Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 1176 - 1200 of 5421

Certification of Standard Reference Material(R) 956e Electrolytes in Frozen Human Serum

April 2, 2025
Author(s)
Lee Yu, Steven Christopher, Regina Easley, Monique Johnson, Dennis Leber, Thomas Vetter, Jason Waters, Charles Barber, Karen Murphy, Laura Wood, Stephen Chin, Murli Narayan, Alexander Rhodes, Michael Nash
The National Institute of Standards and Technology (NIST) Standard Reference Material® (SRM®) 956e Electrolytes in Frozen Human Serum is intended for use in the calibration and validation of procedures and methods employed in clinical analysis for the

Building a Cybersecurity and Privacy Learning Program

September 12, 2024
Author(s)
Marian Merritt, SUSAN HANSCHE, BRENDA ELLIS, Julie Nethery Snyder, KEVIN SANCHEZ-CHERRY, DONALD WALDEN
This publication provides guidance for federal agencies and organizations to develop and manage a life cycle approach to building a Cybersecurity and Privacy Learning Program (CPLP). The approach is intended to address the needs of large and small

Certification of Standard Reference Materials(R) 2969 and 2970: Vitamin D Metabolites in Frozen Human Serum (Total 25-Hydroxyvitamin D Low Level) and (25-Hydroxyvitamin D2 High Level)

September 2, 2021
Author(s)
Grace Hahm, Michael Nelson, Johanna Camara, Blaza Toman
Standard Reference Materials (SRMs) 2969 and 2970 are intended for 1) use in validating methods for determining concentrations of 25-hydroxyvitamin D2 (25(OH)D2) and 25-hydroxyvitamin D3 (25(OH)D3) in human serum and plasma and 2) value assigning in house

Digital Identity Guidelines: Federation and Assertions [includes updates as of 03-02-2020]

March 2, 2020
Author(s)
Paul A. Grassi, Justin P. Richer, Sarah K. Squire, James L. Fenton, Ellen M. Nadeau, Naomi B. Lefkovitz, Jamie M. Danker, Yee-Yin Choong, Kristen Greene, Mary F. Theofanos
This document and its companion documents, SP 800-63, SP 800-63A, and SP 800-63B, provide technical and procedural guidelines to agencies for the implementation of federated identity systems and for assertions used by federations. This publication

Digital Identity Guidelines: Federation and Assertions

June 22, 2017
Author(s)
Paul A. Grassi, Ellen M. Nadeau, Justin P. Richer, Sarah K. Squire, James L. Fenton, Naomi Lefkovitz, Jamie M. Danker, Yee-Yin Choong, Kristen K. Greene
This document and its companion documents, SP 800-63, SP 800-63A, and SP 800-63B, provide technical and procedural guidelines to agencies for the implementation of federated identity systems and for assertions used by federations. This publication

Smart Card Technology: New Methods for Computer Access Control

September 1, 1988
Author(s)
Martha E. Haykin, Robert B. Warnar
A smart card is a credit-card-sized device containing one or more integrated circuit chips, which perform the functions of a microprocessor, memory, and an input/output interface. Smart cards, and other related devices, may be used to provide an increased

John Werner Cahn

September 15, 2019
Author(s)
William J. Boettinger, C A. Handwerker, Frank W. Gayle
… Memorial Tribute, Biography, Key Publications

Recommendation for Cryptographic Key Generation

December 21, 2012
Author(s)
Elaine B. Barker, Allen L. Roginsky
Cryptography is often used in an information technology security environment to protect data that is sensitive, has a high value, or is vulnerable to unauthorized disclosure or undetected modification during transmission or while in storage. Cryptography

Transitioning the Use of Cryptographic Algorithms and Key Lengths

March 21, 2019
Author(s)
Elaine B. Barker, Allen L. Roginsky
The National Institute of Standards and Technology (NIST) provides cryptographic key management guidance for defining and implementing appropriate key management procedures, using algorithms that adequately protect sensitive information, and planning ahead

