NIST

Results: 18894



#Item
411

NIST CYBERSECURITY PRACTICE GUIDE HEALTH IT SECURING ELECTRONIC HEALTH RECORDS ON MOBILE DEVICES Approach, Architecture, and Security Characteristics

Add to Reading List

Source URL: nccoe.nist.gov

Language: English - Date: 2015-07-23 13:55:15
    412Cryptography / FIPS 201 / Standards / Identity documents / Computer access control / Personal identification number / Smart card / Authentication / PIV / Public-key cryptography

    NIST Interagency Report 7863

    Add to Reading List

    Source URL: nvlpubs.nist.gov

    Language: English - Date: 2015-06-17 14:09:24
    413

    Draft NISTIR 8074 Vol. 1, Report on Strategic U.S. Government Engagement in International Standardization to Achieve U.S. Objectives for Cybersecurity

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2015-12-30 07:50:43
      414

      EMR Usability (Title Pending)

      Add to Reading List

      Source URL: www.nist.gov

      Language: English - Date: 2011-06-08 08:37:08
        415

        # DoD-1 Organizat Comment Type ion or

        Add to Reading List

        Source URL: csrc.nist.gov

        Language: English - Date: 2015-05-29 13:36:08
          416

          The document contains a corrected version of Appendix D of Special Publication 80038B, which specifies examples for the CMAC authentication mode. In particular, the values of the MAC, T, for Examples 14, 15, 18, and 19 h

          Add to Reading List

          Source URL: csrc.nist.gov

          Language: English - Date: 2015-12-30 22:09:47
            417

            Efficient Side-Channel Attacks on Scalar Blinding on Elliptic Curves with Special Structure

            Add to Reading List

            Source URL: csrc.nist.gov

            Language: English - Date: 2015-06-12 08:52:32
              418

              Vehicle to Vehicle Safety Application using Elliptic Curve PKI

              Add to Reading List

              Source URL: csrc.nist.gov

              Language: English - Date: 2015-06-11 10:00:31
                419

                PRACTICE GUIDE | Health IT NIST SP 1800-1a Securing Electronic Health Records on Mobile Devices Executive Summary

                Add to Reading List

                Source URL: nccoe.nist.gov

                Language: English - Date: 2015-07-23 13:53:49
                  420Cryptography / Cryptographic hash functions / Hashing / Error detection and correction / NIST hash function competition / SHA-3 / Secure Hash Algorithm / SHA-2 / SHA-1 / Secure Hash Standard / Crypt / Hash function

                  Additional Secure hash Algorithm Standards Offer New Opportunities for Data Protection

                  Add to Reading List

                  Source URL: csrc.nist.gov

                  Language: English - Date: 2015-09-24 10:22:35
                  UPDATE