Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 2101 - 2125 of 5421

Status Report on the Final Round of the NIST Lightweight Cryptography Standardization Process

June 16, 2023
Author(s)
Meltem Sonmez Turan, Kerry McKay, Donghoon Chang, Jinkeon Kang, Noah Waller, John M. Kelsey, Lawrence E. Bassham, Deukjo Hong
The National Institute of Standards and Technology (NIST) initiated a public standardization process to select one or more Authenticated Encryption with Associated Data (AEAD) and hashing schemes suitable for constrained environments. In February 2019, 57

On Upper Bounds for D2D Group Size

February 27, 2020
Author(s)
David W. Griffith, Aziza Ben Mosbah
In this paper, we examine the Physical Sidelink Discovery Channel (PSDCH) for out-of-coverage (OOC) Device-to-Device (D2D) Long Term Evolution (LTE) networks using direct discovery for User Equipments (UEs) that are half-duplex. We derive upper bounds for

The Role of Carbon Dioxide in Ventilation and IAQ Evaluation: 40 years of AIVC

October 1, 2019
Author(s)
Andrew K. Persily, William S. Dols, Steven J. Emmerich, Lisa C. Ng
… and Ventilation Centre activities, as reflected in its publications, related to indoor carbon dioxide over the 40 … by searching on Air Infiltration and Ventilation Centre publications, though the findings also reflect the evolving …

Baseline Tailor

June 26, 2018
Author(s)
Joshua Lubell
… Tailor makes the information in these widely referenced publications easily accessible to both security professionals …

Third-Round Report of the SHA-3 Cryptographic Hash Algorithm Competition

November 15, 2012
Author(s)
Shu-jen H. Chang, Ray A. Perlner, William E. Burr, Meltem Sonmez Turan, John M. Kelsey, Souradyuti Paul, Lawrence E. Bassham
The National Institute of Standards and Technology (NIST) opened a public competition on November 2, 2007 to develop a new cryptographic hash algorithm - SHA-3, which will augment the hash algorithms specified in the Federal Information Processing Standard

Securing WiMAX Wireless Communications

December 27, 2010
Author(s)
Shirley M. Radack
This bulletin summarizes the information presented in NIST Special Publication (SP) 800-127, Guide to Securing WiMAX Wireless Communications: Recommendations of the National Institute of Standards and Technology. The publication, which was written by Karen

Guide to Protecting Personally Identifiable Information

April 28, 2010
Author(s)
Shirley M. Radack
This bulletin summarizes the information presented in NIST Special Publication (SP) 800-122, Guide to Protecting the Confidentiality of Personally Identifiable Information (PII). Written by Erika McCallister, Tim Grance, and Karen Scarfone of NIST, the

The System Development Life Cycle (SDLC)

April 29, 2009
Author(s)
Shirley M. Radack
This bulletin summarizes the information that was disseminated by the National Institute of Standards and Technology (NIST) in Special Publication (SP) 800-64, Revision 2, Security Considerations in the System Development Life Cycle. This publication was

Building Information for Emergency Responders

June 8, 2007
Author(s)
Stephen J. Treado, Alan B. Vinh, David G. Holmberg, Michael A. Galler
This paper describes a methodology for controlling access to building information to approved external entities such as police, fire and public safety officials. Building automation systems frequently monitor critical building information, including the

Technical and Economic Assessment of Internet Protocol Version 6 (IPv6)

January 31, 2006
Author(s)
Gregory C. Tassey, Douglas C. Montgomery, Alfred Lee, Tim Sloan
The President’s National Strategy to Secure Cyberspace (National Strategy) directed the Secretary of Commerce to form a task force to examine the most recent iteration of the Internet Protocol, IP version 6 (IPv6). The President charged the task force with

IUPAC Ionic Liquids Database - (ILThermo)

December 1, 2005
Author(s)
Qian Dong, Chris Muzny, Robert D. Chirico, Jason A. Widegren, Vladimir Diky, Joe W. Magee, Kenneth N. Marsh, Michael D. Frenkel
… worldwide to access an up-to-date data collection from the publications on experimental investigations of thermodynamic, …

Labeling Software Security Vulnerabilities - Poster

November 7, 2023
Author(s)
Irena Bojanova, John Guerrerio
Motivation: Crucial need for systematic comprehensive labeling of the more than 228 000 publicly disclosed cybersecurity CVE vulnerabilities to enable advances in modern AI cybersecurity research. Objective: Utilize the Bugs Framework (BF) formalism for BF

Securing Interactive and Automated Access Management Using Secure Shell (SSH)

January 11, 2016
Author(s)
Murugiah P. Souppaya, Karen Scarfone, Larry Feldman
This bulletin summarizes the information presented in NISTIR 7966, "Security of Interactive and Automated Access Management Using Secure Shell (SSH)". The publication assists organizations in understanding the basics of SSH interactive and automated access
Displaying 2101 - 2125 of 5421
Was this page helpful?