NIST Authors in Bold
Displaying 101 - 125 of 1096 A Secure Multicast Group Management and Key Distribution in IEEE 802.21
Yoshikazu Hanatani, Naoki Ogura, Yoshihiro Ohba, Lidong Chen, Subir Das
Survey and New Directions for Physics-Based Attack Detection in Control Systems
David Urbina, Jairo Giraldo, Alvaro Cardenas, Junia Valente, Mustafa Faisal, Niles O. Tippenhauer, Justin Ruths, Richard Candell, Heinrik Sandberg
Systems Security Engineering: Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems
Ronald S. Ross, Michael McEvilley, Janet C. Oren
The Power of Qualitative Methods: Aha Moments in Exploring Cybersecurity and Trust
Brian C. Stanton, Mary F. Theofanos, Susanne M. Furman, Sandra S. Prettyman
Limiting The Impact of Stealthy Attacks on Industrial Control Systems
David Urbina, Alvaro Cardenas, Niles O. Tippenhauer, Junia Valente, Mustafa Faisal, Justin Ruths, Richard Candell, Heinrik Sandberg
Secure and usable enterprise authentication: Lessons from the Field
Mary F. Theofanos, Simson L. Garfinkel, Yee-Yin Choong
Recommendation for Block Cipher Modes of Operation: The CMAC Mode for Authentication
Morris J. Dworkin
Guide to Cyber Threat Information Sharing
Christopher S. Johnson, Mark L. Badger, David A. Waltermire, Julie Snyder, Clem Skorupka
Security Fatigue
Brian C. Stanton, Sandra S. Prettyman, Mary F. Theofanos, Susanne M. Furman
What's a Special Character Anyway? Effects of Ambiguous Terminology in Password Rules
Yee-Yin Choong, Kristen Greene
A Probabilistic Network Forensics Model for Evidence Analysis
Changwei Liu, Anoop Singhal, Duminda Wijesekera
Advanced Identity Workshop on Applying Measurement Science in the Identity Ecosystem: Summary and Next Steps
Michael E. Garcia, Paul A. Grassi
Entropy as a Service: Unlocking Cryptography's Full Potential
Apostol T. Vassilev, Robert L. Staples
Trustworthy Email
Ramaswamy Chandramouli, Simson L. Garfinkel, J. S. Nightingale, Scott W. Rose
Guideline for Using Cryptographic Standards in the Federal Government: Directives, Mandates and Policies
Elaine B. Barker, William C. Barker
Guideline for Using Cryptographic Standards in the Federal Government: Cryptographic Mechanisms
Elaine B. Barker
Key Recovery Attack on Cubic Simple Matrix Encryption
Ray A. Perlner, Dustin Moody, Daniel C. Smith-Tone