Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 2401 - 2425 of 5421

On the Stability of Exponential Backoff

August 1, 2003
Author(s)
N-O Song, B-J Kwak, Leonard E. Miller
… the throughput of the network converges to a non-zero constant as the offered load N goes to infinity. We also …

New Practical Multivariate Signatures from a Nonlinear Modifier

April 1, 2021
Author(s)
Daniel Smith-Tone
Multivariate cryptography is dominated by schemes supporting various modifiers to patch certain algebraic weaknesses. Typically these modifiers are linear in nature--- either requiring an extra composition with an affine map, or being evaluated by a

Towards a Foundation for a Collaborative Replicable Smart Cities IoT Architecture

April 26, 2017
Author(s)
Sokwoo Rhee, Cuong Nguyen, Alexander Nelson, Daniel Hoffman, Greg Toth
The pervasive instrumentation of the physical world with sensors and actuators grants an unprecedented level of information granularity that is useful in decision-making processes. As municipalities and the public sector at large begin to leverage the

E-Government Security Issues and Measures

December 30, 2005
Author(s)
William C. Barker
The Handbook will be a three-volume, 2,400-page reference source providing state-of-the-art information concerning the information, computer and network security with coverage of the core topics. The audience is four-year colleges and universities with

The Keyed-Hash Message Authentication Code (HMAC)

July 16, 2008
Author(s)
National Institute of Standards and Technology (NIST), Quynh Dang
This Standard describes a keyed-hash message authentication code (HMAC), a mechanism for message authentication using cryptographic hash functions. HMAC can be used with any iterative Approved cryptographic hash function, in combination with a shared

Network Security Testing

November 1, 2003
Author(s)
Shirley M. Radack
This ITL Bulletin summarizes NIST Special Publication 800-42, Guideline on Network Security Testing, by John Wack, Miles Tracy, and Murugiah Souppaya, which assists organizations in testing their Internet-connected and operational systems. The guide

BACnet Today- Significant new features and future enhancements

October 1, 2002
Author(s)
Steven T. Bushby, H M. Newman
The BACnet communication protocol standard is maintained by a standing committee of the American Society of Heating, Refrigerating, and air-conditioning Engineers under continuous maintenance procedures. Since its original publication in 1995 there have

The Measurement and Uncertainty of a Calibration Standard for the SEM

March 1, 1994
Author(s)
Joseph Fu, M Croarkin, Theodore V. Vorburger
Standard Reference Material 484 is an artifact for calibration the magnification scale of a Scanning Electron Microscope (SEM) within the range of 1000X to 20000X. Seven issues, SRM-484, and SRM-484a to SRM-484f, have been certified between 1977 and 1992

Federal Office of Research and Technology Applications Survey Results

August 9, 2018
Author(s)
Nicole K. Gingrich
This publication serves as a formal reporting of the data presented at the 2017 Federal Laboratory Consortium’s National Meeting. It presents summary data collected through a survey conducted by NIST in conjunction with the Interagency Working Group on

NIST Handbook 150-1, NVLAP Energy Efficient Lighting Products, 2017 Revision

March 28, 2017
Author(s)
C Cameron Miller, Timothy Rasinski
The NIST Handbook 150 publication series sets forth the procedures, requirements, and guidance for the accreditation of testing and calibration laboratories by the National Voluntary Laboratory Accreditation Program (NVLAP). NIST Handbook 150-1, NVLAP

An Introduction to Privacy Engineering and Risk Management in Federal Information Systems

January 5, 2017
Author(s)
Sean W. Brooks, Michael E. Garcia, Naomi B. Lefkovitz, Suzanne Lightman, Ellen M. Nadeau
This document provides an introduction to the concepts of privacy engineering and risk management for federal information systems. These concepts establish the basis for a common vocabulary to facilitate better understanding and communication of privacy
Displaying 2401 - 2425 of 5421
Was this page helpful?