CINXE.COM
Search | CSRC
<!DOCTYPE html> <html lang="en-us" xml:lang="en-us"> <head><script type="text/javascript" src="/_static/js/bundle-playback.js?v=HxkREWBo" charset="utf-8"></script> <script type="text/javascript" src="/_static/js/wombat.js?v=txqj7nKC" charset="utf-8"></script> <script>window.RufflePlayer=window.RufflePlayer||{};window.RufflePlayer.config={"autoplay":"on","unmuteOverlay":"hidden"};</script> <script type="text/javascript" src="/_static/js/ruffle/ruffle.js"></script> <script type="text/javascript"> __wm.init("https://web.archive.org/web"); __wm.wombat("https://csrc.nist.gov/publications/conference-paper","20230923062103","https://web.archive.org/","web","/_static/", "1695450063"); </script> <link rel="stylesheet" type="text/css" href="/_static/css/banner-styles.css?v=S1zqJCYt" /> <link rel="stylesheet" type="text/css" href="/_static/css/iconochive.css?v=3PDvdIFv" /> <!-- End Wayback Rewrite JS Include --> <meta charset="utf-8"/> <title>Search | CSRC</title> <meta http-equiv="content-type" content="text/html; charset=UTF-8"/> <meta http-equiv="content-style-type" content="text/css"/> <meta http-equiv="content-script-type" content="text/javascript"/> <meta name="viewport" content="width=device-width, initial-scale=1.0"/> <meta name="msapplication-config" content="/CSRC/Media/images/favicons/browserconfig.xml"/> <meta name="theme-color" content="#000000"/> <meta name="google-site-verification" content="xbrnrVYDgLD-Bd64xHLCt4XsPXzUhQ-4lGMj4TdUUTA"/> <link rel="apple-touch-icon" sizes="180x180" href="/web/20230923062103im_/https://csrc.nist.gov/images/icons/apple-touch-icon.png"/> <link rel="icon" type="image/png" href="/web/20230923062103im_/https://csrc.nist.gov/images/icons/favicon-32x32.png" sizes="32x32"/> <link rel="icon" type="image/png" href="/web/20230923062103im_/https://csrc.nist.gov/images/icons/favicon-16x16.png" sizes="16x16"/> <link rel="manifest" href="/web/20230923062103/https://csrc.nist.gov/images/icons/manifest.json"/> <link rel="mask-icon" href="/web/20230923062103im_/https://csrc.nist.gov/images/icons/safari-pinned-tab.svg" color="#000000"/> <link href="/web/20230923062103im_/https://csrc.nist.gov/CSRC/Media/images/favicons/favicon.ico" type="image/x-icon" rel="shortcut icon"/> <link href="/web/20230923062103im_/https://csrc.nist.gov/CSRC/Media/images/favicons/favicon.ico" type="image/x-icon" rel="icon"/> <link href="/web/20230923062103cs_/https://csrc.nist.gov/dist/app.css" rel="stylesheet"/> <!-- reCAPTCHA v3 --> <style> .grecaptcha-badge { visibility: hidden; } </style> <script async type="text/javascript" id="_fed_an_ua_tag" src="https://web.archive.org/web/20230923062103js_/https://dap.digitalgov.gov/Universal-Federated-Analytics-Min.js?agency=nist&subagency=csrc&pua=UA-66610693-15&yt=true&exts=xsd,xml,wav,mpg,mpeg,avi,rtf,webm,ogg,ogv,oga,map,otf,eot,svg,ttf,woff"></script> <style id="antiClickjackCss"> body > * { display: none !important; } #antiClickjack { display: block !important; } </style> <noscript> <style id="antiClickjackNoScript"> body > * { display: block !important; } #antiClickjack { display: none !important; } </style> </noscript> <script type="text/javascript" id="antiClickjackScript"> if (self === top) { // no clickjacking var antiClickjack = document.getElementById("antiClickjackCss"); antiClickjack.parentNode.removeChild(antiClickjack); } else { setTimeout(tryForward(), 5000); } function tryForward() { top.location = self.location; } </script> <!-- Google tag (gtag.js) --> <script async src="https://web.archive.org/web/20230923062103js_/https://www.googletagmanager.com/gtag/js?id=G-TSQ0PLGJZP"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-TSQ0PLGJZP'); </script> </head> <body> <div id="antiClickjack" style="display: none;"> <strong style="font-size: 1.6rem;">You are viewing this page in an unauthorized frame window.</strong> <p>This is a potential security issue, you are being redirected to <a href="https://web.archive.org/web/20230923062103/https://csrc.nist.gov/">https://csrc.nist.gov</a>.</p> </div> <section class="usa-banner" aria-label="Official government website"> <div class="usa-accordion container"> <header class="usa-banner__header"> <noscript> <p style="font-size: 0.85rem; font-weight: bold;">You have JavaScript disabled. This site requires JavaScript to be enabled for complete site functionality.</p> </noscript> <img class="usa-banner__header-flag" src="/web/20230923062103im_/https://csrc.nist.gov/images/usbanner/us_flag_small.png" alt="U.S. flag"> <span class="usa-banner__header-text">An official website of the United States government</span> <button id="gov-banner-button" class="usa-accordion__button usa-banner__button" data-toggle="collapse" data-target="#gov-banner" aria-expanded="true" aria-controls="gov-banner"> <span class="usa-banner__button-text">Here's how you know</span> </button> </header> <div class="usa-banner__content usa-accordion__content collapse in" role="tabpanel" id="gov-banner" aria-expanded="true"> <div class="row"> <div class="col-md-5 col-sm-12"> <div class="row"> <div class="col-sm-2 col-xs-3"> <img class="usa-banner__icon usa-media-block__img" src="/web/20230923062103im_/https://csrc.nist.gov/images/usbanner/icon-dot-gov.svg" alt="Dot gov"> </div> <div class="col-sm-10 col-xs-9"> <p> <strong>Official websites use .gov</strong> <br> A <strong>.gov</strong> website belongs to an official government organization in the United States. </p> </div> </div> </div> <div class="col-md-5 col-sm-12"> <div class="row"> <div class="col-sm-2 col-xs-3"> <img class="usa-banner__icon usa-media-block__img" src="/web/20230923062103im_/https://csrc.nist.gov/images/usbanner/icon-https.svg" alt="Https"> </div> <div class="col-sm-10 col-xs-9"> <p> <strong>Secure .gov websites use HTTPS</strong> <br> A <strong>lock</strong> (<img class="usa-banner__lock" src="/web/20230923062103im_/https://csrc.nist.gov/images/usbanner/lock.svg" alt="Dot gov">) or <strong>https://</strong> means you've safely connected to the .gov website. Share sensitive information only on official, secure websites. </p> </div> </div> </div> </div> </div> </div> </section> <nav id="navbar" class="navbar"> <div id="nist-menu-container" class="container"> <div class="row"> <!-- Brand --> <div class="col-xs-6 col-md-4 navbar-header"> <a class="navbar-brand" href="https://web.archive.org/web/20230923062103/https://www.nist.gov/" target="_blank" id="navbar-brand-image"> <img src="/web/20230923062103im_/https://csrc.nist.gov/CSRC/media/images/svg/nist-logo.svg" alt="National Institute of Standards and Technology" width="110" height="30"> </a> </div> <div class="col-xs-6 col-md-8 navbar-nist-logo"> <div class="form-inline hidden-sm hidden-xs"> <form name="site-search" id="site-search-form" action="/web/20230923062103/https://csrc.nist.gov/search" method="GET"> <label for="search-csrc-query" class="element-invisible">Search</label> <input autocomplete="off" class="form-control" id="search-csrc-query" name="keywords" type="text" size="15" maxlength="128" placeholder="Search CSRC"/> <input type="hidden" name="ipp" value="25"/> <input type="hidden" name="sortBy" value="relevance"/> <input type="hidden" name="showOnly" value="publications,projects,news,events,presentations,glossary,topics"/> <input type="hidden" name="topicsMatch" value="ANY"/> <input type="hidden" name="status" value="Final,Draft"/> <button type="submit" id="search-csrc-submit-btn" class="form-submit"> <span class="element-invisible">Search</span> <i class="fa fa-search"></i> </button> </form> </div> <span id="nvd-menu-button" class="pull-right"> <a href="#" id="nvd-menu-button-link"> <span class="fa fa-bars"></span> <span id="nvd-menu-full-text">CSRC MENU</span> </a> </span> </div> </div> </div> <div class="form-inline hidden-md hidden-lg"> <form name="site-search-mobile" id="site-search-form-mobile" action="/web/20230923062103/https://csrc.nist.gov/search" method="GET"> <label for="search-csrc-query-mobile" class="element-invisible">Search</label> <input autocomplete="off" class="form-control" id="search-csrc-query-mobile" name="keywords" type="text" size="15" maxlength="128" placeholder="Search CSRC"/> <button type="submit" id="search-csrc-submit-btn-mobile" class="form-submit"> <span class="element-invisible">Search</span> <i class="fa fa-search"></i> </button> </form> </div> <div class="main-menu-row container"> <!-- Collect the nav links, forms, and other content for toggling --> <div id="main-menu-drop" class="col-lg-12" style="display: none;"> <ul> <li><a href="/web/20230923062103/https://csrc.nist.gov/projects">Projects</a></li> <li> <a href="/web/20230923062103/https://csrc.nist.gov/publications"> Publications <span class="expander fa fa-plus" id="main-menu-pubs-expander" data-expander-name="publications" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="publications" id="main-menu-pubs-expanded"> <div class="row"> <div class="col-lg-4"> <p><a href="/web/20230923062103/https://csrc.nist.gov/publications/drafts-open-for-comment">Drafts for Public Comment</a></p> <p><a href="/web/20230923062103/https://csrc.nist.gov/publications/draft-pubs">All Public Drafts</a></p> <p><a href="/web/20230923062103/https://csrc.nist.gov/publications/final-pubs">Final Pubs</a></p> <p><a href="/web/20230923062103/https://csrc.nist.gov/publications/fips">FIPS <small>(standards)</small></a></p> </div> <div class="col-lg-4"> <p><a href="/web/20230923062103/https://csrc.nist.gov/publications/sp">Special Publications (SP<small>s</small>)</a></p> <p><a href="/web/20230923062103/https://csrc.nist.gov/publications/ir">IR <small>(interagency/internal reports)</small></a></p> <p><a href="/web/20230923062103/https://csrc.nist.gov/publications/cswp">CSWP <small>(cybersecurity white papers)</small></a></p> <p><a href="/web/20230923062103/https://csrc.nist.gov/publications/itl-bulletin">ITL Bulletins</a></p> </div> <div class="col-lg-4"> <p><a href="/web/20230923062103/https://csrc.nist.gov/publications/project-description">Project Descriptions</a></p> <p><a href="/web/20230923062103/https://csrc.nist.gov/publications/journal-article">Journal Articles</a></p> <p><a href="/web/20230923062103/https://csrc.nist.gov/publications/conference-paper">Conference