An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
National Institute of Standards and Technology (NIST), Hildegard Ferraiolo, David Cooper, Salvatore Francomacaro, Ketan Mehta, Annie W. Sokol
[Superseded by FIPS 201-3 (January 2022) https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=934136] This Standard specifies the architecture and technical requirements for a common identification standard for Federal employees and contractors. The
In this paper we derive an analytical expression for the mean load at each node of an arbitrary undirected graph for the uniform multicommodity flow problem under random walk routing. We show the mean load is linearly dependent on the nodal degree with a
William E. Burr, Donna F. Dodson, Elaine M. Newton, Ray A. Perlner, William T. Polk, Sarbari Gupta, Emad A. Nabbus
This recommendation provides technical guidelines for Federal agencies implementing electronic authentication and is not intended to constrain the development or use of standards outside of this purpose. The recommendation covers remote authentication of
John M. Libert, Shahram Orandi, Michael D. Garris, John D. Grantham
As part of NISTs investigative efforts to support development of the FBI Next Generation Identification (NGI) systems, this investigation evaluates effects on image fidelity of wavelet transform decomposition and quality layer options for JPEG 2000
There are now a series of published works related to Differential Fault Attack (DFA) on the Grain family, but most of them require quite a large number (hundreds) of faults (around $n \ln n$, where $n = 80$ for Grain v1 and $n = 128$ for Grain-128, Grain
This ITL Bulletin summarizes a new ITL publication, NIST Special Publication 800- 83 Revision 1,Guide to Malware Incident Prevention and Handling for Desktops and Laptops,which gives receommendations for organizations to improve their malware incident
ACT-Touch is a set of manual motor request extensions for ACT-R 6 (Adaptive Control of Thought-Rational, hereafter, ACT-R) . These manual request extensions constitute theoretical claims predicting motor preparation and execution times for certain manual
Ian M. Soboroff, Iadh Ounis, Craig Macdonald, Jimmy Lin
The Microblog track examines search tasks and evaluation methodologies for information seeking behaviors in microblogging environments such as Twitter. It was first introduced in 2011, addressing a real-time adhoc search task, whereby the user wishes to
Brian A. Weiss, Lisa J. Fronczek, Emile L. Morse, Zeid Kootbally, Craig I. Schlenoff
Transformative Apps (TransApps) is a DARPA-funded program whose goal is to develop a range of militarily-relevant software applications ("apps") to enhance the operational-effectiveness of military personnel on (and off) the battlefield. TransApps is also
NIST has been at the forefront of information technology in its application to biometrics for almost 50 years. Early work revolved around developing hardware and software to perform automated analysis of fingerprint images and development of voice
We present a modulated microwave approach for quantum computing with qubits comprising three spins in a triple quantum dot. This approach includes single- and two-qubit gates that are protected against low-frequency electrical noise, due to an operating
Non-rigid and partial 3D model retrieval are two significant and challenging research directions in the field of 3D model retrieval. Little work has been done in proposing a hybrid shape descriptor that works for both retrieval scenarios, let alone the
Non-rigid and partial 3D model retrieval are two significant and challenging research directions in the field of 3D model retrieval. Little work has been done in proposing a hybrid shape descriptor that works for both retrieval scenarios, let alone the
Understanding distribution of congestion in the Internet is a long-standing problem. Using data from the SamKnows US broadband access network measurement study, commissioned by the FCC, we explore patterns of congestion distribution in DSL and cable
Kristen Greene, Ross J. Micheals, Franklin Tamborello
As technology continues to evolve, so too must our modeling and simulation techniques. While formal engineering models of cognitive and perceptual-motor processes are well-developed and extensively validated in the traditional desktop computing environment
Many image processing problems are naturally expressed as energy minimization or shape optimization problems, in which the free variable is a shape, such as a curve in 2d or a surface in 3d. Examples are image segmentation, multiview stereo reconstruction
National Institute of Standards and Technology (NIST), Elaine Barker
This Standard specifies a suite of algorithms that can be used to generate a digital signature. Digital signatures are used to detect unauthorized modifications to data and to authenticate the identity of the signatory. In addition, the recipient of signed
This ITL Bulletin announces the publication of NIST Special Publication 800-124 Revision 1, Guidelines for Managing the Security of Movile Devices in the Enterprise. The revised guidelines will assist organizations in managing the security of mobile
Capturing business rules in a formal logic representation supports the enterprise in two important ways: it enables the evaluation of logs and audit records for conformance to, or violation of, the rules; and it enables the conforming automation of some
Advances in mobile touchscreen computing offer new opportunities to test traditional cognitive architectures and modeling tools in a novel task domain. ACT-Touch, an extension of the ACT-R 6 (Adaptive Control of Thought- Rational) cognitive architecture
Patrick J. Grother, James R. Matey, Elham Tabassi, George W. Quinn, Michael Chumakov
Background: Stability is a required definitional property for a biometric to be useful. Quantitative statements of stability are operationally important as they dictate re-enrollment schedules e.g. of a face on a passport. Ophthalmologists consider the
It is well-known that deciding equivalence of logic circuits is a coNP-complete problem. As a corollary, the problem of deciding weak equivalence of reversible circuits, i.e. ignoring the ancilla bits, is also coNP-complete. The complexity of deciding
The TREC Medical Records track fosters research that allows electronic health records to be retrieved based on the semantic content of free-text fields. The ability to find records by matching semantic content will enhance clinical care and support the
The Smart Grid Interoperability Panel (SGIP) was established by NIST to facilitate execution of tasks under the Energy Independence and Security Act (EISA) of 2007. The Priority Action Plan 15 (PAP 15 ) working group of the SGIP was established in 2009 to