Skip to main content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Publications

NIST Authors in Bold

Displaying 26 - 50 of 1868

Security Requirements for Cryptographic Modules

Author(s)
Michael J. Cooper, Kim B. Schaffer
The selective application of technological and related procedural safeguards is an important responsibility of every federal organization in providing adequate

Rethinking Distributed Ledger Technology

Author(s)
David R. Kuhn, Dylan J. Yaga, Jeffrey M. Voas
Blockchains were designed to solve the problem of double-spending in cryptocurrencies, and the success of the Bitcoin design has generated vastly more interest

A data science challenge for converting airborne remote sensing data into ecological information

Author(s)
Sergio Marconi, Sarah J. Graves, Dihong Gong, Shahriari Nia Morteza, Marion Le Bras, Bonnie J. Dorr, Peter C. Fontana, Justin Gearhart, Craig S. Greenberg, Dave J. Harris, Sugumar A. Kumar, Agarwal Nishant, Joshi Prarabdh, Sandeep U. Rege, Stephanie A. Bohlman, Ethan P. White, Daisy Z. Wang
In recent years ecology has reached the point where a data science competition could be very productive. Large amounts of open data are increasingly available

Securing Wireless Infusion Pumps

Author(s)
Gavin W. O'Brien
This bulletin summarizes the information found in NIST SP 1800-8: Securing Wireless Infusion Pumps in Healthcare Delivery Organizations which discusses the

PSCR 2017 Stakeholder Conference Presentation Materials -- Day 3

Author(s)
Dereck R. Orr, Richard A. Rouil, Jeremy E. Benson, David W. Griffith, Fidel Liberal, Robert Escalle, Sonim Technologies, Richard Lau, Vencore Labs, Paul Sutton, Software Radio Systems LTD, Sumit Roy, Sean Sangodoyin, David A. Howe, Fabio C. Da Silva, Alicia Evangelista, Yet2, Brienne Engel, Yet2, John S. Garofolo
This document is a compilation of the slides presented during Day 3 of the 2017 Public Safety Communications Research Program's (PSCR) Annual Stakeholder

Blockchain Technology Overview

Author(s)
Dylan J. Yaga, Peter M. Mell, Nik Roby, Karen Scarfone
Blockchains are tamper evident and tamper resistant digital ledgers implemented in a distributed fashion (i.e., without a central repository) and usually

2017 NIST/ITL Cybersecurity Program: Annual Report

Author(s)
Patrick D. O'Reilly, Kristina G. Rigopoulos, Gregory A. Witte, Larry Feldman
Title III of the E-Government Act of 2002, entitled the Federal Information Security Management Act (FISMA) of 2002, requires NIST to prepare an annual public

Cybertrust in the IoT Age

Author(s)
Jeffrey M. Voas, David R. Kuhn, Constantinos Kolias, Angelos Stavrou, Georgios Kambourakis
The Internet of Things generates new opportunities but creates new challenges with respect to trustworthiness. Computing, architecture, and verification changes

In IoT We Trust?

Author(s)
Jeffrey M. Voas, David R. Kuhn, Phillip Laplante
In this short article, we review an abbreviated list of trust challenges that we foresee as increased adoption transforms the IoT into another ubiquitous

Superconducting optoelectronic networks III: synaptic plasticity

Author(s)
Jeffrey M. Shainline, Adam N. McCaughan, Sonia M. Buckley, Christine A. Donnelly, Manuel C. Castellanos Beltran, Michael L. Schneider, Richard P. Mirin, Sae Woo Nam
As a means of dynamically reconfiguring the synaptic weight of a superconducting optoelectronic loop neuron, a superconducting flux storage loop is inductively

Pseudo-exhaustive Verification of Rule Based Systems

Author(s)
David R. Kuhn, Dylan J. Yaga, Raghu N. Kacker, Yu Lei, Chung Tong Hu
Rule-based systems are important in application domains such as artificial intelligence and business rule engines, as well as formal methods for software design

No Phishing beyond This Point

Author(s)
Kristen Greene, Michelle P. Steves, Mary F. Theofanos
As phishing continues to evolve, what is your organization doing to stay off the hook?
Displaying 26 - 50 of 1868