Papers</a></p> <p><a href="/web/20230923062103/https://csrc.nist.gov/publications/book">Books</a></p> </div> </div> </div> </li> <li> <a href="/web/20230923062103/https://csrc.nist.gov/topics"> Topics <span class="expander fa fa-plus" id="main-menu-topics-expander" data-expander-name="topics" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="topics" id="main-menu-topics-expanded"> <div class="row"> <div class="col-lg-4"> <p><a href="/web/20230923062103/https://csrc.nist.gov/Topics/Security-and-Privacy">Security & Privacy</a></p> <p><a href="/web/20230923062103/https://csrc.nist.gov/Topics/Applications">Applications</a></p> </div> <div class="col-lg-4"> <p><a href="/web/20230923062103/https://csrc.nist.gov/Topics/Technologies">Technologies</a></p> <p><a href="/web/20230923062103/https://csrc.nist.gov/Topics/Sectors">Sectors</a></p> </div> <div class="col-lg-4"> <p><a href="/web/20230923062103/https://csrc.nist.gov/Topics/Laws-and-Regulations">Laws & Regulations</a></p> <p><a href="/web/20230923062103/https://csrc.nist.gov/Topics/Activities-and-Products">Activities & Products</a></p> </div> </div> </div> </li> <li><a href="/web/20230923062103/https://csrc.nist.gov/news">News & Updates</a></li> <li><a href="/web/20230923062103/https://csrc.nist.gov/events">Events</a></li> <li><a href="/web/20230923062103/https://csrc.nist.gov/glossary">Glossary</a></li> <li> <a href="/web/20230923062103/https://csrc.nist.gov/about"> About CSRC <span class="expander fa fa-plus" id="main-menu-about-expander" data-expander-name="about" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="about" id="main-menu-about-expanded"> <div class="row"> <div class="col-lg-6"> <p> <strong><a href="/web/20230923062103/https://csrc.nist.gov/Groups/Computer-Security-Division">Computer Security Division</a></strong><br/> <ul> <li><a href="/web/20230923062103/https://csrc.nist.gov/Groups/Computer-Security-Division/Cryptographic-Technology">Cryptographic Technology</a></li> <li><a href="/web/20230923062103/https://csrc.nist.gov/Groups/Computer-Security-Division/Secure-Systems-and-Applications">Secure Systems and Applications</a></li> <li><a href="/web/20230923062103/https://csrc.nist.gov/Groups/Computer-Security-Division/Security-Components-and-Mechanisms">Security Components and Mechanisms</a></li> <li><a href="/web/20230923062103/https://csrc.nist.gov/Groups/Computer-Security-Division/Security-Engineering-and-Risk-Management">Security Engineering and Risk Management</a></li> <li><a href="/web/20230923062103/https://csrc.nist.gov/Groups/Computer-Security-Division/Security-Testing-Validation-and-Measurement">Security Testing, Validation, and Measurement</a></li> </ul> </p> </div> <div class="col-lg-6"> <p> <strong><a href="/web/20230923062103/https://csrc.nist.gov/Groups/Applied-Cybersecurity-Division">Applied Cybersecurity Division</a></strong><br/> <ul> <li><a href="/web/20230923062103/https://csrc.nist.gov/Groups/Applied-Cybersecurity-Division/Cybersecurity-and-Privacy-Applications">Cybersecurity and Privacy Applications</a></li> <li><a href="/web/20230923062103/https://csrc.nist.gov/Groups/Applied-Cybersecurity-Division/National-Cybersecurity-Center-of-Excellence">National Cybersecurity Center of Excellence (NCCoE)</a></li> <li><a href="https://web.archive.org/web/20230923062103/https://www.nist.gov/nice/">National Initiative for Cybersecurity Education (NICE)</a></li> </ul> </p> <p> <a href="/web/20230923062103/https://csrc.nist.gov/contact"> Contact Us </a> </p> </div> </div> </div> </li> </ul> </div><!-- /#mobile-nav-container --> </div> </nav> <section id="itl-header" class="has-menu"> <div class="container"> <div class="row"> <div class="col-sm-12 col-md-8"> <div class="hidden-xs hidden-sm" id="itl-header-lg"> <a href="https://web.archive.org/web/20230923062103/https://www.nist.gov/itl" target="_blank" id="itl-header-link">Information Technology Laboratory</a> </div> <div class="hidden-xs hidden-sm" id="csrc-header-lg"> <a href="/web/20230923062103/https://csrc.nist.gov/" id="csrc-header-link-lg">Computer Security Resource Center</a> </div> </div> <div class="col-sm-12 col-md-4"> <div class="hidden-xs hidden-sm hidden-md"> <a id="logo-csrc-lg" href="/web/20230923062103/https://csrc.nist.gov/"><img id="img-logo-csrc-lg" src="/web/20230923062103im_/https://csrc.nist.gov/CSRC/Media/images/nist-logo-csrc-white.svg" alt="CSRC Logo" class="csrc-header-logo"></a> </div> <div class="hidden-lg"> <a id="logo-csrc-sm" href="/web/20230923062103/https://csrc.nist.gov/"><img id="img-logo-csrc-sm" src="/web/20230923062103im_/https://csrc.nist.gov/CSRC/Media/images/nist-logo-csrc-white.svg" alt="CSRC Logo" class="csrc-header-logo"></a> </div> </div> </div> </div> </section> <div id="body-section" class="container"> <div class="publications-content"> <div class="row"> <div class="col-lg-3 col-md-4 hidden-sm hidden-xs hidden-xxs"> <div id="publications-quicklinks-lg" class="bs-callout bs-callout-subnav hidden-sm hidden-xs hidden-xxs"> <h4>Current Publications <i class="fa fa-bolt"></i></h4> <ul> <li> <strong> NIST Series Pubs <i class="fa fa-info-circle" aria-hidden="true" data-placement="right" data-html="true" data-tooltip-toggle="tooltipWithFunction" data-title-container="nist-series-pubs-tooltip"></i> </strong> <ul> <li><a href="/web/20230923062103/https://csrc.nist.gov/publications/final-pubs" id="quick-link-final-lg">Final Pubs</a></li> <li><a href="/web/20230923062103/https://csrc.nist.gov/publications/drafts-open-for-comment" id="quick-links-comments-lg">Drafts Open for Comment</a></li> <li><a href="/web/20230923062103/https://csrc.nist.gov/publications/draft-pubs" id="quick-link-draft-lg">Drafts</a> (all)</li> <li> <strong> View By Series <i class="fa fa-info-circle" aria-hidden="true" data-placement="right" data-html="true" data-tooltip-toggle="tooltipWithFunction" data-title-container="nist-view-series-pubs-tooltip"></i> </strong> <ul> <li><a href="/web/20230923062103/https://csrc.nist.gov/publications/fips" id="quick-link-fips-lg">FIPS</a> (standards)</li> <li><a href="/web/20230923062103/https://csrc.nist.gov/publications/sp800" id="quick-link-sp-800-lg">SP 800</a> (guidance)</li> <li><a href="/web/20230923062103/https://csrc.nist.gov/publications/sp1800" id="quick-link-sp-1800-lg">SP 1800</a> (practice guides)</li> <li><a href="/web/20230923062103/https://csrc.nist.gov/publications/sp" id="quick-link-sp-lg">SP</a> (all subseries)</li> <li><a href="/web/20230923062103/https://csrc.nist.gov/publications/ir" id="quick-link-nistir-lg">IR</a> (interagency/internal reports)</li> <li><a href="/web/20230923062103/https://csrc.nist.gov/publications/cswp" id="quick-link-white-papers-lg">CSWP</a> (cybersecurity white papers)</li> <li><a href="/web/20230923062103/https://csrc.nist.gov/publications/itl-bulletin" id="quick-link-itl-bul-lg">ITL Bulletins</a></li> </ul> </li> </ul> </li> <li> <strong> Other Pubs <i class="fa fa-info-circle" aria-hidden="true" data-placement="right" data-html="true" data-tooltip-toggle="tooltipWithFunction" data-title-container="nist-other-pubs-tooltip"></i> </strong> <ul> <li><a href="/web/20230923062103/https://csrc.nist.gov/publications/project-description" id="quick-link-project-description-lg">Project Descriptions</a></li> <li><a href="/web/20230923062103/https://csrc.nist.gov/publications/journal-article" id="quick-link-journal-articles-lg">Journal Articles</a></li> <li><a href="/web/20230923062103/https://csrc.nist.gov/publications/conference-paper" id="quick-link-conference-papers-lg">Conference Papers</a></li> <li><a href="/web/20230923062103/https://csrc.nist.gov/publications/book" id="quick-link-books-lg">Books</a></li> <li><a href="/web/20230923062103/https://csrc.nist.gov/publications/other" id="quick-link-other-lg">Other</a></li> </ul> </li> </ul> <span style="display: none;" id="nist-series-pubs-tooltip"> <strong>Final:</strong> <em>Current list of all published NIST cybersecurity documents.</em> Does not include "Withdrawn" documents. Includes FIPS, Special Publications, NISTIRs, ITL Bulletins, and NIST Cybersecurity White Papers.<br/> <br/> <strong>Public Drafts:</strong> <em>Current list of all draft NIST cybersecurity documents--they are typically posted for public comment.</em> "Current" public drafts are the latest draft versions that have not yet been published as "Final." </span> <span style="display: none;" id="nist-view-series-pubs-tooltip"> <strong>FIPS:</strong> <em>Current Federal Information Processing Standard Publications (FIPS).</em> Includes current (Final and Draft) FIPS.<br/> <br/> <strong>SP 800 Series:</strong> <em>Current NIST Special Publication (SP) 800 series publications, which focus on Computer/Information Security.</em> Includes current (Final and Draft) SP 800 pubs.<br/> <br/> <strong>All SP Series:</strong> <em> Current NIST Special Publications (SP), including SP 800 (Computer/Information Security) and SP 1800 (Cybersecurity Practice Guides) pubs. Also includes SP 500 (Computer Systems Technology) pubs related to cybersecurity and privacy. </em> Includes current (Final and Draft) NIST Special Publications.<br/> <br/> <strong>NISTIRs:</strong> <em>Current list of NIST Interagency or Internal Reports (NISTIR) related to cybersecurity and privacy.</em> Includes current (Final and Draft) NISTIRs.<br/> <br/> <strong>ITL Bulletins:</strong> Current list of NIST Information Technology Laboratory (ITL) Bulletins. </span> <span style="display: none;" id="nist-other-pubs-tooltip"> <strong>White Papers:</strong> <em> Consists of NIST Cybersecurity White Papers; NCCoE Project Descriptions, Building Blocks and Use Cases; and other NIST-authored papers that are not part of a formal series. </em> Includes current (Final and Draft) papers.<br/> <br/> <strong>Journal Articles:</strong> NIST-authored articles published in external journals and in the NIST Journal of Research (JRES).<br/> <br/> <strong>Conference Papers:</strong> NIST-authored conference papers related to cybersecurity and privacy.