Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Journal Article

NIST and Computer Security

Published: April 04, 2014
Citation: IT Professional vol. 16, no. 2, (March-April 2014) pp. 31-37

Author(s)

William Burr, Hildegard Ferraiolo, David Waltermire

Abstract

Keywords

authentication; cryptographic competition; e-commerce; hash function; identity; mobile device authentication; Security Content Automation; smart card
Control Families

None selected

Documentation

Publication:
Journal Article (DOI)

Supplemental Material:
None available