Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 126 - 150 of 204

An Authentication Framework for Web Access to Remote Hosts

January 1, 1999
Author(s)
R P. McCormack, J E. Koontz, J E. Devaney
An authentication framework is described that provides a secure means for clients to access remote computing resources via the Web. Clients authenticate themselves to a proxy Web server using a secure protocol and a digital certificate. The server

Automated Password Generator (APG)

October 5, 1993
Author(s)
National Institute of Standards and Technology (NIST), Charles Dinkel
… based on the Electronic Codebook mode of the Data Encryption Standard (DES) (FIPS PUB 46-1). The random number …

Privacy-Preserving DRM

April 13, 2010
Author(s)
Radia Perlman, Charles Kaufman, Ray Perlner
… and ability for the content provider to prevent sharing of encryption keys or authorization credentials. …

Securing Voice Over IP Networks

May 27, 2005
Author(s)
T J. Walsh, D. Richard Kuhn
… namely firewalls, Network Address Translation (NAT), and encryption, carry a hefty price when incorporated into a VOIP …

Guidelines on Electronic Mail Security

February 20, 2007
Author(s)
Miles C. Tracy, Wayne Jansen, Karen A. Scarfone, Jason Butterfield
… private networks. It contains information on popular email encryption standards and other standards relating to email. …

Trustworthy Email

February 25, 2019
Author(s)
Scott W. Rose, J. S. Nightingale, Simson Garfinkel, Ramaswamy Chandramouli
… Recommendations for email content security include the encryption and authentication of message content using S/MIME …

Computer Security: Selected Articles

April 1, 1991
Author(s)
Marianne M. Swanson, Elizabeth B. Lennon
… bibliography, encryption, Internet, local area network, risk analysis, …

IPRainbow

September 28, 2022
Author(s)
Ryann Cartor, Max Cartor, Mark Lewis, Daniel Smith-Tone
… perturbation modifier of [9] was originally designed with encryption in mind, the use of schemes with performance …
Displaying 126 - 150 of 204
Was this page helpful?