Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search CSRC

Use this form to search content on CSRC pages.

For a phrase search, use " "


Limit results to content tagged with of the following topics:
Showing 2201 through 2225 of 2818 matching records.
Publications Conference Paper (Final) December 20, 2016
https://csrc.nist.gov/pubs/conference/2016/12/20/memory-and-motor-processes-of-password-entry-error/final

Conference: 2015 Annual Meeting of the Human Factors and Ergonomics Society Abstract: Passwords are tightly interwoven with the digital fabric of our current society. Unfortunately, passwords that provide better security generally tend to be more complex, both in length and composition. Complex passwords are problematic both cognitively and motorically, leading to both memory and mot...

Publications IR 8151 (Final) November 30, 2016
https://csrc.nist.gov/pubs/ir/8151/final

Abstract: The call for a dramatic reduction in software vulnerability is heard from multiple sources, recently from the February 2016 Federal Cybersecurity Research and Development Strategic Plan. This plan starts by describing well known risks: current systems perform increasingly vital tasks and are widely...

Publications Project Description (Final) November 28, 2016
https://csrc.nist.gov/pubs/pd/2016/11/28/mobile-application-single-signon-for-psfr/final

Abstract: Mobile platforms offer a significant operational advantage to public safety stakeholders by giving them access to mission critical information and services while deployed in the field, during training and exercises, or participating in day-to-day business and preparations during non-emergency period...

Publications Conference Paper (Final) October 28, 2016
https://csrc.nist.gov/pubs/conference/2016/10/28/restricting-insider-access-multipolicy-access-cont/final

Conference: 8th ACM Computer and Communications Security International Workshop on Managing Insider Security Threats (MIST '16) Abstract: The American National Standards Organization has standardized an access control approach, Next Generation Access Control (NGAC), that enables simultaneous instantiation of multiple access control policies. For large complex enterprises this is critical to limiting the legally authorized access of in...

Publications Conference Paper (Final) October 24, 2016
https://csrc.nist.gov/pubs/conference/2016/10/24/limiting-the-impact-of-stealthy-attacks-on-ics/final

Conference: 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS '16) Abstract: While attacks on information systems have for most practical purposes binary outcomes (information was manipulated/eavesdropped, or not), attacks manipulating the sensor or control signals of Industrial Control Systems (ICS) can be tuned by the attacker to cause a continuous spectrum in damages. Att...

Publications Journal Article (Final) October 5, 2016
https://csrc.nist.gov/pubs/journal/2016/10/high-rank-elliptic-curves-with-torsion-z4z/final

Journal: INTEGERS: The electronic journal of combinatorial number theory Abstract: Working over the field Q(t), Kihara constructed an elliptic curve with torsion group Z/4Z and five independent rational points, showing the rank is at least five. Following his approach, we give a new infinite family of elliptic curves with torsion group Z/4Z and rank at least five. This matches the...

Publications Journal Article (Final) August 23, 2016
https://csrc.nist.gov/pubs/journal/2016/08/whatever-happened-to-formal-methods-for-security/final

Journal: Computer (IEEE Computer) Abstract: A panel of seven experts discusses the state of the practice of formal methods (FM) in software development, with a focus on FM's relevance to security. In a 1996 article, formal methods (FM) advocate Tony Hoare asked, "How Did Software Get So Reliable without Proof?"1 Twenty years later, in the sa...

Publications Conference Paper (Final) July 30, 2016
https://csrc.nist.gov/pubs/conference/2016/07/30/general-methods-for-access-control-policy-verifica/final

Conference: IEEE 17th International Conference on Information Reuse and Integration (IEEE IRI2016) Abstract: Access control systems are among the most critical of computer security components. Faulty policies, misconfigurations, or flaws in software implementations can result in serious vulnerabilities. To formally and precisely capture the security properties that access control should adhere to, access c...

Publications IR 8080 (Final) July 27, 2016
https://csrc.nist.gov/pubs/ir/8080/final

Abstract: There is a need for cybersecurity capabilities and features to protect the Nationwide Public Safety Broadband Network (NPSBN). However, cybersecurity requirements should not compromise the ability of first responders to complete their missions. In addition, the diversity of public safety disciplines...

Publications ITL Bulletin (Final) June 3, 2016
https://csrc.nist.gov/pubs/itlb/2016/06/extending-network-security-into-virtualized-infras/final

Abstract: This bulletin summarizes the information presented in NIST Special Publication (SP) 800-125B, "Secure Virtual Network Configuration for Virtual Machine (VM) Protection." That publication provides an analysis of various virtual network configuration options for protection of VMs and to present recomm...

Publications Journal Article (Final) May 27, 2016
https://csrc.nist.gov/pubs/journal/2016/05/insights-on-formal-methods-of-cybersecurity/final

Journal: Computer (IEEE Computer) Abstract: We asked 7 experts 1 simple question to find out what has occurred recently in terms of applying formal methods (FM) to security-centric, cyber problems: Please summarize in a paragraph the state of the research and practitioner communities in formal method as you see it. Please include standards, c...

Publications Project Description (Initial Public Draft) May 9, 2016
https://csrc.nist.gov/pubs/pd/2016/05/09/securing-sensitive-consumer-data-noncc/ipd

Abstract: As a result of payment card industry standards and a strong understanding of the value of valid credit card information in the black market, the retail industry has already invested in security mechanisms to protect credit card data, also referred to as cardholder data. However, this cardholder data...

