Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 626 - 650 of 5421

NIST Calibration Services Users Guide: Dimensional Measurements

October 16, 2008
Author(s)
T L. Arnold, J L. Marshall
This publication lists all the calibration and special test services available from the National Institute of Standards and Technology (NIST) to characterize dimensional measurement instruments and devices that are metrologically suitable as reference or

NIST Calibration Services Users Guide: Ionizing Radiation Measurements

October 16, 2008
Author(s)
T L. Arnold, J L. Marshall
This publication lists all the calibration and special test services available from the NIST to characterize ionizing radiation measurement instruments and devices that are metrologically suitable as reference or transfer standards. The first chapters

Guidelines on Electronic Mail Security

February 20, 2007
Author(s)
Miles C. Tracy, Wayne Jansen, Karen A. Scarfone, Jason Butterfield
This document was developed in furtherance of NIST's statutory responsibilities under the Federal Information Security Management Act (FISMA) of 2002, Public Law 107-347. The purpose of the publication is to recommend security practices for designing

Iris Quality Calibration and Evaluation (IQCE): Evaluation Report

September 24, 2011
Author(s)
Elham Tabassi, Patrick J. Grother, Wayne J. Salamon
… for verification. While there are several academic publications addressing the problem of iris image quality, … the fastset (i.e., the shortest computation time) and with zero failure to computation, are the most robust. To …

Automated Secure Configuration Guidance from the macOS Security Compliance Project (mSCP)

July 20, 2023
Author(s)
Mark Trapnell, Eric Trapnell, Murugiah Souppaya, Bob Gendler, Dan Brodjieski, Allen Golbig, Karen Scarfone, Blair Heiserman
The macOS Security Compliance Project (mSCP) provides resources that system administrators, security professionals, security policy authors, information security officers, and auditors can leverage to secure and assess macOS desktop and laptop system

RFID Devices and Systems in Homeland Security Applications

July 1, 2007
Author(s)
Kate Remley, Jeffrey R. Guerrieri, Dylan Williams, David R. Novotny, Anthony B. Kos, Nelson Bryner, Nader Moayeri, Michael Souryal, Kang Lee, Steven Fick
This article reports on activities being carried out by the National Institute of Standards and Technology to ensure secure, reliable use of Radio-Frequency Identification (RFID) technology in homeland security and public safety applications. These

NSTIC Pilots: Catalyzing the Identity Ecosystem [including updates as of 09-20-2015]

March 15, 2016
Author(s)
Katerina N. Megas, Philip Lam, Ellen M. Nadeau, Colin Soutar
Pilots are an integral part of the National Strategy for Trusted Identities in Cyberspace (NSTIC), issued by the White House in 2011 to encourage enhanced security, privacy, interoperability, and ease of use for online transactions. This document details

University Involvement in ATP and Effect on Project Outputs

October 12, 2021
Author(s)
F A. Moris, C Chang, Andrew J. Wang
… creation and dissemination, as measured by journal publications;--University participation has a positive effect on research outputs as measured by journal publications, which are early in the innovation timeline, but …

PSCR 2020_INNOVATING ON DRONE TECHNOLOGY TO SUPPORT FIRST RESPONDER MISSIONS

October 29, 2020
Author(s)
Hien V. Nguyen, Maxwell Maurice, Terese Manley, Kamel Saidi, Philip Hall, Christopher Stockhowe, Michael O'Shea, Raymond Sheh
Imagine the possibilities of using an unmanned aircraft system (UAS) to carry a wireless broadband communications network to support a public safety mission. Learn about PSCRs Deployables research and how UASs are being evaluated as tools to assist first

Digital Identity Guidelines: Authentication and Lifecycle Management [including updates as of 12- 01-2017]

December 1, 2017
Author(s)
Paul A. Grassi, Ray A. Perlner, Elaine M. Newton, Andrew R. Regenscheid, William E. Burr, Justin P. Richer, Naomi B. Lefkovitz, Jamie M. Danker, Mary F. Theofanos
These guidelines provide technical requirements for federal agencies implementing digital identity services and are not intended to constrain the development or use of standards outside of this purpose. These guidelines focus on the authentication of

Energy Price Indices and Discount Factors for Life-Cycle Cost Analysis 2009

May 31, 2009
Author(s)
Amy S. Rushing, Barbara C. Lippiatt
This is the 2009 edition of energy price indices and discount factors for performing life-cycle cost analyses of energy and water conservation and renewable energy projects in federal facilities. It will be effective from April 1, 2009 to March 31, 2010

Guide to Using Vulnerability Naming Schemes

February 25, 2011
Author(s)
David A. Waltermire, Karen Scarfone
This publication provides recommendations for using two vulnerability naming schemes: Common Vulnerabilities and Exposures (CVE) and Common Configuration Enumeration (CCE). Draft SP 800-51 Revision 1 gives an introduction to both naming schemes and makes
Displaying 626 - 650 of 5421
Was this page helpful?