<br/> <br/> <strong>Books:</strong> NIST-authored books, book sections, and encyclopedia entries related to cybersecurity and privacy. </span> </div> <form action="/web/20230923062103/https://csrc.nist.gov/publications/search" class="bs-callout bs-callout-success csrc-search-form hidden-sm hidden-xs hidden-xxs" data-csrc-form="true" data-default-query="sortBy-lg=releasedate+DESC&viewMode-lg=brief&ipp-lg=ALL&status-lg=Final&series-lg=Conference+Paper" data-form-ignore-default="sortBy" data-form-name="pubSearchDesktop" id="pubs-search-form-lg" method="get"> <div class="form-group"> <label for="keywords-lg">Search</label> <input name="keywords-lg" class="form-control" data-val="true" data-val-length="The field Search must be a string with a maximum length of 255." data-val-length-max="255" id="keywords-lg" name="Form.Keywords" type="text" value=""/> <em class="text-muted">Search publication record data<br/> (not a full text search)</em> </div> <div class="form-group"> <label for="sortBy-lg">Sort By</label> <div class="form-inline"> <select name="sortBy-lg" class="form-control" id="sortBy-lg" name="Form.SortBy"><option value="relevance">Relevance (best match)</option> <option selected="selected" value="releasedate DESC">Release Date (newest first)</option> <option value="releasedate ASC">Release Date (oldest first)</option> <option value="Series ASC">Series (A-Z)</option> <option value="Series DESC">Series (Z-A)</option> <option value="Number ASC">Number (lowest to highest)</option> <option value="Number DESC">Number (highest to lowest)</option> <option value="title asc">Title (A-Z)</option> <option value="title desc">Title (Z-A)</option> </select> </div> </div> <div class="form-group"> <label for="viewMode-lg">Results View</label> <select name="viewMode-lg" class="form-control" id="viewMode-lg" name="Form.ResultsViewMode"><option selected="selected" value="brief">Brief</option> <option value="summary">Summary</option> </select> </div> <div class="form-group form-inline"> <label for="ipp-lg" class="form-control-half">Items Per Page</label> <select name="ipp-lg" class="form-control" id="ipp-lg" name="Form.ItemsPerPage"><option value="50">50</option> <option value="75">75</option> <option value="100">100</option> <option selected="selected" value="all">All</option> </select> </div> <div class="form-group"> <label for="dateFrom-lg">Date</label> <div class="form-inline form-date-inline"> <div class="input-group date" data-date-picker="true"> <input name="dateFrom-lg" class="form-control" data-control-type="date" data-val="true" data-val-date="The field Date must be a date." data-validation="true" data-validation-compare-field="dateTo-lg" data-validation-message="From date must be less than To date" data-validation-type="less-than-date" id="dateFrom-lg" name="Form.DateFrom" placeholder=" / / " type="text" value=""/> <span class="input-group-addon"> <span class="fa fa-calendar"> </span> </span> </div> <div class="input-group date" data-date-picker="true"> <input name="dateTo-lg" class="form-control" data-control-type="date" data-val="true" data-val-date="The field DateTo must be a date." id="dateTo-lg" name="Form.DateTo" placeholder=" / / " type="text" value=""/> <span class="input-group-addon"> <span class="fa fa-calendar"> </span> </span> </div> </div> </div> <div class="form-group"> <label for="status-all-lg"> Status <i class="fa fa-info-circle" aria-hidden="true" data-placement="right" data-html="true" data-tooltip-toggle="tooltipWithFunction" data-title-container="publications-status-info"></i> </label> <div class="form-inline status-type" style="margin-left: 1rem;"> <label class="meta-label"> <input type="checkbox" id="status-final-lg" name="status-lg" value="Final" data-default-checked="True" checked="'checked'"/> Final<br/> </label> <label class="meta-label"> <input type="checkbox" id="status-draft-lg" name="status-lg" value="Draft" data-default-checked="True"/> Public Draft<br/> </label> <label class="meta-label"> <input type="checkbox" id="status-withdrawn-lg" name="status-lg" value="Withdrawn" data-default-checked="True"/> Withdrawn<br/> </label> </div> </div> <div class="form-group"> <label for="pub-search-series"> Series <button type="button" id="series-all-lg" class="btn btn-sm btn-success" data-check-all="series-lg">Check All</button> <button type="button" id="series-clear-lg" class="btn btn-sm btn-success" data-check-none="series-lg">Clear</button> </label> <div class="form-inline series-type" style="margin-left: 1rem;"> <label class="meta-label"> <input type="checkbox" id="series-b2b6ef80-0dec-4d48-ae2d-a37ab486a846-lg" name="series-lg" value="FIPS" data-default-checked="True"/> FIPS<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-749c7275-15f5-4eec-8cb9-3b6f1528756c-lg" name="series-lg" value="SP" data-default-checked="True"/> SP<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-344a35c7-520e-4845-88b0-6997147ffc76-lg" name="series-lg" value="IR" data-default-checked="True"/> IR<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-5f83968e-4758-479d-9aa4-1d42166b7deb-lg" name="series-lg" value="CSWP" data-default-checked="True"/> CSWP<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-b2004197-4249-454a-bdce-edc6186b5c60-lg" name="series-lg" value="TN" data-default-checked="True"/> TN<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-09acb409-e18b-4a05-ac84-631662bcccd9-lg" name="series-lg" value="VTS" data-default-checked="True"/> VTS<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-8022364e-73db-4498-b2eb-9317ce32fff2-lg" name="series-lg" value="AI" data-default-checked="True"/> AI<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-57afe5d0-383f-4fd6-b702-84233dcd5f13-lg" name="series-lg" value="GCR" data-default-checked="True"/> GCR<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-23801152-858e-4dbc-baad-eb51795cf0e2-lg" name="series-lg" value="Project Description" data-default-checked="True"/> Project Description<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-8c9f1828-ae8a-4f03-8d9f-9ff7192b508e-lg" name="series-lg" value="ITL Bulletin" data-default-checked="True"/> ITL Bulletin<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-debd6afb-aeaa-4790-a32b-c977c9654df0-lg" name="series-lg" value="Journal Article" data-default-checked="True"/> Journal Article<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-ed478237-d49d-41c6-91ed-5dd341bd50c8-lg" name="series-lg" value="Conference Paper" data-default-checked="True" checked="'checked'/"> Conference Paper<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-f2273ac7-d756-4cce-b006-a527778c84f0-lg" name="series-lg" value="Book" data-default-checked="True"/> Book<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-80e369a4-bea5-46f5-8082-91f19c3eeefa-lg" name="series-lg" value="Book Section" data-default-checked="True"/> Book Section<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-b1570e28-332c-4f29-a1e0-cd31c3930848-lg" name="series-lg" value="Other" data-default-checked="True"/> Other<br/> </label> </div> </div> <div class="form-group"> <label for="pub-search-topics-lg"> Topics </label> <input name="topics-lg" id="topics-lg" name="Form.Topics" type="hidden" value=""/> <div class="form-control topics-selection" id="pub-search-topics-lg" contenteditable="true" data-drop-target="pub-search-topics-drop-lg" data-field-name="topics-lg" aria-haspopup="true"> </div> <div class="topics-selection-dropdown desktop" id="pub-search-topics-drop-lg" style="display: none;" data-topics-selector=""><div class="col-sm-4"><strong>Security and Privacy</strong><br/> <ul><li><i class="fa fa-plus fa-fw" id="topics-expander-pstdl-24670-27481" data-expander-for="/topics/security-and-privacy/cryptography"></i> <a data-topic-id="27481" data-topic-text="cryptography">cryptography</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27647" data-topic-text="digital signatures">digital signatures</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27648" data-topic-text="encryption">encryption</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27649" data-topic-text="key management">key management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="30027" data-topic-text="lightweight cryptography">lightweight cryptography</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27650" data-topic-text="message authentication">message authentication</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27651" data-topic-text="post-quantum cryptography">post-quantum cryptography</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27652" data-topic-text="random number generation">random number generation</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27653" data-topic-text="secure hashing">secure hashing</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27482" data-topic-text="cybersecurity supply chain risk management">cybersecurity supply chain risk management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27483" data-topic-text="general security & privacy">general security & privacy</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstdl-24670-27484" data-expander-for="/topics/security-and-privacy/identity-and-access-management"></i> <a data-topic-id="27484" data-topic-text="identity & access management">identity & access management</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27663" data-topic-text="access authorization">access authorization</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27664" data-topic-text="access control">access control</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27665" data-topic-text="authentication">authentication</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27666" data-topic-text="Personal Identity Verification">Personal Identity Verification</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27667" data-topic-text="public key infrastructure">public key infrastructure</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstdl-24670-27485" data-expander-for="/topics/security-and-privacy/privacy"></i> <a data-topic-id="27485" data-topic-text="privacy">privacy</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27680" data-topic-text="personally identifiable information">personally identifiable information</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27681" data-topic-text="privacy