Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 1526 - 1550 of 5421

Where EAP Security Claims Fail

August 14, 2007
Author(s)
Katrin Hoeper, Lei Chen
… versions. These challenges make it difficult to derive a trust model for EAP and to securely adopt existing protocols. …

Minimum Security Requirements for Multi-User Operating Systems

March 1, 1993
Author(s)
David F. Ferraiolo, N Lynch, Patricia R. Toth
[NOTE: THIS DOCUMENT HAS BEEN SUPERSEDED BY THE FEDERAL CRITERIA.] The Minimum Security Requirements for Multi-User Operating Systems (MSR) document provides basic commercial computer system security requirements applicable to both government and

A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications

September 16, 2010
Author(s)
Lawrence E. Bassham, Andrew L. Rukhin, Juan Soto, James R. Nechvatal, Miles E. Smid, Stefan D. Leigh, M Levenson, M Vangel, Nathanael A. Heckert, D L. Banks
This paper discusses some aspects of selecting and testing random and pseudorandom number generators. The outputs of such generators may be used in many cryptographic applications, such as the generation of key material. Generators suitable for use in

mLab: A Mobile Ad Hoc Network Test Bed

July 14, 2005
Author(s)
Tom T. Karygiannis, Emmanouil Antonakakis
… 1st International Workshop on Security, Privacy, and Trust in Pervasive and Ubiquitous Computing …

Quantum depletion of a soliton condensate

April 25, 2006
Author(s)
Lu Deng, Guoxiang Huang
… depletion of the condensate and show that two degenerate zero-modes, which originate from a U(1) gauge- and a …

Algorithm xxx: Airy Functions

December 15, 2004
Author(s)
Bruce R. Fabijonas, Daniel W. Lozier, Frank W. Olver
We present a Fortran 90 module which computes the solutions of Airy's differential equation, and their derivatives, both on the real line and in the complex plane. The computational methods are numerical integration of the differential equation and

MODELING AND EXPERIMENTS ON FAST COOLDOWN OF A 120 Hz PULSE TUBE CRYOCOOLER

July 16, 2007
Author(s)
Srinivas Vanapalli, Michael A. Lewis, Gershon Grossman, Zhihua Gan, Ray Radebaugh, H.J. M. ter Brake
… to 80 K for different cold-end masses and extrapolate to zero cold-end mass. We also present an analytical model for … the extrapolated experimental results indicate that with zero cold-end mass the cooldown time to 80 K with this 120 Hz …

Measuring residual resistivity ratio of high-purity Nb

July 27, 2004
Author(s)
Loren F. Goodrich, Theodore C. Stauffer, Jolene Splett, Dominic F. Vecchia
… as a function of field at 4.2 K and extrapolate to zero field and (2) measure the normal-state resistivity as a function of temperature in zero field and extrapolate to 4.2 K. Both approaches have …

Anomalous Magnetic Aftereffect of a Frozen Magnetic Fluid

January 1, 2004
Author(s)
S Taketomi, R V. Drew, Robert D. Shull
… A very stably dispersed magnetic fluid (MF) was zero-field-cooled from room temperature of 5 K followed by … to room temperature, and the experiment was repeated after zero-field cooling to 5K and again applying and removing the …

85 Rb BEC Near a Feshbach Resonance

February 1, 2001
Author(s)
N R. Claussen, S L. Cornish, J L. Roberts, Eric A. Cornell, C E. Wieman
… Feshbach resnance to reverse the sign of the zero-field scattering length. These condensates provide … with attractive interactions have been produced near the zero of the Feshbach resonance. The transition from repulsive …

ITL Publishes Guidance on Enterprise Patch Management Technologies

August 8, 2013
Author(s)
Elizabeth B. Lennon
This ITL Bulletin summarizes a new ITL publication, NIST Special Publication 800-40 Revision 3, Guide to Enterprise Patch Management Technologies, which gives recommendations for organizations to improve the effectiveness and efficiency of their patch

ITL Issues Guidelines for Managing the Security of Mobile Devices

July 15, 2013
Author(s)
Elizabeth B. Lennon
This ITL Bulletin announces the publication of NIST Special Publication 800-124 Revision 1, Guidelines for Managing the Security of Movile Devices in the Enterprise. The revised guidelines will assist organizations in managing the security of mobile

Status Report on the Fourth Round of the NIST Post-Quantum Cryptography Standardization Process

March 11, 2025
Author(s)
Gorjan Alagic, Maxime Bros, Pierre Ciadoux, David Cooper, Quynh Dang, Thinh Dang, John Kelsey, Jacob Lichtinger, Yi-Kai Liu, Carl Miller, Dustin Moody, Rene Peralta, Ray Perlner, Angela Robinson, Hamilton Silberg, Daniel Smith-Tone, Noah Waller
The National Institute of Standards and Technology is selecting public-key cryptographic algorithms through a public, competition-like process. The new public-key cryptography standards will specify additional digital signatures, public-key encryption, and

Initial Framework to Design Lifeline Infrastructure for Post-Earthquake Functional Recovery Volume 1

March 7, 2024
Author(s)
Craig A. Davis, Laurie A. Johnson, Anne Kiremidjian, Alexis Kwasinski, Thomas Denis O'Rourke, Ellis Stanley, Kent Yu, Farzin Zareian, Katherine Johnson, Ayse Hortacsu
Lifeline infrastructure systems provide services to support communities, including life safety, public health, and social-economic factors. They require both built assets and the human agency necessary to operate them, but there are no known frameworks

Situational Awareness for Electric Utilities

August 7, 2019
Author(s)
James J. McCarthy, Otis Alexander, Sallie Edwards, Don Faatz, Chris Peloquin, Susan Symington, Andre Thibault, John Wiltberger, Karen Viani
Through direct dialogue between NCCoE staff and members of the energy sector (comprised mainly of electric power companies and those who provide equipment and/or services to them) it became clear that energy companies need to create and maintain a high

New NIST Security Standard Can Protect Credit Cards, Health Information

April 14, 2016
Author(s)
Morris J. Dworkin, Larry Feldman, Gregory A. Witte
This bulletin summarizes the information presented in NIST Special Publication (SP) 800-38G, "Recommendation for Block Cipher Modes of Operation: Methods for Format-Preserving Encryption." The publication specifies two methods for format-preserving

ITL Publishes Guidance on Preventing and Handling Malware Incidents

August 22, 2013
Author(s)
Elizabeth B. Lennon
This ITL Bulletin summarizes a new ITL publication, NIST Special Publication 800- 83 Revision 1,Guide to Malware Incident Prevention and Handling for Desktops and Laptops,which gives receommendations for organizations to improve their malware incident
Displaying 1526 - 1550 of 5421
Was this page helpful?