Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 101 - 125 of 1916

Roadmap to Strengthen the U.S. Manufacturing Supply Chain via Digital Thread Technology

October 15, 2024
Author(s)
Eric Holterman, Dennis Brandl, Benjamin Standfield, James Wilson, Nima Yazdanpanah, Jim Fritz, Michael Corsello, Barbara Boyan, John Hagwood, Charles Ditchendorf, William Sobel, Lorin Sodell, Lisa Fronczek
… and capacity of the US manufacturing supply chain through Digital Thread technology. Risks to supply chain resilience … capacity are mapped against envisioned capabilities for Digital Thread technology in 4 industry sectors. The sectors … Capacity, Causal Analytics, Code of Federal Regulations, Digital Supply Network, Digital Thread, Digital Twin, FAIR, …

Recommendation for Digital Signature Timeliness

September 23, 2009
Author(s)
Elaine B. Barker
… Establishing the time when a digital signature was generated is often a critical … of the time can be trusted. With the appropriate use of digital signature-based timestamps from a Trusted Timestamp … digital signatures, timeliness, timestamp, Trusted Timestamp … Recommendation for Digital Signature Timeliness …

Digital Images and Computer Modelling

July 1, 1999
Author(s)
Edward J. Garboczi, Dale P. Bentz, Nicos Martys
… This chapter describes how digital images of porous materials can be analyzed to give … and properties of the material, describes various ways 3-D digital-image-based models can be generated to help … building technology, cement, concrete, digital images, percolation, porous materials, stereology …

The TREC 2001 Video Track: Information Retrieval on Digital Video Information

September 16, 2002
Author(s)
Alan Smeaton, Paul D. Over, C Costello, Arjen P. Vries, D Doermann, A Hauptmann, M Rorvig, J R. Smith, W Lide
… techniques to support content-based access to archives of digital video information has recently started to receive … of approaches available for searching and browsing through digital video archives, that these approaches do work, are … for users. This has important implications in making digital libraries of video information attainable. …

A Federal Public Key Infrastructure With Multiple Digital Signature Algorithms

April 22, 1998
Author(s)
William E. Burr, William T. Polk
… Several digital algorithms are coming into general use. A certificate … discusses the interoperability issues where different digital signature algorithms are used in one Public Key … certification path, digital signature, digital signature algorithms, digital signature certificate, …

Digital Forensics at the National Institute of Standards and Technology

April 9, 2008
Author(s)
James R. Lyle, Douglas R. White, Richard P. Ayers
… There are three digital forensic science projects: National Software … Data Sets (CFReDS) currently providing resources for the digital investigator underway at the National Institute of … also providing resources to accomplish these goals. The ¿Digital Forensic at the National Institute of Standards and …

Digital Forensics at the National Institute of Standards and Technology

April 1, 2008
Author(s)
James R. Lyle, Douglas R. White, Richard Ayers
… There are three digital forensic science projects: National Software … Data Sets (CFReDS) currently providing resources for the digital investigator underway at the National Institute of … also providing resources to accomplish these goals. The Digital Forensic at the National Institute of Standards and …

Standardization of File Recovery Classification and Authentication

December 1, 2019
Author(s)
Eoghan Casey, Alexander J. Nelson, Jessica Hyde
Digital forensics can no longer tolerate software that cannot … testers to make educated guesses and assumptions about how digital forensic tools work. This informal approach results … decisions, which can have serious consequences in a digital forensic context. To address this problem, this work …

Digital Signature Standard (DSS)

February 2, 2023
Author(s)
National Institute of Standards and Technology (NIST), Lily Chen, Dustin Moody, Andrew Regenscheid, Angela Robinson
… a suite of algorithms that can be used to generate a digital signature. Digital signatures are used to detect unauthorized … In addition, the recipient of signed data can use a digital signature as evidence in demonstrating to a third … computer security, cryptography, digital signatures, Federal Information Processing Standards, …

Towards an all-digital time scale

July 31, 2011
Author(s)
Stefania Romisch, Steven R. Jefferts, Thomas E. Parker
… The implementation of an all-digital time scale is under way at NIST, using a novel 8-channel, all-digital phase measurement system based on subsampling … will then be input to the algorithm used to generate the digital time scale. The subsampling technique allows the …

Dynamic Error Correction of a Digitizer for Time Domain Metrology

February 1, 2003
Author(s)
David I. Bergman
… A method for numerical correction of distortion in a digitizer used for metrology applications is described. Investigation of the digitizer's error behavior in the phase plane leads to the … development of an analytic error model that describes the digitizer's distortion behavior. Of particular significance …