engineering">privacy engineering</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstdl-24670-27486" data-expander-for="/topics/security-and-privacy/risk-management"></i> <a data-topic-id="27486" data-topic-text="risk management">risk management</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27682" data-topic-text="categorization">categorization</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27683" data-topic-text="continuous monitoring">continuous monitoring</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstdl-27486-27684" data-expander-for="/topics/security-and-privacy/risk-management/controls"></i> <a data-topic-id="27684" data-topic-text="controls">controls</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27767" data-topic-text="controls assessment">controls assessment</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27768" data-topic-text="privacy controls">privacy controls</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27769" data-topic-text="security controls">security controls</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27685" data-topic-text="risk assessment">risk assessment</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27686" data-topic-text="roots of trust">roots of trust</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27687" data-topic-text="system authorization">system authorization</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstdl-27486-27688" data-expander-for="/topics/security-and-privacy/risk-management/threats"></i> <a data-topic-id="27688" data-topic-text="threats">threats</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27770" data-topic-text="advanced persistent threats">advanced persistent threats</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27771" data-topic-text="botnets">botnets</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27772" data-topic-text="information sharing">information sharing</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27773" data-topic-text="intrusion detection & prevention">intrusion detection & prevention</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27774" data-topic-text="malware">malware</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27689" data-topic-text="vulnerability management">vulnerability management</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstdl-24670-27487" data-expander-for="/topics/security-and-privacy/security-and-behavior"></i> <a data-topic-id="27487" data-topic-text="security & behavior">security & behavior</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27709" data-topic-text="accessibility">accessibility</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27710" data-topic-text="behavior">behavior</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27711" data-topic-text="usability">usability</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstdl-24670-27488" data-expander-for="/topics/security-and-privacy/security-measurement"></i> <a data-topic-id="27488" data-topic-text="security measurement">security measurement</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27690" data-topic-text="analytics">analytics</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27691" data-topic-text="assurance">assurance</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27692" data-topic-text="modeling">modeling</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27693" data-topic-text="testing & validation">testing & validation</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstdl-24670-27489" data-expander-for="/topics/security-and-privacy/security-programs-and-operations"></i> <a data-topic-id="27489" data-topic-text="security programs & operations">security programs & operations</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27694" data-topic-text="acquisition">acquisition</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27695" data-topic-text="asset management">asset management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27696" data-topic-text="audit & accountability">audit & accountability</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27697" data-topic-text="awareness training & education">awareness training & education</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27698" data-topic-text="configuration management">configuration management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27699" data-topic-text="contingency planning">contingency planning</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27700" data-topic-text="incident response">incident response</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27701" data-topic-text="maintenance">maintenance</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27702" data-topic-text="media protection">media protection</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27703" data-topic-text="patch management">patch management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27704" data-topic-text="personnel security">personnel security</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27705" data-topic-text="physical & environmental protection">physical & environmental protection</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27706" data-topic-text="planning">planning</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27707" data-topic-text="program management">program management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27708" data-topic-text="security automation">security automation</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstdl-24670-27490" data-expander-for="/topics/security-and-privacy/systems-security-engineering"></i> <a data-topic-id="27490" data-topic-text="systems security engineering">systems security engineering</a><ul style="display: none;"><li><i class="fa fa-plus fa-fw" id="topics-expander-pstdl-27490-27713" data-expander-for="/topics/security-and-privacy/systems-security-engineering/trustworthiness"></i> <a data-topic-id="27713" data-topic-text="trustworthiness">trustworthiness</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27775" data-topic-text="reliability">reliability</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27776" data-topic-text="resilience">resilience</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27777" data-topic-text="safety">safety</a></li></ul> </li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="28469" data-topic-text="zero trust">zero trust</a></li></ul><strong>Technologies</strong><br/> <ul><li><i class="fa fa-fw"></i> <a data-topic-id="27491" data-topic-text="artificial intelligence">artificial intelligence</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27492" data-topic-text="big data">big data</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27493" data-topic-text="biometrics">biometrics</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27494" data-topic-text="blockchain">blockchain</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27495" data-topic-text="cloud & virtualization">cloud & virtualization</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27496" data-topic-text="combinatorial testing">combinatorial testing</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27497" data-topic-text="complexity">complexity</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstdl-24671-27499" data-expander-for="/topics/technologies/hardware"></i> <a data-topic-id="27499" data-topic-text="hardware">hardware</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27714" data-topic-text="circuits">circuits</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27715" data-topic-text="personal computers">personal computers</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27716" data-topic-text="sensors">sensors</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27498" data-topic-text="mobile">mobile</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstdl-24671-27500" data-expander-for="/topics/technologies/networks"></i> <a data-topic-id="27500" data-topic-text="networks">networks</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27717" data-topic-text="email">email</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27718" data-topic-text="firewalls">firewalls</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27719" data-topic-text="internet">internet</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27501" data-topic-text="quantum information science">quantum information science</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27502" data-topic-text="servers">servers</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27503" data-topic-text="smart cards">smart cards</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstdl-24671-27504" data-expander-for="/topics/technologies/software-firmware"></i> <a data-topic-id="27504" data-topic-text="software & firmware">software & firmware</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27720" data-topic-text="BIOS">BIOS</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27721" data-topic-text="databases">databases</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27722" data-topic-text="operating systems">operating systems</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27505" data-topic-text="storage">storage</a></li></ul></div><div class="col-sm-4"><strong>Applications</strong><br/> <ul><li><i class="fa fa-fw"></i> <a data-topic-id="27456" data-topic-text="communications & wireless">communications & wireless</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27457" data-topic-text="cyber-physical systems">cyber-physical systems</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27458" data-topic-text="cybersecurity education">cybersecurity education</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27459" data-topic-text="cybersecurity framework">cybersecurity framework</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27460" data-topic-text="cybersecurity workforce">cybersecurity workforce</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27461" data-topic-text="enterprise">enterprise</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27462" data-topic-text="forensics">forensics</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27463" data-topic-text="industrial