Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 3051 - 3075 of 9852

Trust-Based Multi-Agent Filtering for Increased Smart Grid Security

August 22, 2011
Author(s)
Ion Matei, John S. Baras, Vijay Srinivasan
… electrical grid is done by a network of agents with both computing and communication capabilities. We propose a … in addition to taking measurements, the agents are also computing local estimates based on their own measurements and … smart grid, electric system, digital computing, Supervisory Control and Data Acquisition (SCADA), …

Rainbow Band Separation is Better than we Thought

June 10, 2020
Author(s)
Daniel Smith-Tone, Ray Perlner
… of Standards and Technology (NIST) is engaged in a post- quantum standardization effort, analyzing numerous candidate … to provide security against the advancing threat of quantum computers. Among the candidates in the second round …

Comparison of Models for Heat Transfer in High-Density Fibrous Insulation

May 13, 2019
Author(s)
Sergio A. Carvajal, Edward Garboczi, Robert R. Zarr
This paper evaluates different models for calculating the effective thermal conductivity of fibrous insulation by comparing predicted values with certified values of Standard Reference Material 1450c, Fibrous Glass Board. The fiber diameter distribution

Guideline for the Use of Advanced Authentication Technology Alternatives

September 28, 1994
Author(s)
National Institute of Standards and Technology (NIST), James F. Dray Jr.
[Withdrawn October 19, 2015] This Guideline describes the primary alternative methods for verifying the identities of computer system users, and provides recommendations to Federal agencies and departments for the acquisition and use of technology which

Quantifying Network Topology Robustness Under Budget Constraints

June 24, 2013
Author(s)
Assane Gueye, Aron Lazska
To design robust network topologies that resist strategic attacks, one must first be able to quantify robustness. In a recent line of research, the theory of network blocking games has been used to derive robustness metrics for topologies. A network

Resilience and System Level Security

December 20, 2016
Author(s)
Mark L. Badger
One approach for reducing damage caused by software vulnerabilities is to take advantage of emerging systems architecture patterns to strategically improve assurance. Emerging systems architectures embody significant choices about where computation takes

Artificial Molecules

January 1, 2002
Author(s)
W Jaskolski, Garnett W. Bryant, J Planelles, M Zielinski
… International Journal of Quantum Chemistry …

Optical Frequency Standards and Measurements

January 1, 2002
Author(s)
Leo W. Hollberg, Christopher W. Oates, E A. Curtis, Eugene N. Ivanov, Scott A. Diddams, T Udem, Hugh Robinson, James C. Bergquist, Wayne M. Itano, Robert E. Drullinger, David J. Wineland
… IEEE Journal of Quantum Electronics …
Displaying 3051 - 3075 of 9852
Was this page helpful?