Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 401 - 425 of 2210

Security Recommendations for Hypervisor Deployment on Servers

January 23, 2018
Author(s)
Ramaswamy Chandramouli
The Hypervisor is a collection of software modules that provides virtualization of hardware resources (such as CPU/GPU, Memory, Network and Storage) and thus enables multiple computing stacks (basically made of an OS and Application programs) called

Enhanced Transmission Algorithm for Dynamic Device-to-Device Direct Discovery

January 12, 2018
Author(s)
Aziza Ben Mosbah, David W. Griffith, Richard A. Rouil
In order to support the increasing demand for capacity in cellular networks, Long Term Evolution (LTE) introduced Proximity Services (ProSe) enabling Device-to-Device (D2D) communications, defining several services to support such networks. We are

Internet of Things (IoT) Cybersecurity Colloquium

December 22, 2017
Author(s)
Benjamin M. Piccarreta, Katerina N. Megas, Danna G. O'Rourke
This report provides an overview of the topics discussed at the “Internet of Things (IoT) Cybersecurity Colloquium” hosted on NIST’s campus in Gaithersburg, Maryland on October 19, 2017. It summarizes key takeaways from the presentations and discussions

A Layered Graphical Model for Mission Attack Impact Analysis

December 21, 2017
Author(s)
Changwei Liu, Anoop Singhal, Duminda Wijesekera
In this paper, we describe a layered graphical model to analyze the mission impacts of attacks for forensic investigation. Our model has three layers: the upper layer models operational tasks and their dependencies; the middle layer reconstructs attack

The Text Recognition Algorithm Independent Evaluation (TRAIT)

December 15, 2017
Author(s)
Afzal A. Godil, Patrick J. Grother, Mei L. Ngan
The report describes and presents the results for text detection and recognition (TRAIT) evaluation in support of forensic investigations of digital media. These im- ages are of interest to NIST’s partner law enforcement agencies that seek to employ text

Polar Codes for Quantum Key Distribution

December 14, 2017
Author(s)
Anastase Nakassis
This paper addresses the performance of polar codes in the context of the quantum key distribution (QKD) protocol. It introduces the notion of an interactive polar decoder and studies its performance. The results demonstrate that the interactive decoder is

SHREC'17 Track: Point-Cloud Shape Retrieval of Non-Rigid Toys

December 14, 2017
Author(s)
Afzal A. Godil
In this paper, we present the results of the SHREC'17 Track: Point-Cloud Shape Retrieval of Non-Rigid Toys. The aim of this track is to create a fair benchmark to evaluate the performance of methods on the non-rigid point- cloud shape retrieval problem

Digital Identity Guidelines [including updates as of 12-01-2017]

December 1, 2017
Author(s)
Paul A. Grassi, James L. Fenton, Michael E. Garcia
These guidelines provide technical requirements for federal agencies implementing digital identity services and are not intended to constrain the development or use of standards outside of this purpose. The guidelines cover identity proofing and

Digital Identity Guidelines: Authentication and Lifecycle Management [including updates as of 12- 01-2017]

December 1, 2017
Author(s)
Paul A. Grassi, Ray A. Perlner, Elaine M. Newton, Andrew R. Regenscheid, William E. Burr, Justin P. Richer, Naomi B. Lefkovitz, Jamie M. Danker, Mary F. Theofanos
These guidelines provide technical requirements for federal agencies implementing digital identity services and are not intended to constrain the development or use of standards outside of this purpose. These guidelines focus on the authentication of

Digital Identity Guidelines: Enrollment and Identity Proofing Requirements [including updates as of 12-01-2017]

December 1, 2017
Author(s)
Paul A. Grassi, Naomi B. Lefkovitz, James L. Fenton, Jamie M. Danker, Yee-Yin Choong, Kristen Greene, Mary F. Theofanos
These guidelines provide technical requirements for federal agencies implementing digital identity services and are not intended to constrain the development or use of standards outside of this purpose. This guideline focuses on the enrollment and

Digital Identity Guidelines: Federation and Assertions [including updates as of 12-01-2017]

December 1, 2017
Author(s)
Paul A. Grassi, Ellen M. Nadeau, Justin P. Richer, Sarah K. Squire, James L. Fenton, Naomi B. Lefkovitz, Jamie M. Danker
This document and its companion documents, SP 800-63, SP 800-63A, and SP 800-63B, provide technical and procedural guidelines to agencies for the implementation of federated identity systems and for assertions used by federations. This publication

Overview of the NIST 2016 LoReHLT Evaluation

November 13, 2017
Author(s)
Audrey N. Tong, Lukasz L. Diduch, Jonathan G. Fiscus, Yasaman Haghpanah, Shudong Huang, David M. Joy, Kay Peterson, Ian M. Soboroff
Initiated in conjunction with DARPA's Low Resource Languages for Emergent Incidents (LORELEI) Program, the NIST LoReHLT (Low Re-source Human Language Technology) evaluation series seeks to incubate research on fundamental natural language processing tasks

A Design Methodology for Developing Resilient Cloud Services (RCS)

November 1, 2017
Author(s)
Abdella Battou, Salim Hariri
Cloud Computing is emerging as a new paradigm that aims at delivering computing as a utility. For the cloud computing paradigm to be fully adopted and effectively used, it is critical that the security mechanisms are robust and resilient to malicious

Using realistic factors to simulate catastrophic congestion events in a network

November 1, 2017
Author(s)
Kevin L. Mills, Christopher E. Dabrowski
With the rapid growth of the Internet, there has been increased interest in the use of computer models to study the dynamics of communication networks in the research literature. An important example of this has been the study of dramatic, but relatively

2016 NIST/ITL Cybersecurity Program: Annual Report

October 23, 2017
Author(s)
Patrick D. O'Reilly, Kristina G. Rigopoulos, Gregory A. Witte, Larry Feldman
Title III of the E-Government Act of 2002, entitled the Federal Information Security Management Act (FISMA) of 2002, requires NIST to prepare an annual public report on activities undertaken in the previous year, and planned for the coming year, to carry

Exploratory Lens Model of Decision-Making in a Potential Phishing Attack Scenario

October 10, 2017
Author(s)
Franklin Tamborello, Kristen K. Greene
Phishing, the transmission of a message spoofing a legitimate sender about a legitimate subject with intent to perform malicious activity, causes a tremendous and rapidly-increasing amount of damage to American information systems and users annually. This

vPROM: vSwitch Enhanced Programmable Measurement in SDN

October 10, 2017
Author(s)
An Wang, Yang Guo, Songqing Chen, Fang Hao, T.V. Lakshman, Douglas C. Montgomery, Kotikalapudi Sriram
Network programmability is a salient feature of Software Defined Networking (SDN), which allows users to program network applications with the perception that the underlying network is a single device. While still at an early stage of development, SDN

Alexa, Can I Trust You?

September 29, 2017
Author(s)
Judy Chung, Michaela Iorga, Jeff Voas, Sangjin Lee
Security diagnostics expose vulnerabilities and privacy threats that exist in commercial Intelligent Virtual Assistants (IVA)-- diagnostics offer the possibility of securer IVA ecosystems. This paper explores security and privacy concerns with these
Displaying 401 - 425 of 2210