control systems">industrial control systems</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27464" data-topic-text="Internet of Things">Internet of Things</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="29979" data-topic-text="mathematics">mathematics</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27920" data-topic-text="positioning navigation & timing">positioning navigation & timing</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27465" data-topic-text="small & medium business">small & medium business</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27466" data-topic-text="telework">telework</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27467" data-topic-text="voting">voting</a></li></ul><strong>Laws and Regulations</strong><br/> <ul><li><i class="fa fa-plus fa-fw" id="topics-expander-pstdl-24673-27468" data-expander-for="/topics/laws-and-regulations/executive-documents"></i> <a data-topic-id="27468" data-topic-text="executive documents">executive documents</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27668" data-topic-text="Comprehensive National Cybersecurity Initiative">Comprehensive National Cybersecurity Initiative</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27669" data-topic-text="Cybersecurity Strategy and Implementation Plan">Cybersecurity Strategy and Implementation Plan</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27670" data-topic-text="Cyberspace Policy Review">Cyberspace Policy Review</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27671" data-topic-text="Executive Order 13636">Executive Order 13636</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27672" data-topic-text="Executive Order 13702">Executive Order 13702</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27673" data-topic-text="Executive Order 13718">Executive Order 13718</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27674" data-topic-text="Executive Order 13800">Executive Order 13800</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27921" data-topic-text="Executive Order 13905">Executive Order 13905</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="28468" data-topic-text="Executive Order 14028">Executive Order 14028</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27675" data-topic-text="Federal Cybersecurity Research and Development Strategic Plan">Federal Cybersecurity Research and Development Strategic Plan</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27676" data-topic-text="Homeland Security Presidential Directive 7">Homeland Security Presidential Directive 7</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27677" data-topic-text="Homeland Security Presidential Directive 12">Homeland Security Presidential Directive 12</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27678" data-topic-text="OMB Circular A-11">OMB Circular A-11</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27679" data-topic-text="OMB Circular A-130">OMB Circular A-130</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstdl-24673-27469" data-expander-for="/topics/laws-and-regulations/laws"></i> <a data-topic-id="27469" data-topic-text="laws">laws</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="35986" data-topic-text="CHIPS and Science Act">CHIPS and Science Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27654" data-topic-text="Cyber Security R&D Act">Cyber Security R&D; Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27655" data-topic-text="Cybersecurity Enhancement Act">Cybersecurity Enhancement Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27656" data-topic-text="E-Government Act">E-Government Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27657" data-topic-text="Energy Independence and Security Act">Energy Independence and Security Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27658" data-topic-text="Federal Information Security Modernization Act">Federal Information Security Modernization Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27659" data-topic-text="First Responder Network Authority">First Responder Network Authority</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27660" data-topic-text="Health Insurance Portability and Accountability Act">Health Insurance Portability and Accountability Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27661" data-topic-text="Help America Vote Act">Help America Vote Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="28580" data-topic-text="Internet of Things Cybersecurity Improvement Act">Internet of Things Cybersecurity Improvement Act</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstdl-24673-27470" data-expander-for="/topics/laws-and-regulations/regulations"></i> <a data-topic-id="27470" data-topic-text="regulations">regulations</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27662" data-topic-text="Federal Acquisition Regulation">Federal Acquisition Regulation</a></li></ul> </li></ul></div><div class="col-sm-4"><strong>Activities and Products</strong><br/> <ul><li><i class="fa fa-fw"></i> <a data-topic-id="27452" data-topic-text="annual reports">annual reports</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27453" data-topic-text="conferences & workshops">conferences & workshops</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="30210" data-topic-text="groups">groups</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27454" data-topic-text="reference materials">reference materials</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27455" data-topic-text="standards development">standards development</a></li></ul><strong>Sectors</strong><br/> <ul><li><i class="fa fa-fw"></i> <a data-topic-id="27471" data-topic-text="aerospace">aerospace</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstdl-24675-27472" data-expander-for="/topics/sectors/energy"></i> <a data-topic-id="27472" data-topic-text="energy">energy</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27712" data-topic-text="smart grid">smart grid</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27473" data-topic-text="financial services">financial services</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27474" data-topic-text="healthcare">healthcare</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27475" data-topic-text="hospitality">hospitality</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27476" data-topic-text="manufacturing">manufacturing</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27477" data-topic-text="public safety">public safety</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27478" data-topic-text="retail">retail</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27479" data-topic-text="telecommunications">telecommunications</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27480" data-topic-text="transportation">transportation</a></li></ul></div></div> <div class="form-inline topics-type"> <label class="radio-label">Match ANY: <input name="topicsMatch-lg" checked="checked" id="topicsMatch-any-lg" name="Form.TopicsMatch" type="radio" value="ANY"/></label> <label class="radio-label">Match ALL: <input name="topicsMatch-lg" id="topicsMatch-all-lg" name="Form.TopicsMatch" type="radio" value="ALL"/></label> </div> </div> <div class="form-group"> <label for="pub-search-controls-lg"> Control Family (800-53) </label> <input name="controls-lg" id="controls-lg" name="Form.Controls" type="hidden" value=""/> <div class="form-control controls-selection" id="pub-search-controls-lg" contenteditable="true" data-drop-target="pub-search-controls-drop-lg" data-field-name="controls-lg" aria-haspopup="true"> </div> <div class="controls-selection-dropdown desktop" id="pub-search-controls-drop-lg" style="display: none;" data-controls-selector=""> <strong>Control Families</strong> <ul> <li><a data-control-id="2049a555-9a3e-4395-88bc-8304c6d9b157">AC - Access Control</a></li> <li><a data-control-id="bb24a9c9-944e-41fc-b6a9-7c4217e054df">AT - Awareness and Training</a></li> <li><a data-control-id="b491696a-7f6b-4b1e-9145-b02938d9c279">AU - Audit and Accountability</a></li> <li><a data-control-id="27484ffc-ac08-40b0-8862-4be4154560e4">CA - Assessment, Authorization and Monitoring</a></li> <li><a data-control-id="b8b9a292-32ad-4698-abad-45c70b40757d">CM - Configuration Management</a></li> <li><a data-control-id="5604c7e8-b158-48c6-a497-c5357a43e7c2">CP - Contingency Planning</a></li> <li><a data-control-id="2b79dd04-6118-44ee-b54d-854948a5b55f">IA - Identification and Authentication</a></li> <li><a data-control-id="b6c1c9c0-3cf8-46c9-b2ae-4cd608f88b11">IR - Incident Response</a></li> <li><a data-control-id="c8219b58-a95d-4882-8e74-0c19369aceb6">MA - Maintenance</a></li> <li><a data-control-id="84b5d6fa-8fbc-4d32-b559-47a626a510b3">MP - Media Protection</a></li> <li><a data-control-id="f3703fe4-b51d-4139-98eb-1656b00fc4ed">PE - Physical and Environmental Protection</a></li> <li><a data-control-id="137c4d9f-6541-4431-bb88-d0d003ce039f">PL - Planning</a></li> <li><a data-control-id="6401481d-3689-49bb-840c-73256cfb102e">PM - Program Management</a></li> <li><a data-control-id="408d8a82-1783-414d-a303-d79525c87f6a">PS - Personnel Security</a></li> <li><a data-control-id="9f34a4cb-3ba3-49e1-8c5c-5aa38c2151e7">PT - PII Processing and Transparency</a></li> <li><a data-control-id="1d0ff39c-a0ed-408e-8251-fbcd24dc74eb">RA - Risk Assessment</a></li> <li><a data-control-id="d1d6d136-ad89-4ab2-9207-6bec08ef6299">SA - System and Services Acquisition</a></li> <li><a data-control-id="2067a45e-da04-471b-95ad-d0882d74ccaf">SC - System and Communications Protection</a></li> <li><a data-control-id="1d78556b-00f2-47e7-992a-9d8fb08bda2a">SI - System and Information Integrity</a></li> <li><a data-control-id="6a7ab58f-e8ef-4264-aad0-29c656a03c59">SR - Supply Chain Risk Management</a></li> </ul> </div> <div class="form-inline controls-type"> <label class="radio-label">Match ANY: <input name="controlsMatch-lg" checked="checked" id="controlsMatch-any-lg" name="Form.ControlsMatch" type="radio" value="ANY"/></label> <label class="radio-label">Match ALL: <input name="controlsMatch-lg" id="controlsMatch-all-lg" name="Form.ControlsMatch" type="radio" value="ALL"/></label> </div> </div> <div style="display: none;" data-form-error-pane="true" class="text-danger"> <strong class="text-danger">Please fix the following:</strong> <ul data-form-error-list="true"> </ul> <div class="validation-summary-valid" data-valmsg-summary="true"><ul><li style="display:none"></li> </ul></div> </div> <div class="form-group"> <button type="submit" id="pubs-search-submit-lg" name="submit-btn" data-form-button="submit" class="btn">Search</button> <button type="reset" id="pubs-search-reset-lg" name="reset-btn" data-form-button="reset" class="btn">Reset</button> </div> <span style="display: none;" id="publications-status-info"> <p><strong>Final:</strong> Published documents.