Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 726 - 750 of 5421

NIST Serial Holdings 2001

May 1, 2001
Author(s)
Susan A. Sanders, S S. Edwards
This publication (23rd edition) contains bibliographic information on approximately 5,000 titles held in the NIST Research Library, representing current and noncurrent journals, periodicals, annuals, memoirs, proceedings, and transactions.

Draft Final Report, National Institute of Standards and Technology (NIST) Technical Investigation of the May 22, 2011, Tornado in Joplin, Missouri (NIST NCSTAR 3) ***Draft for Public Comments***

November 21, 2013
Author(s)
Erica D. Kuligowski, Franklin T. Lombardo, Long Phan, Marc L. Levitan, David P. Jorgensen
… communications before and during the tornado and how the public responded; the influence of tornado hazards and public response and building and designated shelter area … explanation for decisions made and actions taken by the public in response to the tornado; and analyzed the factors …

PSCR 2017 Stakeholder Conference Presentation Materials -- Day 2

October 16, 2018
Author(s)
Jason D. Kahn, Anthony Trevino, San Antonio Police Dept, Heather M. Evans, Joe Fournier, Canada's Centre for Security Science, David Lund, Public Safety Communication Europe Forum, Gordon Shipley, UK Home Office Emergency Service Mobile Communications Programme, Dereck R. Orr, Jeff Bratcher, Rich Reed, Salim Patel, AT&T Technology Architecture Planning, Ryan Felts, Marc Leh, Mary F. Theofanos, Kristen Greene
… of the slides presented during Day 2 of the 2017 Public Safety Communications Research Program's (PSCR) Annual … plans and results for Crowdsourcing Open Innovation, Public Safety LTE, FirstNet partnerships, User Interface … Canada's Centre for Security Science, David Lund, Public Safety Communication Europe Forum, Gordon Shipley, UK …

Guidelines for Protecting Basic Input/Output System (BIOS) Firmware

June 28, 2011
Author(s)
Shirley M. Radack
… the security guidelines. References are provided to NIST publications that support system BIOS developers, vendors and … technology (IT), integrity protection, NIST Special Publications, product vendors, security controls, security …

Ferdinand Rudolph Hassler (1770-1843) : A Twenty Year Retrospective, 1987-2007

October 16, 2008
Author(s)
H Hassler, Charles A. Burroughs
This publication will bring together remarks, papers, and photographs associated with various Hassler-related events held in Philadelphia and the Washington Metropolitan Area over the past twenty years. Starting with the 180th anniversary in 1987 of the

Guidelines for Evaluating Differential Privacy Guarantees

March 6, 2025
Author(s)
Joseph Near, David Darais, Naomi Lefkovitz
This publication describes differential-privacy -- a mathematical framework that quantifies privacy loss to entities when their data appears in a dataset. It serves to fulfill one of the assignments to the National Institute of Standards and Technology

Guidelines for Managing the Security of Mobile Devices in the Enterprise

May 17, 2023
Author(s)
Murugiah Souppaya, Gema Howell, Karen Scarfone, Joshua Franklin, Vincent Sritapan
Mobile devices were initially personal consumer communication devices, but they are now permanent fixtures in enterprises and are used to access modern networks and systems to process sensitive data. This publication assists organizations in managing and

Engineering Trustworthy Secure Systems

November 16, 2022
Author(s)
Ronald S. Ross, Mark Winstead, Michael McEvilley
This publication describes a basis for establishing principles, concepts, activities, and tasks for engineering trustworthy secure systems. Such principles, concepts, activities, and tasks can be effectively applied within systems engineering efforts to

IoT Device Cybersecurity Guidance for the Federal Government: Establishing IoT Device Cybersecurity Requirements

November 29, 2021
Author(s)
Michael Fagan, Katerina N. Megas, Jeffrey Marron, Kevin Gerard Brady, Barbara Bell Cuthill, Rebecca Herold, David Lemire, Noel Hoehn
Organizations will increasingly use Internet of Things (IoT) devices for the mission benefits they can offer, but care must be taken in the acquisition and implementation of IoT devices. This publication contains background and recommendations to help

Digital Identity Guidelines: Authentication and Lifecycle Management [includes updates as of 03-02- 2020]

March 2, 2020
Author(s)
Paul A. Grassi, James L. Fenton, Elaine M. Newton, Ray Perlner, Andrew Regenscheid, William E. Burr, Justin P. Richer, Naomi Lefkovitz, Jamie M. Danker, Yee-Yin Choong, Kristen K. Greene, Mary Theofanos
These guidelines provide technical requirements for federal agencies implementing digital identity services and are not intended to constrain the development or use of standards outside of this purpose. These guidelines focus on the authentication of

Digital Identity Guidelines: Enrollment and Identity Proofing [includes updates as of 03-02-2020]

March 2, 2020
Author(s)
Paul A. Grassi, James L. Fenton, Naomi Lefkovitz, Jamie M. Danker, Yee-Yin Choong, Kristen K. Greene, Mary Theofanos
These guidelines provide technical requirements for federal agencies implementing digital identity services and are not intended to constrain the development or use of standards outside of this purpose. This guideline focuses on the enrollment and

Digital Identity Guidelines: Authentication and Lifecycle Management

June 22, 2017
Author(s)
Paul A. Grassi, Elaine M. Newton, Ray A. Perlner, Andrew R. Regenscheid, William E. Burr, Justin P. Richer, Naomi B. Lefkovitz, Jamie M. Danker, Yee-Yin Choong, Kristen Greene, Mary F. Theofanos
These guidelines provide technical requirements for federal agencies implementing digital identity services and are not intended to constrain the development or use of standards outside of this purpose. These guidelines focus on the authentication of

Digital Identity Guidelines: Enrollment and Identity Proofing Requirements

June 22, 2017
Author(s)
Paul A. Grassi, James L. Fenton, Naomi B. Lefkovitz, Jamie M. Danker, Yee-Yin Choong, Kristen Greene, Mary F. Theofanos
These guidelines provide technical requirements for federal agencies implementing digital identity services and are not intended to constrain the development or use of standards outside of this purpose. This guideline focuses on the enrollment and

Derived PIV Application and Data Model Test Guidelines

June 6, 2016
Author(s)
David Cooper, Hildegard Ferraiolo, Ramaswamy Chandramouli, Nabil Ghadiali, Jason Mohler, Steven Brady
NIST Special Publication (SP) 800-157 contains technical guidelines for the implementation of standards-based, secure, reliable, interoperable Public Key Infrastructure (PKI)-based identity credentials that are issued for mobile devices by federal
Displaying 726 - 750 of 5421
Was this page helpful?