Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 851 - 875 of 4390

Combinatorial Testing of Full Text Search in Web Applications

August 18, 2017
Author(s)
M S Raunak, David R. Kuhn, Raghu N. Kacker
Database driven web applications are some of most widely developed systems today. Testing these applications effectively and discovering difficult-to-find bugs continues to be a challenge for software engineers. In this paper, we show that combinatorial

Cryptography Standards in Quantum Time - New wine in old wineskin?

August 17, 2017
Author(s)
Lidong Chen
The National Institute of Standards and Technology (NIST) of the U.S. Government announced a call for proposals for quantum-resistant public-key cryptographic algorithms on December 15, 2016. The scope of the call covers all public-key cryptographic

Using Replicates in Information Retrieval Evaluation

August 2, 2017
Author(s)
Ellen M. Voorhees, Daniel V. Samarov, Ian M. Soboroff
This paper explores a method for more accurately estimating the main effect of the system in a typical test-collection-based evaluation of information retrieval systems, and thus increasing the sensitivity of system comparisons. Randomly partitioning the

An Analysis of Vulnerability Trends, 2008 - 2016

July 29, 2017
Author(s)
David R. Kuhn, Mohammad Raunak, Raghu N. Kacker
This analysis reviews trends within the different vulnerability types and subsidiary weaknesses, with a goal of identifying practices that may have the strongest impact on reducing vulnerabilities.

Updated NIST Guidance for Bluetooth Security

July 26, 2017
Author(s)
Lidong Chen, Larry Feldman, Gregory A. Witte
This bulletin summarizes the information in NIST SP 800-121, Revision 2: Guide to Bluetooth Security which provides information on the security capabilities of Bluetooth and provides recommendations to organizations employing Bluetooth wireless

CYBER-PHYSICAL SYSTEM DEVELOPMENT ENVIRONMENT FOR ENERGY APPLICATIONS

June 28, 2017
Author(s)
Thomas P. Roth, Yuyin Song, Martin J. Burns, Himanshu Neema, William Emfinger, Janos Sztipanovits
Cyber-physical systems (CPS) are smart systems that consist of highly interconnected networks of physical and computational components. The tight integration of a wide range of heterogeneous components enables new functionality and quality of life

HMFEv - An Efficient Multivariate Signature Scheme

June 28, 2017
Author(s)
Albrecht R. Petzoldt, Ming-Shing Chen, Jintai Ding, Bo-Yin Yang
Multivariate Cryptography, as one of the main candidates for establishing post-quantum cryptosystems, provides strong, efficient and well-understood digital signature schemes such as UOV, Rainbow, and Gui. While Gui provides very short signatures, it is

A Hybrid Task Graph Scheduler for High Performance Image Processing Workflows

June 22, 2017
Author(s)
Timothy J. Blattner, Walid Keyrouz, Mary C. Brady, Shuvra S. Bhattacharyya, Milton Halem
Designing applications for scalability is key to improving their performance in hybrid and cluster computing. Scheduling code to utilize parallelism is difficult, particularly when dealing with data dependencies, memory management, data motion, and

An Introduction to Information Security

June 22, 2017
Author(s)
Michael Nieles, Kelley L. Dempsey, Victoria Y. Pillitteri
Organizations rely heavily on the use of information technology (IT) products and services to run their day-to-day activities. Ensuring the security of these products and services is of the utmost importance for the success of the organization. This

Digital Identity Guidelines

June 22, 2017
Author(s)
Paul A. Grassi, Michael E. Garcia, James L. Fenton
These guidelines provide technical requirements for federal agencies implementing digital identity services and are not intended to constrain the development or use of standards outside of this purpose. The guidelines cover identity proofing and

Digital Identity Guidelines: Authentication and Lifecycle Management

June 22, 2017
Author(s)
Paul A. Grassi, Elaine M. Newton, Ray A. Perlner, Andrew R. Regenscheid, William E. Burr, Justin P. Richer, Naomi B. Lefkovitz, Jamie M. Danker, Yee-Yin Choong, Kristen Greene, Mary F. Theofanos
These guidelines provide technical requirements for federal agencies implementing digital identity services and are not intended to constrain the development or use of standards outside of this purpose. These guidelines focus on the authentication of
Displaying 851 - 875 of 4390
Was this page helpful?