</p> <p><strong>Public Draft:</strong> Documents have been posted as Public Drafts, typically with a public comment period.</p> <p> <strong>Withdrawn:</strong> Documents that have been withdrawn, and are no longer current. This includes:<br/> - Final publications that have been withdrawn;<br/> - Public drafts that have been obsoleted by a subsequent draft or final publication;<br/> - Public drafts that have been retired—further development was discontinued. </p> </span> </form> </div> <div class="col-lg-9 col-md-8 col-sm-12 col-xs-12 col-xxs-12"> <h4>Search Results</h4> <form action="/web/20230923062103/https://csrc.nist.gov/publications/search" class="bs-callout bs-callout-success csrc-search-form hidden-lg hidden-md mobile-form" data-csrc-form="true" data-default-query="sortBy-lg=releasedate+DESC&viewMode-lg=brief&ipp-lg=ALL&status-lg=Final&series-lg=Conference+Paper" data-form-ignore-default="sortBy" data-form-name="pubSearchMobile" id="pubs-search-form-sm" method="get"> <div class="form-group"> <label for="keywords-sm">Search</label> <input name="keywords-sm" class="form-control" data-val="true" data-val-length="The field Search must be a string with a maximum length of 255." data-val-length-max="255" id="keywords-sm" name="Form.Keywords" type="text" value=""/> <em class="text-muted">Search publication record data<br/> (not a full text search)</em> </div> <div class="form-group"> <label for="sortBy-sm">Sort By</label> <div class="form-inline"> <select name="sortBy-sm" class="form-control" id="sortBy-sm" name="Form.SortBy"><option value="relevance">Relevance (best match)</option> <option selected="selected" value="releasedate DESC">Release Date (newest first)</option> <option value="releasedate ASC">Release Date (oldest first)</option> <option value="Series ASC">Series (A-Z)</option> <option value="Series DESC">Series (Z-A)</option> <option value="Number ASC">Number (lowest to highest)</option> <option value="Number DESC">Number (highest to lowest)</option> <option value="title asc">Title (A-Z)</option> <option value="title desc">Title (Z-A)</option> </select> </div> </div> <div class="form-group"> <label for="viewMode-sm">Results View</label> <select name="viewMode-sm" class="form-control" id="viewMode-sm" name="Form.ResultsViewMode"><option selected="selected" value="brief">Brief</option> <option value="summary">Summary</option> </select> </div> <div class="form-group form-inline"> <label for="ipp-sm" class="form-control-half">Items Per Page</label> <select name="ipp-sm" class="form-control" id="ipp-sm" name="Form.ItemsPerPage"><option value="50">50</option> <option value="75">75</option> <option value="100">100</option> <option selected="selected" value="all">All</option> </select> </div> <div class="form-group"> <p class="text-center"> <a href="#" data-form-show-name="advancedSearch" id="advanced-search-link"> Advanced Search <i class="fa fa-caret-down" aria-hidden="true" data-form-show-expanded="true" style="display: none;"></i> <i class="fa fa-caret-up" aria-hidden="true" data-form-show-expanded="false"></i> </a> </p> </div> <div style="display: none;" data-form-show-trigger="advancedSearch" data-form-show="false"> <div class="form-group"> <label for="dateFrom-sm">Date</label> <div class="form-inline form-date-inline"> <div class="input-group date" data-date-picker="true"> <input name="dateFrom-sm" class="form-control" data-control-type="date" data-val="true" data-val-date="The field Date must be a date." data-validation="true" data-validation-compare-field="dateTo-sm" data-validation-message="From date must be less than To date" data-validation-type="less-than-date" id="dateFrom-sm" name="Form.DateFrom" placeholder=" / / " type="text" value=""/> <span class="input-group-addon"> <span class="fa fa-calendar"> </span> </span> </div> <div class="input-group date" data-date-picker="true"> <input name="dateTo-sm" class="form-control" data-control-type="date" data-val="true" data-val-date="The field DateTo must be a date." id="dateTo-sm" name="Form.DateTo" placeholder=" / / " type="text" value=""/> <span class="input-group-addon"> <span class="fa fa-calendar"> </span> </span> </div> </div> </div> <div class="form-group"> <label for="status-all-sm"> Status <i class="fa fa-info-circle" aria-hidden="true" data-placement="right" data-html="true" data-tooltip-toggle="tooltipWithFunction" data-title-container="publications-status-info-sm"></i> </label> <div class="form-inline status-type" style="margin-left: 1rem;"> <label class="meta-label"> <input type="checkbox" id="status-final-sm" name="status-sm" value="Final" data-default-checked="True" checked="'checked'"/> Final<br/> </label> <label class="meta-label"> <input type="checkbox" id="status-draft-sm" name="status-sm" value="Draft" data-default-checked="True"/> Public Draft<br/> </label> <label class="meta-label"> <input type="checkbox" id="status-withdrawn-sm" name="status-sm" value="Withdrawn" data-default-checked="True"/> Withdrawn<br/> </label> </div> </div> <div class="form-group"> <label for="pub-search-series"> Series <button type="button" id="series-all-sm" class="btn btn-sm btn-success" data-check-all="series-sm">Check All</button> <button type="button" id="series-clear-sm" class="btn btn-sm btn-success" data-check-none="series-sm">Clear</button> </label> <div class="form-inline series-type" style="margin-left: 1rem;"> <label class="meta-label"> <input type="checkbox" id="series-b2b6ef80-0dec-4d48-ae2d-a37ab486a846-sm" name="series-sm" value="FIPS" data-default-checked="True"/> FIPS<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-749c7275-15f5-4eec-8cb9-3b6f1528756c-sm" name="series-sm" value="SP" data-default-checked="True"/> SP<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-344a35c7-520e-4845-88b0-6997147ffc76-sm" name="series-sm" value="IR" data-default-checked="True"/> IR<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-5f83968e-4758-479d-9aa4-1d42166b7deb-sm" name="series-sm" value="CSWP" data-default-checked="True"/> CSWP<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-b2004197-4249-454a-bdce-edc6186b5c60-sm" name="series-sm" value="TN" data-default-checked="True"/> TN<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-09acb409-e18b-4a05-ac84-631662bcccd9-sm" name="series-sm" value="VTS" data-default-checked="True"/> VTS<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-8022364e-73db-4498-b2eb-9317ce32fff2-sm" name="series-sm" value="AI" data-default-checked="True"/> AI<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-57afe5d0-383f-4fd6-b702-84233dcd5f13-sm" name="series-sm" value="GCR" data-default-checked="True"/> GCR<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-23801152-858e-4dbc-baad-eb51795cf0e2-sm" name="series-sm" value="Project Description" data-default-checked="True"/> Project Description<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-8c9f1828-ae8a-4f03-8d9f-9ff7192b508e-sm" name="series-sm" value="ITL Bulletin" data-default-checked="True"/> ITL Bulletin<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-debd6afb-aeaa-4790-a32b-c977c9654df0-sm" name="series-sm" value="Journal Article" data-default-checked="True"/> Journal Article<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-ed478237-d49d-41c6-91ed-5dd341bd50c8-sm" name="series-sm" value="Conference Paper" data-default-checked="True" checked="'checked'/"> Conference Paper<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-f2273ac7-d756-4cce-b006-a527778c84f0-sm" name="series-sm" value="Book" data-default-checked="True"/> Book<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-80e369a4-bea5-46f5-8082-91f19c3eeefa-sm" name="series-sm" value="Book Section" data-default-checked="True"/> Book Section<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-b1570e28-332c-4f29-a1e0-cd31c3930848-sm" name="series-sm" value="Other" data-default-checked="True"/> Other<br/> </label> </div> </div> <div class="form-group"> <label for="pub-search-topics-sm"> Topics </label> <input name="topics-sm" id="topics-sm" name="Form.Topics" type="hidden" value=""/> <div class="form-control topics-selection" id="pub-search-topics-sm" contenteditable="true" data-drop-target="pub-search-topics-drop-sm" data-field-name="topics-sm" aria-haspopup="true" aria-expanded="false"> </div> <div class="topics-selection-dropdown desktop" id="pub-search-topics-drop-sm" style="display: none;" data-topics-selector=""><div class="col-sm-4"><strong>Security and Privacy</strong><br/> <ul><li><i class="fa fa-plus fa-fw" id="topics-expander-pstds-24670-27481" data-expander-for="/topics/security-and-privacy/cryptography"></i> <a data-topic-id="27481" data-topic-text="cryptography">cryptography</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27647" data-topic-text="digital signatures">digital signatures</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27648" data-topic-text="encryption">encryption</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27649" data-topic-text="key management">key management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="30027" data-topic-text="lightweight cryptography">lightweight cryptography</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27650" data-topic-text="message authentication">message authentication</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27651" data-topic-text="post-quantum