Skip to main content

NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.

Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.

U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 151 - 175 of 1482

Techniques for System and Data Recovery

April 1, 2002
Author(s)
William E. Burr, Joan Hash
… E. Burr , Joan Hash … ITL Bulletin - … authentication, backup, contingency, data availability, encryption, …

Strategies for Parallel Markup

July 12, 2015
Author(s)
Bruce R. Miller
… in Computer Science; Intelligent Computer Mathematics … Strategies for Parallel Markup …

Strategies for Concordance Testing

May 1, 2010
Author(s)
Carolyn R. Steffen, David L. Duewer, Margaret C. Kline, John M. Butler
… allele, primer sequences, short tandem repeat, STR kits … Strategies for Concordance Testing …

Data Communications Strategy

January 1, 1996
Author(s)
J Mulvenna, Frederick E. Boland Jr.
… Report (NISTIR) - 5793 … Data Communications Strategy

Data communications strategy:

January 1, 1996
Author(s)
Jerry Mulvenna, Tim Boland
… , Tim Boland … - NIST IR 5793 … Data communications strategy: …

Secure Web Servers: Protecting Web Sites That Are Accessed by the Public

January 31, 2008
Author(s)
Shirley M. Radack
This bulletin summarizes the contents of NIST Special Publication 800-44, Version 2, Guidelines on Securing Public Web Servers. The publication details the steps that organizations should take to plan, install, and maintain secure Web server software and

Textile Composites: Modeling Strategies

January 1, 2001
Author(s)
S V. Lomov, G Huysmans, Y Luo, Richard~undefined~undefined~undefined~undefined~undefined Parnas, A Prodromou, I Verpoest, Frederick R. Phelan Jr.
… molding, textile modeling … Textile Composites: Modeling Strategies

Textile Composites: Modelling Strategies

January 1, 2001
Author(s)
S V. Lomov, G Huysmans, Y Luo, Richard~undefined~undefined~undefined~undefined~undefined Parnas, A Prodromou, I Verpoest, Frederick R. Phelan Jr.
… molding, textile modeling … Textile Composites: Modelling Strategies

Uncertainty Quantification of Failure Probability and a Dynamic Risk Analysis of Decision Making for Maintenance of Ageing Infrastructure

January 2, 2019
Author(s)
Jeffrey T. Fong, James J. Filliben, Nathanael A. Heckert, Dennis D. Leber, Paul A. Berkman, Robert E. Chapman
Risk, as the product of failure probability and failure consequence, has been estimated and applied by engineers and managers to help make critical decisions on (a) maintenance of ageing plants, and (b) planning of new infrastructure. For ageing plants

Software Assurances Metrics and Tool Evaluation

October 1, 2005
Author(s)
Paul E. Black
The National Software Reference Library (NSRL) of the U.S. National Institute of Standards and Technology (NIST) collects software from various sources and publishes file profiles computed from this software (such as MD5 and SHA-1 hashes) as a Reference
Displaying 151 - 175 of 1482
Was this page helpful?