Guide to Industrial Control Systems (ICS) Security

June 3, 2015
Author(s)
Keith A. Stouffer, Victoria Y. Pillitteri, Suzanne Lightman, Marshall Abrams, Adam Hahn
This document provides guidance on how to secure Industrial Control Systems (ICS), including Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems (DCS), and other control system configurations such as Programmable Logic

Recommendation for Random Bit Generator (RBG) Constructions

September 25, 2025
Author(s)
Elaine Barker, John Kelsey, Kerry McKay, Allen Roginsky, Meltem Sonmez Turan
The NIST Special Publication (SP) 800-90 series of documents supports the generation of high-quality random bits for cryptographic and non-cryptographic use. SP 800-90A, Recommendation for Random Number Generation Using Deterministic Random Bit Generators

NIST Big Data Interoperability Framework: Volume 2, Big Data Taxonomies

November 18, 2019
Author(s)
Wo L. Chang, Nancy Grady
Big Data is a term used to describe the large amount of data in the networked, digitized, sensor-laden, information-driven world. While opportunities exist with Big Data, the data can overwhelm traditional technical approaches and the growth of data is

Guide for Cybersecurity Event Recovery

December 22, 2016
Author(s)
Michael Bartock, Jeffrey Cichonski, Murugiah Souppaya, Matthew C. Smith, Gregory Witte, Karen Scarfone
In light of an increasing number of cybersecurity events, organizations can improve resilience by ensuring that their risk management processes include comprehensive recovery planning. Identifying and prioritizing organization resources helps to guide

Project Summaries 1997; NIST Building and Fire Research Laboratory

November 1, 1997
Author(s)
Noel J. Raufaste Jr
The National Institute of Standards and Technology's [NIST], Building and Fire Research Laboratory [BFRL] is one of NIST's seven Laboratories. The mission of BFRL is to enhance the competitiveness of U.S. industry and public safety by developing

Dipolar Chains formed by synthesized cobalt nanocubes

May 11, 2009
Author(s)
Guangjun Cheng, Robert D. Shull, Angela R. Hight Walker
… These nanocubes form dipolar chains upon drying in zero applied field and three-dimensional chains along the … assemblies. The constricted hysteresis loops and near-zero coercivity indicate the existence of vortex states in …

Singularity in the Debye-Waller factor of graphene

March 16, 2009
Author(s)
Vinod K. Tewary, B. Yang
… singularity. However, the singularity does not affect the zero-temperature value of the Debye-Waller factor. We calculate the zero-temperature limit of the mean-square displacement …

Recommendation for Cryptographic Key Generation

June 4, 2020
Author(s)
Elaine B. Barker, Allen L. Roginsky, Richard Davis
Cryptography is often used in an information technology security environment to protect data that is sensitive, has a high value, or is vulnerable to unauthorized disclosure or undetected modification during transmission or while in storage. Cryptography

Recommendation for Cryptographic Key Generation

July 23, 2019
Author(s)
Elaine B. Barker, Allen L. Roginsky
Cryptography is often used in an information technology security environment to protect data that is sensitive, has a high value, or is vulnerable to unauthorized disclosure or undetected modification during transmission or while in storage. Cryptography

Proposed UNIFORMAT II Classification of Bridge Elements

June 10, 2011
Author(s)
Muthiah Kasi, Robert E. Chapman
This report presents a proposed UNIFORMAT II classification of bridge elements. Elemental classifications differ from traditional product-related classifications because their core concept is an element that performs a given function, regardless of the

Directory of Federal Government Certification and Related Programs

December 1, 1998
Author(s)
Maureen A. Breitenberg
This directory is the third edition of the National Institute of Standards and Technology (NIST) directory of federal government procurement and regulatory conformity assessment of programs which may affect product and services in the marketplace. Prior
Displaying 1176 - 1200 of 5421
Was this page helpful?