Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 551 - 575 of 2294

Energy Efficiency Challenges of 5G Small Cell Networks

May 1, 2017
Author(s)
Hamid Gharavi
The deployment of a large number of small cells poses new challenges to energy efficiency, which has often been ignored in fifth generation (5G) cellular networks. While massive multiple-input multiple outputs (MIMO) will reduce the transmission power at

Building the Bridge between Privacy and Cybersecurity for Federal Systems

April 19, 2017
Author(s)
Naomi B. Lefkovitz, Ellen M. Nadeau, Larry Feldman, Gregory A. Witte
This bulletin summarizes the information in NISTIR 8062: An Introduction to Privacy Engineering and Risk Management in Federal Information Systems which provides an introduction to the concepts of privacy engineering and risk management for federal

Instance Search Retrospective with Focus on TRECVID

April 5, 2017
Author(s)
George M. Awad, Wessel Kraaij, Paul Over, Shin'ichi Satoh
This paper presents an overview of the Video Instance Search benchmark which was run over a pe- riod of 6 years (2010-2015) as part of the TREC Video Retrieval (TRECVID) workshop series. The main contributions of the paper include i) an examination of the

TRECVID 2016 Video to Text Description NEW Showcase/Pilot Task Overview

April 5, 2017
Author(s)
George M. Awad
A new pilot task was introduced and evaluated during the TRECIVD 2016 workshop cycle. The task evaluates methods that provides solutions to describe short videos into natural text descriptions and also methods that matches short videos to short english

Report on Lightweight Cryptography

March 28, 2017
Author(s)
Kerry McKay, Lawrence E. Bassham, Meltem Sonmez Turan, Nicky Mouha
NIST-approved cryptographic standards were designed to perform well using general-purpose computers. In recent years, there has been increased deployment of small computing devices that have limited resources with which to implement cryptography. When

Expanding lipidome coverage using LC-MS/MS data-dependent acquisition with automated exclusion list generation

March 6, 2017
Author(s)
John Bowden, Jeremy P. Koelmel, Nicholas M. Kroeger, Emily L. Gill, Candice Z. Ulmer, Rainey E. Patterson, Richard A. Yost, Timothy J. Garrett
Untargeted omics analyses aim to comprehensively characterize biomolecules within a biological system. Changes in the presence or quantity of these biomolecules can indicate important biological perturbations, such as those caused by disease. With current

Building Caring Healthcare Systems in the Internet of Things

February 22, 2017
Author(s)
Phillip Laplante, Mohamad Kassab, Nancy Laplante, Jeff Voas
The nature of healthcare and the computational and physical technologies and constraints present a number of challenges to systems designers and implementers. In spite of the challenges, there is a significant market for systems and products to support

Email Authentication Mechanisms: DMARC, SPF and DKIM

February 16, 2017
Author(s)
J. S. Nightingale
In recent years the IETF has been making a range of efforts to secure the email infrastructure and its use. Infrastructure protection includes source authentication by RFC 7208 Sender Policy Framework (SPF), message integrity authentication by RFC 6376

Open Source Private Cloud Platforms for Big Data

February 10, 2017
Author(s)
Martial Michel, Edmond J. Golden III, Olivier Serres, Ahmad Anbar, Tarek El-Ghazawi
Due to its availability, Cloud computing is the de facto platform of choice for big data, where Big Data as a Service (BDaaS) is believed to be the next best thing. In this book chapter we will first introduce cloud computing, defining the advantages it

THE USE AND CHALLENGES OF PRECISE TIME IN ELECTRIC POWER SYNCHROPHASOR SYSTEMS

January 30, 2017
Author(s)
Marc A. Weiss, Alison Silverstein, Francis Tuffner, Ya-Shian Li-Baboud
Today, the principal way that power system owners and operators use precision timing is for fault recording, protection system operation and in synchrophasor applications. Synchrophasor applications have among the most stringent precision time and time

Systemic Risks in the Cloud Computing Model: Complex Systems Perspective

January 19, 2017
Author(s)
Vladimir V. Marbukh
This paper reports on quantification and management of inherent systemic risk/performance tradeoff in the cloud computing model. We view Cloud as a Complex System and associate the systemic risks with a possibility of system phase transition to the

Timing Challenges in the Smart Grid

January 19, 2017
Author(s)
YaShian Li-Baboud, Cuong T. Nguyen, Marc A. Weiss, Dhananjay Anand, Allen R. Goldstein, Jason Allnutt, Bob Noseworthy, Ravi Subramaniam
Correct time and timing is one of the foundational elements in enabling the communication and orchestration of technologies for accurate and optimal wide area monitoring, protection and control in the power industry. NIST and IEEE-SA conducted a workshop

An Introduction to Privacy Engineering and Risk Management in Federal Information Systems

January 5, 2017
Author(s)
Sean W. Brooks, Michael E. Garcia, Naomi B. Lefkovitz, Suzanne Lightman, Ellen M. Nadeau
This document provides an introduction to the concepts of privacy engineering and risk management for federal information systems. These concepts establish the basis for a common vocabulary to facilitate better understanding and communication of privacy

The Emergence of DANE Trusted Email for Supply Chain Management

January 3, 2017
Author(s)
Scott Rose, Joseph Gersch, Daniel Massey
Supply chain management is critically dependent on trusted email with authentication systems that work on a global scale. Solutions to date have not adequately addressed the issues of email forgery, confidentiality, and sender authenticity. The IETF DANE

Threat Modeling for Cloud Data Center Infrastructures

December 29, 2016
Author(s)
Nawaf Alhebaishi, Lingyu Wang, Sushil Jajodia, Anoop Singhal
Cloud computing has undergone rapid expansion throughout the last decade. Many companies and organizations have made the transition from traditional data centers to the cloud due to its flexibility and lower cost. However, traditional data centers are

SHA-3 Derived Functions: cSHAKE, KMAC, TupleHash and ParallelHash

December 22, 2016
Author(s)
John M. Kelsey, Shu-jen H. Chang, Ray Perlner
This Recommendation specifies four types of SHA-3-derived functions: cSHAKE, KMAC, TupleHash, and ParallelHash, each defined for a 128- and 256-bit security strength. cSHAKE is a customizable variant of the SHAKE function, as defined in FIPS 202. KMAC (for

Rethinking Security through Systems Security Engineering

December 21, 2016
Author(s)
Ronald S. Ross, Larry Feldman, Gregory A. Witte
This bulletin summarizes the information presented in NIST SP 800-160: Systems Security Engineering: Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems. The publication addresses the engineering-driven

Memory and Motor Processes of Password Entry Error

December 19, 2016
Author(s)
Frank Tamborello, Kristen K. Greene
Passwords are tightly interwoven with the digital fabric of our current society. Unfortunately, passwords that provide better security generally tend to be more complex, both in length and composition. Complex passwords are problematic both cognitively and

Measurements and Scoring Procedures for Footwear Impression Comparisons

December 16, 2016
Author(s)
Martin Herman
A software system under development at NIST, called SHOECALC, will be described. It is designed to help both researchers and footwear examiners in the assessment of metrics or scoring procedures that provide objective characterizations of correspondences

Event model to facilitate data sharing among services

December 12, 2016
Author(s)
Olivera Kotevska, Judith R. Gelernter
Development of smart city services is presently hindered because the data is too heterogeneous, despite the increasing availability of data in open data initiatives. We determined metadata fields and semantics for our proposed model after a survey of other
Displaying 551 - 575 of 2294
Was this page helpful?