An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Julie Haney, Mary Theofanos, Yasemin Acar, Sandra Spickard Prettyman
Cryptography is an essential component of modern computing. Unfortunately, implementing cryptography correctly is a non-trivial undertaking. Past research
Kelley L. Dempsey, Nedim S. Goren, Paul Eavy, George Moore
The NISTIR 8011 volumes focus on each individual information security capability, adding tangible detail to the more general overview given in NISTIR 8011
In this report, we present network measurement of an ISA100.11a industrial wireless network operating with existing WiFi interference. The IEEE802.15.4-based
The Interagency International Cybersecurity Standardization Working Group (IICS WG) was established in December 2015 by the National Security Council's Cyber
This report documents performance of face recognition algorithms applied to the one-to-many identification of faces appearing in portrait images. The primary
Chuck Barber, Bruce A. Benner Jr., Jeanice M. Brown Thomas, Carolyn Burdette, Johanna Camara, Stephen E. Long, Jacolin Murray, Melissa M. Phillips, Benjamin Place, Kate Rimmer, Laura J. Wood, Susan Tai, Siva K. Chinthalapati, Lee L. Yu
The NIST Health Assessment Measurements Quality Assurance Program (HAMQAP) was launched in collaboration with the National Institutes of Health (NIH) Office of
NIST performed a large scale empirical evaluation of tattoo recognition algorithms. The test leveraged large operational datasets comprised of tattoo images
The document provides both an overview and technical details of test scenarios that are designed by our group. Those test scenarios can be used to verify the
Chuck Barber, Melissa M. Phillips, Laura J. Wood, Kate Rimmer, Steven J. Christopher
The NIST Dietary Supplement Laboratory Quality Assurance Program (DSQAP) was established in collaboration with the National Institutes of Health (NIH) Office of
Maria K. Dillard, Jennifer F. Helgeson, Stephen A. Cauffman
The National Institute of Standards and Technology (NIST) published the Community Resilience Planning Guide for Buildings and Infrastructure Systems (NIST SP
Dylan J. Yaga, Peter M. Mell, Nik Roby, Karen Scarfone
Blockchains are tamper evident and tamper resistant digital ledgers implemented in a distributed fashion (i.e., without a central repository) and usually
The National Institute of Standards and Technology (NIST) published the Community Resilience Planning Guide for Buildings and Infrastructure Systems (NIST SP
Chuck Barber, Melissa M. Phillips, Kate Rimmer, Laura J. Wood, Steven J. Christopher
The NIST Dietary Supplement Laboratory Quality Assurance Program (DSQAP) was established in collaboration with the National Institutes of Health (NIH) Office of
We describe models for the viscosity, thermal conductivity, and surface tension for selected fluids implemented in version 10.0 of the NIST computer program
Yee-Yin Choong, Shanee T. Dawkins, Susanne M. Furman, Kristen Greene, Sandra S. Prettyman, Mary F. Theofanos
The public safety community is in the process of transitioning from the use of land mobile radios to a technology ecosystem including a variety of broadband
This document presents a performance evaluation of Long Term Evolution (LTE) Device-to-device (D2D) communication when enabling frequency hopping resource
Jin Chu Wu, Alvin F. Martin, Gregory A. Sanders, Raghu N. Kacker
The nonparametric two-sample bootstrap is employed to estimate uncertainties of statistics of interest in receiver operating characteristic (ROC) analysis on
As shape analysis of the form presented in Srivastava and Klassens textbook Functional and Shape Data Analysis is intricately related to Lebesgue integration
Li-Anne Liew, David T. Read, Ryan M. White, Nicholas Barbosa
The LIGA process (Lithographie, Galvanoformung, Abformung, or lithography, electrodeposition, shaping) offers the possibility of mass producing strong mesoscale
Gregory P. Fiumara, Elham Tabassi, Patricia A. Flanagan, John D. Grantham, Kenneth Ko, Karen Marshall, Matthew Schwarz, Bryan Woodgate, Christopher Boehnen
In September 2017, the Intelligence Advanced Research Projects Activity held a fingerprint data collection as part of the Nail to Nail Fingerprint Challenge
New software, in the form of Microsoft Excel 2016 spreadsheets, has been created for the analysis and qualification of Charpy Verification Lots, to be used by
Melanie Cook, Dragos Prisaca, Stephen D. Quinn, David A. Waltermire
This report defines the requirements and associated test procedures necessary for products or modules to achieve one or more Security Content Automation
George W. Quinn, James R. Matey, Patrick J. Grother
Iris Exchange (IREX) IX is an evaluation of automated iris recognition algorithms. The first part of the evaluation is a performance test of both verification
Celia Paulsen, Jon M. Boyens, Nadya Bartol, Kris Winkler
In the modern world, where complex systems and systems-of-systems are integral to the functioning of society and businesses, it is increasingly important to be
The new NIST database comes from the FBI which contains live-scan and rescanned ink images from deceased subjects. The database offers the user American