NIST

Results: 18894



#Item
431Cryptography / FIPS 201 / Standards / Computer access control / Authentication / Smart card / PIV / Public-key cryptography / Cryptographic key types / RSA Security

Interfaces for Personal Identity Verification

Add to Reading List

Source URL: nvlpubs.nist.gov

Language: English - Date: 2016-02-16 14:47:45
432Construction / Real estate / Cement / Concrete / Building materials / Structural engineering / Properties of concrete / Portland cement / Watercement ratio / Mortar / Belite / Lime

Water Movement during Internal Curing Direct observation using X-ray microtomography BY Dale P. Bentz, Phillip M. Halleck, Abraham S. Grader, and John W. Roberts

Add to Reading List

Source URL: ciks.cbt.nist.gov

Language: English - Date: 2006-11-13 09:14:46
433

NIST Three-Year Programmatic Plan, FY

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2015-06-16 10:05:55
    434

    LNCSUltra High Performance ECC over NIST Primes on Commercial FPGAs

    Add to Reading List

    Source URL: www.emsec.rub.de

    Language: English - Date: 2010-04-20 20:55:11
      435

      PRACTICE GUIDE | Energy NIST SP 1800-2a Identity and Access Management for Electric Utilities Executive Summary

      Add to Reading List

      Source URL: nccoe.nist.gov

      Language: English
        436

        Ed448-Goldilocks, a new elliptic curve

        Add to Reading List

        Source URL: csrc.nist.gov

        Language: English - Date: 2015-06-12 10:16:40
          437

          NIST SP 1800-3a Attribute Based Access Control Practice Guide Executive Summary

          Add to Reading List

          Source URL: nccoe.nist.gov

          Language: English
            438

            Draft NISTIR 7511 Revision 4, Security Content Automation Protocol (SCAP) Version 1.2 Validation Program Test Requirements

            Add to Reading List

            Source URL: csrc.nist.gov

            Language: English - Date: 2016-01-28 22:18:47
              439Computer security / Business / Risk analysis / Data security / Computing / Supply chain management / Supply chain risk management / National Institute of Standards and Technology / Security controls / Open Trusted Technology Provider Standard

              ITL Bulletin, Increasing Visibility and Control of Your ICT Supply Chains (June 2015)

              Add to Reading List

              Source URL: csrc.nist.gov

              Language: English - Date: 2015-06-15 11:08:27
              440

              An Analysis of High-Perfromance Primes at High-Security Levels

              Add to Reading List

              Source URL: csrc.nist.gov

              Language: English - Date: 2015-06-12 12:10:58
                UPDATE