Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 426 - 450 of 2210

Timestamp Temporal Logic (TTL) for Time Testing of Cyber-Physical Systems

September 27, 2017
Author(s)
Mohammadreza Mehrabian, Mohammad Khayatian, Aviral Shrivastava, John Eidson, Patricia Derler, Hugo A. Andrade, Ya-Shian Li-Baboud, Edward Griffor, Marc A. Weiss, Kevin Stanton
In order to test the performance and verify the correctness of Cyber-Physical Systems (CPS), the timing constraints on the system behavior must be met. Signal Temporal Logic (STL) can efficiently and succinctly capture the timing constraints on a given

Updating the Keys for DNS Security

September 27, 2017
Author(s)
Scott W. Rose, Larry Feldman, Gregory A. Witte
To help maintain the reliability and integrity of the Internet’s Domain Name System (DNS), NIST is working with specialists from around the world to update the keys used by the DNS Security Extensions (DNSSEC) protocol to authenticate DNS data and avoid

Wireless Activities in the 2 GHz Radio Bands in Industrial Plants

September 27, 2017
Author(s)
Yongkang Liu, Nader Moayeri
Wireless connections are becoming popular in industrial environments that increasingly carry sensing and actuation data over the air. In industrial plants, activities of legacy wireless systems have shaped the channel usage in the radio spectrum bands for

Local measurements of photocurrent and band gap in CdTe solar cells

September 25, 2017
Author(s)
Yohan Yoon, Jungseok Chae, Aaron M. Katzenmeyer, Heayoung Yoon, Joshua D. Schumacher, Sang M. An, Andrea Centrone, Nikolai B. Zhitenev
Polycrystalline thin film technology has shown great promise for low cost, high efficiency photovoltaics. To further increase the power efficiency, a firm understanding of microstructural properties of the devices is required. In this work, we investigate

Cybersecurity Framework Manufacturing Profile

September 8, 2017
Author(s)
Keith A. Stouffer, Timothy A. Zimmerman, CheeYee Tang, Joshua Lubell, Jeffrey A. Cichonski, John McCarthy
[Superseded by NISTIR 8183 (September 2017, Includes updates as of May 20, 2019)]This document provides the Cybersecurity Framework (CSF) implementation details developed for the manufacturing environment. The "Manufacturing Profile" of the Cybersecurity

Understanding the Major Update to NIST SP 800-63: Digital Identity Guidelines

August 29, 2017
Author(s)
Michael E. Garcia, Paul A. Grassi, Kristina G. Rigopoulos, Larry Feldman, Gregory A. Witte
This bulletin outlines the updates NIST recently made in its four-volume Special Publication (SP) 800-63, Digital Identity Guidelines, which provide agencies with technical guidelines regarding the digital authentication of users to federal networked

Conceptual Modeling

August 19, 2017
Author(s)
Conrad E. Bock, Fatma Dandashi, Sanford Friedenthal, Natalie Harrison, Steven Jenkins, Leon McGinnis, Janos Sztipanovits, Adelinde Uhrmacher, Eric Weisel, Lin Zhang
Understanding and developing complex systems requires collaboration between individuals with widely varying expertise. Communication between these individuals is facilitated by conceptual models. Conceptual models are early stage artifacts that integrate

Combinatorial and MC/DC Coverage Levels of Random Testing

August 18, 2017
Author(s)
Sergiy Vilkomir, Aparna Alluri, D. Richard Kuhn, Raghu N. Kacker
Software testing criteria differ in effectiveness, numbers of required test cases, and processes of test generation. Specific criteria are often compared with random testing as the simplest basic approach and, in some cases, random testing shows a

Combinatorial Testing of Full Text Search in Web Applications

August 18, 2017
Author(s)
M S Raunak, David R. Kuhn, Raghu N. Kacker
Database driven web applications are some of most widely developed systems today. Testing these applications effectively and discovering difficult-to-find bugs continues to be a challenge for software engineers. In this paper, we show that combinatorial

Cryptography Standards in Quantum Time - New wine in old wineskin?