Publications IR 8105 (Final) April 28, 2016
https://csrc.nist.gov/pubs/ir/8105/final

Abstract: In recent years, there has been a substantial amount of research on quantum computers – machines that exploit quantum mechanical phenomena to solve mathematical problems that are difficult or intractable for conventional computers. If large-scale quantum computers are ever built, they will be able t...

Publications IR 8040 (Final) April 25, 2016
https://csrc.nist.gov/pubs/ir/8040/final

Abstract: Password entry on mobile devices significantly impacts both usability and security, but there is a lack of usable security research in this area, specifically for complex password entry. To address this research gap, we set out to assign strength metrics to passwords for which we already had usabili...

Publications Journal Article (Final) April 21, 2016
https://csrc.nist.gov/pubs/journal/2016/04/indifferentiability-security-of-the-fast-widepipe/final

Journal: Journal of Mathematical Cryptology Abstract: A hash function secure in the indifferentiability framework (TCC 2004) is able to resist allmeaningful generic attacks. Such hash functions also play a crucial role in establishing the security of protocols that use them as random functions. To eliminate multi-collision type attacks o...

Publications ITL Bulletin (Final) April 14, 2016
https://csrc.nist.gov/pubs/itlb/2016/04/new-nist-security-standard-can-protect-credit-card/final

Abstract: This bulletin summarizes the information presented in NIST Special Publication (SP) 800-38G, "Recommendation for Block Cipher Modes of Operation: Methods for Format-Preserving Encryption." The publication specifies two methods for format-preserving encryption, FF1 and FF3.

Publications ITL Bulletin (Final) December 15, 2015
https://csrc.nist.gov/pubs/itlb/2015/12/stopping-malware-and-unauthorized-software-through/final

Abstract: This bulletin summarizes the information presented in NIST Special Publication 800-167, "Guide to Application Whitelisting," written by Adam Sedgewick, Murugiah Souppaya and Karen Scarfone. The publication is intended to assist organizations in understanding the basics of application whitelisting....

Publications Project Description (Final) December 1, 2015
https://csrc.nist.gov/pubs/pd/2015/12/01/wireless-medical-infusion-pumps-medical-device-sec/final

Abstract: In the past, medical devices were stand-alone instruments that interacted only with the patient. Today, medical devices have operating systems and communication hardware that allow them to connect to networks and other devices. While this technology has created more powerful tools and improved healt...

Publications IR 8053 (Final) October 22, 2015
https://csrc.nist.gov/pubs/ir/8053/final

Abstract: De-identification removes identifying information from a dataset so that individual data cannot be linked with specific individuals. De-identification can reduce the privacy risk associated with collecting, processing, archiving, distributing or publishing information. De-identification thus attempt...

Publications Project Description (Final) September 16, 2015
https://csrc.nist.gov/pubs/pd/2015/09/16/software-asset-management-continuous-monitoring/final

Abstract: Software asset management (SAM) is a key part of continuous monitoring. The approach described here is intended to support the automation of security functions such as risk-based decision making, collection of software inventory data, and inventory-based network access control. SAM, as envisioned in...

Publications FIPS 180-4 (Final) August 4, 2015
https://csrc.nist.gov/pubs/fips/180-4/upd1/final

Abstract: This standard specifies hash algorithms that can be used to generate digests of messages. The digests are used to detect whether messages have been changed since the digests were generated.

Publications Book Section (Final) July 29, 2015
https://csrc.nist.gov/pubs/book-section/2015/07/combinatorial-testing-theory-and-practice/final

In: Advances in Computers Abstract: Combinatorial testing has rapidly gained favor among software testers in the past decade as improved algorithms have become available and practical success has been demonstrated. This chapter reviews the theory and application of this method, focusing particularly on research since 2010, with a brie...

Publications Conference Paper (Final) July 20, 2015
https://csrc.nist.gov/pubs/conference/2015/07/20/pflash-secure-asymmetric-signatures-on-smart-cards/final

Conference: Lightweight Cryptography Workshop 2015 Abstract: We present PFLASH, an asymmetric digital signature scheme appropriate for smart card use. We present parameters for several security levels in this low resource environment and bootstrap many technical properties (including side-channel resistance) exposed in the evaluation of predecessors of this s...

Publications ITL Bulletin (Final) June 15, 2015
https://csrc.nist.gov/pubs/itlb/2015/06/increasing-visibility-and-control-of-your-ict-supp/final

Abstract: This bulletin summarizes the information presented in NIST Special Publication (SP) 800-161, Supply Chain Management Practices for Federal Information Systems and Organizations, which provides guidance to federal agencies on identifying, assessing and mitigating ICT supply chain risks at all levels...

Publications IR 8058 (Initial Public Draft) May 1, 2015
https://csrc.nist.gov/pubs/ir/8058/ipd

Abstract: The Security Content Automation Protocol (SCAP) is a suite of specifications that standardize the format and nomenclature by which software flaw and security configuration information is communicated, both to machines and humans. SCAP version 1.2 requirements are defined in NIST Special Publication...

<< first   < previous   77     78     79     80     81     82     83     84     85     86     87     88     89     90     91     92     93     94     95     96     97     98     99     100     101  next >  last >>