Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 6551 - 6575 of 9858

Digital Signature Standard (DSS)

February 2, 2023
Author(s)
National Institute of Standards and Technology (NIST), Lily Chen, Dustin Moody, Andrew Regenscheid, Angela Robinson
This standard specifies a suite of algorithms that can be used to generate a digital signature. Digital signatures are used to detect unauthorized modifications to data and to authenticate the identity of the signatory. In addition, the recipient of signed

A method for pole figure measurements via a dynamic segmented spiral scheme

February 1, 2023
Author(s)
Surya Chandramouleeswaran, Adam Creuziger, Kip Findley
A new method for pole figure measurement is described, titled a dynamic segmented spiral scheme. Compared to schemes currently in use, the dynamically segmented spiral scheme was shown to have advantages in term of evenness of pole figure coverage, time

Automatic Volumetric Segmentation of Additive Manufacturing Defects with 3D U-Net

March 23, 2020
Author(s)
Vivian W. Wong, Max Ferguson, Kincho Law, Yung-Tsun Lee, Paul Witherell
Segmentation of defects in additive manufacturing is challenging, due to the poor contrast, small sizes and variation in appearance of defects. Automatic segmentation can however provide quality control for additive manufacturing. Over recent years, 3D

An Introduction to Information Security

June 22, 2017
Author(s)
Michael Nieles, Kelley L. Dempsey, Victoria Y. Pillitteri
Organizations rely heavily on the use of information technology (IT) products and services to run their day-to-day activities. Ensuring the security of these products and services is of the utmost importance for the success of the organization. This

Design of MEMS vision tracking system based on a micro fiducial marker

August 31, 2015
Author(s)
Yong Sik Kim, Yang Seung Ho, KwangWoong Yang, Nicholas Dagalakis
In this study, a MEMS-based vision tracking system is developed based on micro fiducial markers. The vision tracking system recognizes the predetermined patterns of the micro-scale fiducial markers and calculates the position and rotation of the MEMS

Virtual Cement and Concrete Testing Laboratory: Version 9.5 User Guide

May 29, 2014
Author(s)
Jeffrey W. Bullard
This document serves as the user’s guide for the Virtual Cement and Concrete Testing Laboratory (VCCTL) software, version 9.5. Using the VCCTL software, a user may create 3D microstructures of cement paste made with clinker, calcium sulfate, fly ash, slag

Study of Accuracy of Parts Produced Using Additive Manufacturing

April 16, 2014
Author(s)
Marcin Bauza, Shawn P. Moylan, Robert Panas, Stephen Burke, Harry Martz, John S. Taylor, Paul Alexander, Richard Knebel
The purpose of this presentation is to focus discussion onto the issue of accuracy and uncertainty of parts made with additive manufacturing processes.

Digital Signature Standard (DSS)

July 19, 2013
Author(s)
National Institute of Standards and Technology (NIST), Elaine Barker
This Standard specifies a suite of algorithms that can be used to generate a digital signature. Digital signatures are used to detect unauthorized modifications to data and to authenticate the identity of the signatory. In addition, the recipient of signed

Radiation-Based Quantitative Bioimaging at NIST

August 1, 2009
Author(s)
Lisa R. Karam
The National Institute of Standards and Technology (NIST) provides the physical measurements and standards in a variety of fields, including for ionizing radiation, for the US. Building on a long history of providing standards for medical x rays and

GSM Mobile Device and Associated Media Tool Specification

January 6, 2009
Author(s)
Richard Ayers
Mobile devices incorporating cellular capabilities are ubiquitous and contain a wealth of personal information useful in criminal cases, civil disputes, employment proceedings, and recreation of incidents. Due to the rapid rate of mobile devices appearing

The Keyed-Hash Message Authentication Code (HMAC)

July 16, 2008
Author(s)
National Institute of Standards and Technology (NIST), Quynh Dang
This Standard describes a keyed-hash message authentication code (HMAC), a mechanism for message authentication using cryptographic hash functions. HMAC can be used with any iterative Approved cryptographic hash function, in combination with a shared
Displaying 6551 - 6575 of 9858
Was this page helpful?