Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 476 - 500 of 7106

Computer Security Division 2011 Annual Report

May 8, 2012
Author(s)
Patrick D. O'Reilly
… responsibilities under this law. The primary goal of the Computer Security Division (CSD), a component of NIST s … Federal Information Security Management Act, FISMA, Computer Security Division, CSD, Information Security … Computer Security Division 2011 Annual Report …

SFPE Engineering Task Group on Computer Model Evaluations: Status Report - DETACT

August 10, 1997
Author(s)
Daniel M. Madrzykowski
… to evaluate the scope, applications and limitations of computer models intended for use in the engienering … fire research, fire protection engineering, computer models, evaluation, fire safety, life safety … SFPE Engineering Task Group on Computer Model Evaluations: Status Report - DETACT …

Audit and Evaluation of Computer Security II: System Vulnerabilities and Controls

April 1, 1980
Author(s)
Zella G. Ruthberg
… Office, sponsored a second invitational workshop on computer security audit, entitled "Audit and Evaluation of Computer Security II: System Vulnerabilities and Controls," … 1978. A cross-section of highly qualified people In the computer science and EDP audit fields was assembled to …

Building one-time memories from isolated qubits

January 14, 2014
Author(s)
Yi-Kai Liu
One-time memories (OTM's) are a simple type of tamper-resistant cryptographic hardware, that can be used to implement many forms of secure computation, such as one-time programs. Here we investigate the possibility of building OTM's using "isolated qubits"

3rd High-Performance Computing Security Workshop: Joint NIST-NSF Workshop Report

September 26, 2023
Author(s)
Yang Guo, Jeremy Licata, Victoria Yan Pillitteri, Sanjay (Jay) Rekhi, Robert Beverly, Xin Yuan, Gary Key, Rickey Gregg, Stephen Bowman, Catherine Hinton, Albert Reuther, Ryan Adamson, Aron Warren, Purushotham Bangalore, Erik Deumens, Csilla Farkas
… High-performance computing (HPC) is a vital computational infrastructure for … high-performance computing (HPC), HPC security, HPC security posture, security … 3rd High-Performance Computing Security Workshop: Joint NIST-NSF Workshop Report …

Computer Forensics Guidance

November 1, 2001
Author(s)
G E. Fisher
… This ITL Bulletin describes two projects in the computer forensics arena and provides guidance on the use of … of crimes that involve computers. The second, the Computer Forensics Tool Testing (CFTT) project, describes … of specifications and test methods for testing automated computer forensics tools. …

Characterizing Positive Pressure Ventilation Using Computational Fluid Dynamics

February 1, 2003
Author(s)
Stephen Kerber, William D. Walton
… experiments are compared with simulations completed with computational fluid dynamic model, the Fire Dynamic Simulator … computational fluid dynamics, ventilation, mapping, velocity … Characterizing Positive Pressure Ventilation Using Computational Fluid Dynamics …

A fault-tolerant neutral-atom architecture for universal quantum computation

November 10, 2025
Author(s)
Dolev Bluvstein, Alexandra Geim, Sophie Li, Simon Evered, J. Pablo Bonilla Ataides, Gefen Baranes, Andi Gu, Tom Manovitz, Muqing Xu, Marcin Kalinowski, Shayan Majidy, Christian Kokail, Nishad Maskara, Elias C Trapp, Luke Stewart, Simon Hollerith, Hengyun Zhou, Michael Gullans, Susanne Yelin, Markus Greiner, Vladan Vuletic, Madelyn Cain, Mikhail Lukin
… neutral-atom architecture for universal quantum computation
Displaying 476 - 500 of 7106
Was this page helpful?