August 17, 2017
Author(s)
Lidong Chen
The National Institute of Standards and Technology (NIST) of the U.S. Government announced a call for proposals for quantum-resistant public-key cryptographic algorithms on December 15, 2016. The scope of the call covers all public-key cryptographic

Using Replicates in Information Retrieval Evaluation

August 2, 2017
Author(s)
Ellen M. Voorhees, Daniel V. Samarov, Ian M. Soboroff
This paper explores a method for more accurately estimating the main effect of the system in a typical test-collection-based evaluation of information retrieval systems, and thus increasing the sensitivity of system comparisons. Randomly partitioning the

An Analysis of Vulnerability Trends, 2008 - 2016

July 29, 2017
Author(s)
David R. Kuhn, Mohammad Raunak, Raghu N. Kacker
This analysis reviews trends within the different vulnerability types and subsidiary weaknesses, with a goal of identifying practices that may have the strongest impact on reducing vulnerabilities.

Updated NIST Guidance for Bluetooth Security

July 26, 2017
Author(s)
Lidong Chen, Larry Feldman, Gregory A. Witte
This bulletin summarizes the information in NIST SP 800-121, Revision 2: Guide to Bluetooth Security which provides information on the security capabilities of Bluetooth and provides recommendations to organizations employing Bluetooth wireless

CYBER-PHYSICAL SYSTEM DEVELOPMENT ENVIRONMENT FOR ENERGY APPLICATIONS

June 28, 2017
Author(s)
Thomas P. Roth, Yuyin Song, Martin J. Burns, Himanshu Neema, William Emfinger, Janos Sztipanovits
Cyber-physical systems (CPS) are smart systems that consist of highly interconnected networks of physical and computational components. The tight integration of a wide range of heterogeneous components enables new functionality and quality of life

HMFEv - An Efficient Multivariate Signature Scheme

June 28, 2017
Author(s)
Albrecht R. Petzoldt, Ming-Shing Chen, Jintai Ding, Bo-Yin Yang
Multivariate Cryptography, as one of the main candidates for establishing post-quantum cryptosystems, provides strong, efficient and well-understood digital signature schemes such as UOV, Rainbow, and Gui. While Gui provides very short signatures, it is

A Hybrid Task Graph Scheduler for High Performance Image Processing Workflows

June 22, 2017
Author(s)
Timothy J. Blattner, Walid Keyrouz, Mary C. Brady, Shuvra S. Bhattacharyya, Milton Halem
Designing applications for scalability is key to improving their performance in hybrid and cluster computing. Scheduling code to utilize parallelism is difficult, particularly when dealing with data dependencies, memory management, data motion, and

An Introduction to Information Security

June 22, 2017
Author(s)
Michael Nieles, Kelley L. Dempsey, Victoria Y. Pillitteri
Organizations rely heavily on the use of information technology (IT) products and services to run their day-to-day activities. Ensuring the security of these products and services is of the utmost importance for the success of the organization. This

Digital Identity Guidelines

June 22, 2017
Author(s)
Paul A. Grassi, Michael E. Garcia, James L. Fenton
These guidelines provide technical requirements for federal agencies implementing digital identity services and are not intended to constrain the development or use of standards outside of this purpose. The guidelines cover identity proofing and

Digital Identity Guidelines: Authentication and Lifecycle Management

June 22, 2017
Author(s)
Paul A. Grassi, Elaine M. Newton, Ray A. Perlner, Andrew R. Regenscheid, William E. Burr, Justin P. Richer, Naomi B. Lefkovitz, Jamie M. Danker, Yee-Yin Choong, Kristen Greene, Mary F. Theofanos
These guidelines provide technical requirements for federal agencies implementing digital identity services and are not intended to constrain the development or use of standards outside of this purpose. These guidelines focus on the authentication of

Digital Identity Guidelines: Enrollment and Identity Proofing Requirements

June 22, 2017
Author(s)
Paul A. Grassi, James L. Fenton, Naomi B. Lefkovitz, Jamie M. Danker, Yee-Yin Choong, Kristen Greene, Mary F. Theofanos
These guidelines provide technical requirements for federal agencies implementing digital identity services and are not intended to constrain the development or use of standards outside of this purpose. This guideline focuses on the enrollment and
Displaying 426 - 450 of 2210