SP 800-53A