Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 1201 - 1225 of 5421

Measuring the Frequency Accuracy and Stability of WWV and WWVH

March 1, 2023
Author(s)
Michael A. Lombardi
Radio station WWV, famous for the "at the tone ...." announcements broadcast at the top of each minute, is known to shortwave listeners and radio amateurs worldwide as a trusted source of accurate time. However, you might not know that the original purpose

An Application of Quantum Networks for Secure Video Surveillance

February 1, 2011
Author(s)
Alan Mink, Lijun Ma, Xiao Tang, Barry J. Hershman
In this chapter we have discussed the QKD protocol and its potential to secure video surveillance applications. We have shown examples of a QKD implementation along with reference to other implementations. We have also shown some innovations that can

Recommendation for Applications Using Approved Hash Algorithms

August 24, 2012
Author(s)
Quynh H. Dang
Hash functions that compute a fixed-length message digest from arbitrary length messages are widely used for many purposes in information security. This document provides security guidelines for achieving the required or desired security strengths when

Artificial Intelligence in the Fire Service: Considerations for Implementing Artificial Intelligence into Electronic Safety Equipment

June 3, 2025
Author(s)
Christopher Sampl, Clinton Smith, Albert Bahri, David Little, Richard Reel, Ash Liu, Jonathan Hodges, Ryan Falkenstein-Smith
Artificial Intelligence (AI) is becoming more pervasive in society, including public safety. There is a growing need for safety guidelines as AI becomes more integrated within electronic safety products used within the fire service. A group comprised of

Generalized Pseudo-Potentials for Higher Partial Wave Scattering

October 12, 2021
Author(s)
R Stock, A Silberfarb, I H. Deutsch, E L. Bolda
… We derive a generalized zero-range pseudo-potential applicable to all partial wave … potential in the limit that the shell radius approaches zero. This properly models all higher order multipole moments …

Certification of Standard Reference Material(R) 3655 Glycans in Solution (Frozen)

April 12, 2022
Author(s)
Mark Lowenthal, Blaza Toman, Brian Lang, Karen W. Phinney
Standard Reference Material (SRM) 3655 is intended primarily for use as a calibration standard for the measurement of enzymatically released N-linked glycans. Applications of SRM 3655 include the benchmarking and comparability of analytical techniques, as

Metrological Tools for the Reference Materials and Reference Instruments of the NIST Material Measurement Laboratory

September 16, 2021
Author(s)
Carlos R. Beauchamp, Johanna Camara, Jennifer Carney, Steven J. Choquette, Kenneth D. Cole, Paul C. DeRose, David L. Duewer, Michael Epstein, Margaret Kline, Katrice Lippa, Enrico Lucon, John L. Molloy, Michael Nelson, Karen W. Phinney, Maria Polakoski, Antonio Possolo, Lane C. Sander, John E. Schiel, Katherine E. Sharpless, Michael R. Winchester, Donald Windover
The National Institute of Standards and Technology (NIST), formerly the National Bureau of Standards, was established by the U.S. Congress in 1901 and charged with establishing a measurement foundation to facilitate U.S. and international commerce. NIST

Guidelines on Mobile Device Forensics

May 15, 2014
Author(s)
Richard Ayers, Sam Brothers, Wayne Jansen
Mobile device forensics is the science of recovering digital evidence from a mobile device under forensically sound conditions using accepted methods. Mobile device forensics is an evolving specialty in the field of digital forensics. This guide attempts

Guide to Securing Legacy IEEE 802.11 Wireless Networks

July 25, 2008
Author(s)
Karen A. Scarfone, Derrick Dicoi, Matt Sexton, Cyrus Tibbs
The purpose of this document is to provide guidance to organizations in securing their legacy Institute of Electrical and Electronics Engineers (IEEE) 802.11 wireless local area networks (WLAN) that cannot use IEEE 802.11i. The document provides an

Performance Measurement Guide for Information Security

July 16, 2008
Author(s)
Elizabeth Chew, Marianne M. Swanson, Kevin M. Stine, N Bartol, Anthony Brown, W Robinson
This document provides guidance on how an organization, through the use of metrics, identifies the adequacy of in-place security controls, policies, and procedures. It provides an approach to help management decide where to invest in additional security

Effective multibody interactions of harmonically confined ultracold neutral bosons

March 21, 2012
Author(s)
Philip Johnson, W F. Flynn, D Blume, X Y. Yin, Eite Tiesinga
… trap, assuming only two-body interactions modeled with a zero-range pseudopotential, and working to third-order in the free-space scattering length a_t(0) defined at zero collision energy. The leading-order four-body … finite-range boson--boson potential and comparison to the zero-range predictions reveals that finite-range effects must …

Numerical Analysis of Doubly Rotated Cut SAW Devices

April 30, 1980
Author(s)
Dylan Williams, F Y. Cho
… the database by these calculations were used to identify zero first and second order TCF surfaces. Families of cuts with zero first order TCF and small second order TCF's have been … the finite difference method and used to find cuts with zero first order TCF. Families of cuts on alpha quartz with …
Displaying 1201 - 1225 of 5421
Was this page helpful?