cryptography">post-quantum cryptography</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27652" data-topic-text="random number generation">random number generation</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27653" data-topic-text="secure hashing">secure hashing</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27482" data-topic-text="cybersecurity supply chain risk management">cybersecurity supply chain risk management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27483" data-topic-text="general security & privacy">general security & privacy</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstds-24670-27484" data-expander-for="/topics/security-and-privacy/identity-and-access-management"></i> <a data-topic-id="27484" data-topic-text="identity & access management">identity & access management</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27663" data-topic-text="access authorization">access authorization</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27664" data-topic-text="access control">access control</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27665" data-topic-text="authentication">authentication</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27666" data-topic-text="Personal Identity Verification">Personal Identity Verification</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27667" data-topic-text="public key infrastructure">public key infrastructure</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstds-24670-27485" data-expander-for="/topics/security-and-privacy/privacy"></i> <a data-topic-id="27485" data-topic-text="privacy">privacy</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27680" data-topic-text="personally identifiable information">personally identifiable information</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27681" data-topic-text="privacy engineering">privacy engineering</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstds-24670-27486" data-expander-for="/topics/security-and-privacy/risk-management"></i> <a data-topic-id="27486" data-topic-text="risk management">risk management</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27682" data-topic-text="categorization">categorization</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27683" data-topic-text="continuous monitoring">continuous monitoring</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstds-27486-27684" data-expander-for="/topics/security-and-privacy/risk-management/controls"></i> <a data-topic-id="27684" data-topic-text="controls">controls</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27767" data-topic-text="controls assessment">controls assessment</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27768" data-topic-text="privacy controls">privacy controls</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27769" data-topic-text="security controls">security controls</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27685" data-topic-text="risk assessment">risk assessment</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27686" data-topic-text="roots of trust">roots of trust</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27687" data-topic-text="system authorization">system authorization</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstds-27486-27688" data-expander-for="/topics/security-and-privacy/risk-management/threats"></i> <a data-topic-id="27688" data-topic-text="threats">threats</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27770" data-topic-text="advanced persistent threats">advanced persistent threats</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27771" data-topic-text="botnets">botnets</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27772" data-topic-text="information sharing">information sharing</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27773" data-topic-text="intrusion detection & prevention">intrusion detection & prevention</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27774" data-topic-text="malware">malware</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27689" data-topic-text="vulnerability management">vulnerability management</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstds-24670-27487" data-expander-for="/topics/security-and-privacy/security-and-behavior"></i> <a data-topic-id="27487" data-topic-text="security & behavior">security & behavior</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27709" data-topic-text="accessibility">accessibility</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27710" data-topic-text="behavior">behavior</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27711" data-topic-text="usability">usability</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstds-24670-27488" data-expander-for="/topics/security-and-privacy/security-measurement"></i> <a data-topic-id="27488" data-topic-text="security measurement">security measurement</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27690" data-topic-text="analytics">analytics</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27691" data-topic-text="assurance">assurance</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27692" data-topic-text="modeling">modeling</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27693" data-topic-text="testing & validation">testing & validation</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstds-24670-27489" data-expander-for="/topics/security-and-privacy/security-programs-and-operations"></i> <a data-topic-id="27489" data-topic-text="security programs & operations">security programs & operations</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27694" data-topic-text="acquisition">acquisition</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27695" data-topic-text="asset management">asset management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27696" data-topic-text="audit & accountability">audit & accountability</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27697" data-topic-text="awareness training & education">awareness training & education</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27698" data-topic-text="configuration management">configuration management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27699" data-topic-text="contingency planning">contingency planning</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27700" data-topic-text="incident response">incident response</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27701" data-topic-text="maintenance">maintenance</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27702" data-topic-text="media protection">media protection</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27703" data-topic-text="patch management">patch management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27704" data-topic-text="personnel security">personnel security</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27705" data-topic-text="physical & environmental protection">physical & environmental protection</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27706" data-topic-text="planning">planning</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27707" data-topic-text="program management">program management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27708" data-topic-text="security automation">security automation</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstds-24670-27490" data-expander-for="/topics/security-and-privacy/systems-security-engineering"></i> <a data-topic-id="27490" data-topic-text="systems security engineering">systems security engineering</a><ul style="display: none;"><li><i class="fa fa-plus fa-fw" id="topics-expander-pstds-27490-27713" data-expander-for="/topics/security-and-privacy/systems-security-engineering/trustworthiness"></i> <a data-topic-id="27713" data-topic-text="trustworthiness">trustworthiness</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27775" data-topic-text="reliability">reliability</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27776" data-topic-text="resilience">resilience</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27777" data-topic-text="safety">safety</a></li></ul> </li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="28469" data-topic-text="zero trust">zero trust</a></li></ul><strong>Technologies</strong><br/> <ul><li><i class="fa fa-fw"></i> <a data-topic-id="27491" data-topic-text="artificial intelligence">artificial intelligence</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27492" data-topic-text="big data">big data</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27493" data-topic-text="biometrics">biometrics</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27494" data-topic-text="blockchain">blockchain</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27495" data-topic-text="cloud & virtualization">cloud & virtualization</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27496" data-topic-text="combinatorial testing">combinatorial testing</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27497" data-topic-text="complexity">complexity</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstds-24671-27499" data-expander-for="/topics/technologies/hardware"></i> <a data-topic-id="27499" data-topic-text="hardware">hardware</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27714" data-topic-text="circuits">circuits</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27715" data-topic-text="personal computers">personal computers</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27716" data-topic-text="sensors">sensors</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27498" data-topic-text="mobile">mobile</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstds-24671-27500" data-expander-for="/topics/technologies/networks"></i> <a data-topic-id="27500" data-topic-text="networks">networks</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27717" data-topic-text="email">email</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27718" data-topic-text="firewalls">firewalls</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27719" data-topic-text="internet">internet</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27501" data-topic-text="quantum