Digital Signature Standard (DSS)

July 19, 2013
Author(s)
National Institute of Standards and Technology (NIST), Elaine Barker
… a suite of algorithms that can be used to generate a digital signature. Digital signatures are used to detect unauthorized … In addition, the recipient of signed data can use a digital signature as evidence in demonstrating to a third … computer security, cryptography, digital signatures, Federal Information Processing Standards, …

Report of the Digital Evidence Task Group Quality Study

December 15, 2022
Author(s)
Barbara Guttman, Kelly Sauerwein, James R. Lyle
… of Scientific Area Committees (OSAC) for Forensic Science Digital Evidence Subcommittee to identify the quality … and management systems that are most effective within digital forensics labs. Contemporary quality management … and interviews with lab management, senior staff, and digital evidence customers (e.g., law enforcement (LE), …

Eval-Ware: Digital Video Retrieval

September 20, 2006
Author(s)
Paul D. Over, Alan Smeaton
… resources of interest connection with evaluation of digital video retrieval systems. … digital video retrieval, evaluation, Internet, world wide … Eval-Ware: Digital Video Retrieval …

Reference architecture to integrate heterogeneous manufacturing systems for the digital thread

May 22, 2017
Author(s)
Moneer M. Helu, Thomas D. Hedberg, Allison Barnard Feeney
… The increasing growth of digital technologies in manufacturing has provided industry … productivity and operations. One such opportunity is the digital thread, which links product lifecycle systems so that … design and manufacturing processes. The development of the digital thread has been challenged by the inherent difficulty …

Digital Signature Standard (DSS)

January 27, 2000
Author(s)
National Institute of Standards and Technology (NIST), Elaine Barker
… a suite of algorithms which can be used to generate a digital signature. Digital signatures are used to detect unauthorized … In addition, the recipient of signed data can use a digital signature in proving to a third party that the … ADP security, computer security, digital signatures, public-key cryptography, Federal …

Digital Investigation Techniques: A NIST Scientific Foundation Review

November 21, 2022
Author(s)
James R. Lyle, Barbara Guttman, John Butler, Kelly Sauerwein, Christina Reed, Corrine Lloyd
… document is an assessment of the scientific foundations of digital forensics. We examined descriptions of digital investigation techniques from peer-reviewed sources, … organizations, and independently published sources. Digital investigation techniques are based on established …

Digital Identity Guidelines

June 22, 2017
Author(s)
Paul A. Grassi, Michael E. Garcia, James L. Fenton
… technical requirements for federal agencies implementing digital identity services and are not intended to constrain … authenticator, assertions, credential service provider, digital authentication, digital credentials, identity proofing, federation, … Digital Identity Guidelines …

Digital Signature Standard (DSS)

December 15, 1998
Author(s)
Elaine B. Barker
… a suite of algorithms which can be used to generate a digital signature. Digital signatures are used to detect unauthorized … In addition, the recipient of signed data can use a digital signature in proving to a third party that the … ADP security, computer security, digital signatures, public-key cryptography, Federal …

Narratives of sustainability in digital media: An observatory for digital narratives

August 8, 2022
Author(s)
Jennifer Helgeson, Pierre Glynn, Ilan Chabay
… for humanity. We propose the collection and analysis of digital narratives (DNs) to observe and assess significant … pathways to sustainable futures. We propose forming a Digital Observatory of Narratives of Sustainability (DONS) as … Digital narrativesSustainable development goalsShared …

Gray Calibration of Digital Cameras to Meet NIST Mugshot Best Practice

June 1, 1999
Author(s)
M Rubinfeld, Charles L. Wilson
… as possible. The goal of this experiment is to show how digital camera images can be calibrated to meet the NIST Best … to determine the best methodology for calibrating digital cameras for rendering gray images as close to the … clothing had on the rendered gray background for each digital camera used in the experiment. Results for three …

Digital Manufacturing Certificate Toolkit: Adding Trust and Traceability to Product Data

November 29, 2016
Author(s)
Sylvere I. Krima, Thomas D. Hedberg
… The NIST Digital Manufacturing Certificate (DMC) Toolkit is a toolkit designed specifically to provide certification -- digital signature using software and hardware certificates, … is available in an article titled, "Embedding X.509 Digital Certificates in Three-Dimensional Models for …
Displaying 101 - 125 of 1916
Was this page helpful?