NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.
Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.
An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Ramaswamy Chandramouli, Larry Feldman, Gregory A. Witte
This bulletin summarizes the information presented in NIST Special Publication (SP) 800-125B, "Secure Virtual Network Configuration for Virtual Machine (VM)
A procedure will be described to assign to each dyed microsphere a number called the Equivalent number of Reference Fluorophores (ERF). The ERF unit gives the
The Association of Public-Safety Communications (APCO), in cooperation with FirstNet and the Department of Commerce held a half-day workshop on June 2, 2015
Hildegard Ferraiolo, Ramaswamy Chandramouli, Ketan L. Mehta, Jason Mohler, Stephen Skordinski, Steven Brady
This document provides a common XML-based data representation of a chain-of-trust record to facilitate the exchange of PIV Card enrollment data. The exchanged
This report presents local convective boiling measurements in a micro-fin tube for three low global warming potential (GWP ) refrigerants: R448A, R449A, and
David R. Kuhn, Raghu N. Kacker, Larry Feldman, Gregory A. Witte
This bulletin focuses on NIST's combinatorial testing work. Combinatorial testing is a proven method for more effective software testing at lower cost. The key
Fractography is a powerful tool for the analysis of fractured glasses and ceramics. It is applicable to fractures created under controlled conditions in the
Nicholas A. Vlajic, Akobuije D. Chijioke, Ricky L. Seifarth
Structural analysis of conical contact joints in the NIST 4.45 MN Dead Weight Machine using finite element analysis is presented in this paper. This analysis
In a model of network communication based on a random walk in an undirected graph, what subset of nodes (subject to constraints on its size), enable the fastest
John L. Michaloski, Thomas D. Hedberg, Hui-Min Huang, Thomas R. Kramer
The goal of this paper is to understand how quality information characterizing the manufactured parts can be reported in a XML standardized format. The Quality
Anthony P. Hamins, Thomas G. Cleary, Matthew F. Bundy
Elimination of particulate from fire exhaust streams is a common issue for fire labs. Two series of fire experiments were conducted in the National Fire
This report summarizes recent technical work of the Applied and Computational Sciences Division of the Information Technology Laboratory at the National
Lidong Chen, Stephen P. Jordan, Yi-Kai Liu, Dustin Moody, Rene C. Peralta, Ray A. Perlner, Daniel C. Smith-Tone
In recent years, there has been a substantial amount of research on quantum computers - machines that exploit quantum mechanical phenomena to solve mathematical
This guide describes how to use the STEP File Analyzer, a software tool that analyzes and generates a spreadsheet from a STEP (STandard for the Exchange of
This guide describes how to use Baseline Tailor, a software tool for navigating the United States Government's Cybersecurity Framework and for tailoring the
Kristen K. Greene, John M. Kelsey, Joshua M. Franklin
Password entry on mobile devices significantly impacts both usability and security, but there is a lack of usable security research in this area, specifically
David A. Waltermire, Brant Cheikes, Larry Feldman, Gregory A. Witte
This report provides an overview of the capabilities and usage of software identification (SWID) tags as part of a comprehensive software lifecycle. As