Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 3176 - 3200 of 5423

Digital Repository of Mathematical Formulae

October 17, 2014
Author(s)
Howard S. Cohl, Marjorie A. McClain, Bonita V. Saunders, Moritz Schubotz, Janelle Williams
The purpose of the NIST Digital Repository of Mathematical Formulae (DRMF) is to create a digital compendium of mathematical formulae for orthogonal polynomials and special functions (OPSF) and of associated mathematical data. The DRMF addresses needs of

Consumer Use of Dishwashers, Clothes Washers, and Dryers: Data Needs and Availability

March 21, 2011
Author(s)
Christopher Iglehart, Natascha S. Milesi-Ferretti, Michael Galler
NIST provides technical support to the DOE in developing test procedures for a variety of residential appliances. As part of this process, DOE seeks representative consumer use data to establish test procedures that are representative of real world use

A More General Type A Evaluation

September 9, 2010
Author(s)
Ruediger Kessel, Raghu N. Kacker, Klaus-Dieter Sommer
The evaluation of uncertainty according to the Guide to the Expression of Uncertainty in measurement is the internationally agreed procedure to evaluate the complete result statement in measurement including measurement uncertainty. It distinguishes two

NEW Scanning Electron Microscope Magnification Calibration Reference Material (RM) 8820

August 19, 2010
Author(s)
Michael T. Postek, Andras Vladar, William J. Keery, Michael Bishop, Benjamin Bunday, John Allgair
Reference Material 8820 (RM 8820) is a new scanning electron microscope calibration reference material for nanotechnology and nanomanufacturingtion recently released by NIST. This standard was developed to be used primarily for X and Y scale (or

Sigma Ballots

July 21, 2010
Author(s)
Stefan Popoveniuc, Andrew Regenscheid
We present Sigma ballots, a new type of ballot to be used in secure elections. Sigma ballots use the random order of candidates introduced by Pret a Voter, combined with the confirmation codes of Scantegrity II. These ballots can be produces by a DRE

Bluetooth Security: Protecting Wireless Networks and Devices

November 20, 2008
Author(s)
Shirley M. Radack
This bulletin summarizes information disseminated in NIST Special Publication (SP) 800-121, Guide to Bluetooth Security: Recommendations of the National Institute of Standards and Technology, which was written by Karen Scarfone of NIST and by John Padgette

Handling Computer Security Incidents: NIST Issues Updated Guidelines

March 27, 2008
Author(s)
Shirley M. Radack
This bulletin summarizes information disseminated in revised NIST Special Publication (SP) 800-61-1, Computer Security Incident Handling Guide: Recommendations of the National Institute of Standards and Technology. Written by Karen Scarfone and Tim Grance

Common Vulnerability Scoring System

December 29, 2006
Author(s)
Peter M. Mell, Karen Kent Scarfone, Sasha Romanosky
Organizations struggle to assess the relative importance of software vulnerabilities across disparate hardware and software platforms. They must prioritize vulnerabilities and remediate those that pose the greatest risk. However, most software vendors and

Assessment of Access Control Systems

September 29, 2006
Author(s)
Chung Tong Hu, David F. Ferraiolo, David R. Kuhn
Access control is perhaps the most basic aspect of computer security. Nearly all applications that deal with financial, privacy, safety, or defense include some form of access control. In many systems access control takes the form of a simple password

Digital Library Support for Engineering Design and Manufacturing

September 1, 1999
Author(s)
William Regli
This paper describes our initial efforts to deploy a digital library to support engineering design and manufacturing. This experimental testbed, The Engineeting Design Repository, is an effort to collect and archive public domain engineering data for use

NIST CSWP 37A Automation of the NIST Cryptographic Module Validation Program

March 16, 2026
Author(s)
Christopher Celi, Alexander Calis, Murugiah Souppaya, William Barker, Karen Kent, Raoul Gabiam, Stephan Mueller, Yi Mao, Barry Fussell, Andrew Karcher, Douglas Boldt
The Cryptographic Module Validation Program (CMVP) validates third-party assertions that cryptographic module implementations satisfy the requirements of Federal Information Processing Standards (FIPS) Publication 140-3, Security Requirements for

3rd High-Performance Computing Security Workshop: Joint NIST-NSF Workshop Report

September 26, 2023
Author(s)
Yang Guo, Jeremy Licata, Victoria Yan Pillitteri, Sanjay (Jay) Rekhi, Robert Beverly, Xin Yuan, Gary Key, Rickey Gregg, Stephen Bowman, Catherine Hinton, Albert Reuther, Ryan Adamson, Aron Warren, Purushotham Bangalore, Erik Deumens, Csilla Farkas
High-performance computing (HPC) is a vital computational infrastructure for processing large data volumes, performing complex simulations, and conducting advanced machine learning model training. As such, HPC is a critical component of scientific
Displaying 3176 - 3200 of 5423
Was this page helpful?