information science">quantum information science</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27502" data-topic-text="servers">servers</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27503" data-topic-text="smart cards">smart cards</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstds-24671-27504" data-expander-for="/topics/technologies/software-firmware"></i> <a data-topic-id="27504" data-topic-text="software & firmware">software & firmware</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27720" data-topic-text="BIOS">BIOS</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27721" data-topic-text="databases">databases</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27722" data-topic-text="operating systems">operating systems</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27505" data-topic-text="storage">storage</a></li></ul></div><div class="col-sm-4"><strong>Applications</strong><br/> <ul><li><i class="fa fa-fw"></i> <a data-topic-id="27456" data-topic-text="communications & wireless">communications & wireless</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27457" data-topic-text="cyber-physical systems">cyber-physical systems</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27458" data-topic-text="cybersecurity education">cybersecurity education</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27459" data-topic-text="cybersecurity framework">cybersecurity framework</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27460" data-topic-text="cybersecurity workforce">cybersecurity workforce</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27461" data-topic-text="enterprise">enterprise</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27462" data-topic-text="forensics">forensics</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27463" data-topic-text="industrial control systems">industrial control systems</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27464" data-topic-text="Internet of Things">Internet of Things</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="29979" data-topic-text="mathematics">mathematics</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27920" data-topic-text="positioning navigation & timing">positioning navigation & timing</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27465" data-topic-text="small & medium business">small & medium business</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27466" data-topic-text="telework">telework</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27467" data-topic-text="voting">voting</a></li></ul><strong>Laws and Regulations</strong><br/> <ul><li><i class="fa fa-plus fa-fw" id="topics-expander-pstds-24673-27468" data-expander-for="/topics/laws-and-regulations/executive-documents"></i> <a data-topic-id="27468" data-topic-text="executive documents">executive documents</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27668" data-topic-text="Comprehensive National Cybersecurity Initiative">Comprehensive National Cybersecurity Initiative</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27669" data-topic-text="Cybersecurity Strategy and Implementation Plan">Cybersecurity Strategy and Implementation Plan</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27670" data-topic-text="Cyberspace Policy Review">Cyberspace Policy Review</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27671" data-topic-text="Executive Order 13636">Executive Order 13636</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27672" data-topic-text="Executive Order 13702">Executive Order 13702</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27673" data-topic-text="Executive Order 13718">Executive Order 13718</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27674" data-topic-text="Executive Order 13800">Executive Order 13800</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27921" data-topic-text="Executive Order 13905">Executive Order 13905</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="28468" data-topic-text="Executive Order 14028">Executive Order 14028</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27675" data-topic-text="Federal Cybersecurity Research and Development Strategic Plan">Federal Cybersecurity Research and Development Strategic Plan</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27676" data-topic-text="Homeland Security Presidential Directive 7">Homeland Security Presidential Directive 7</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27677" data-topic-text="Homeland Security Presidential Directive 12">Homeland Security Presidential Directive 12</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27678" data-topic-text="OMB Circular A-11">OMB Circular A-11</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27679" data-topic-text="OMB Circular A-130">OMB Circular A-130</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstds-24673-27469" data-expander-for="/topics/laws-and-regulations/laws"></i> <a data-topic-id="27469" data-topic-text="laws">laws</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="35986" data-topic-text="CHIPS and Science Act">CHIPS and Science Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27654" data-topic-text="Cyber Security R&D Act">Cyber Security R&D; Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27655" data-topic-text="Cybersecurity Enhancement Act">Cybersecurity Enhancement Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27656" data-topic-text="E-Government Act">E-Government Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27657" data-topic-text="Energy Independence and Security Act">Energy Independence and Security Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27658" data-topic-text="Federal Information Security Modernization Act">Federal Information Security Modernization Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27659" data-topic-text="First Responder Network Authority">First Responder Network Authority</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27660" data-topic-text="Health Insurance Portability and Accountability Act">Health Insurance Portability and Accountability Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27661" data-topic-text="Help America Vote Act">Help America Vote Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="28580" data-topic-text="Internet of Things Cybersecurity Improvement Act">Internet of Things Cybersecurity Improvement Act</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstds-24673-27470" data-expander-for="/topics/laws-and-regulations/regulations"></i> <a data-topic-id="27470" data-topic-text="regulations">regulations</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27662" data-topic-text="Federal Acquisition Regulation">Federal Acquisition Regulation</a></li></ul> </li></ul></div><div class="col-sm-4"><strong>Activities and Products</strong><br/> <ul><li><i class="fa fa-fw"></i> <a data-topic-id="27452" data-topic-text="annual reports">annual reports</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27453" data-topic-text="conferences & workshops">conferences & workshops</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="30210" data-topic-text="groups">groups</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27454" data-topic-text="reference materials">reference materials</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27455" data-topic-text="standards development">standards development</a></li></ul><strong>Sectors</strong><br/> <ul><li><i class="fa fa-fw"></i> <a data-topic-id="27471" data-topic-text="aerospace">aerospace</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstds-24675-27472" data-expander-for="/topics/sectors/energy"></i> <a data-topic-id="27472" data-topic-text="energy">energy</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27712" data-topic-text="smart grid">smart grid</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27473" data-topic-text="financial services">financial services</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27474" data-topic-text="healthcare">healthcare</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27475" data-topic-text="hospitality">hospitality</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27476" data-topic-text="manufacturing">manufacturing</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27477" data-topic-text="public safety">public safety</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27478" data-topic-text="retail">retail</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27479" data-topic-text="telecommunications">telecommunications</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27480" data-topic-text="transportation">transportation</a></li></ul></div></div> <div class="form-inline topics-type"> <label class="radio-label">Match ANY: <input name="topicsMatch-sm" checked="checked" id="topicsMatch-any-sm" name="Form.TopicsMatch" type="radio" value="ANY"/></label> <label class="radio-label">Match ALL: <input name="topicsMatch-sm" id="topicsMatch-all-sm" name="Form.TopicsMatch" type="radio" value="ALL"/></label> </div> </div> <div class="form-group"> <label for="pub-search-controls-sm"> Control Family (800-53) </label> <input name="controls-sm" id="controls-sm" name="Form.Controls" type="hidden" value=""/> <div class="form-control controls-selection" id="pub-search-controls-sm" contenteditable="true" data-drop-target="pub-search-controls-drop-sm" data-field-name="controls-sm" aria-haspopup="true" aria-expanded="false"> </div> <div class="controls-selection-dropdown desktop" id="pub-search-controls-drop-sm" style="display: none;" data-controls-selector=""> <strong>Control Families</strong> <ul> <li><a data-control-id="2049a555-9a3e-4395-88bc-8304c6d9b157">AC - Access Control</a></li> <li><a data-control-id="bb24a9c9-944e-41fc-b6a9-7c4217e054df">AT - Awareness and Training</a></li> <li><a data-control-id="b491696a-7f6b-4b1e-9145-b02938d9c279">AU - Audit and Accountability</a></li> <li><a data-control-id="27484ffc-ac08-40b0-8862-4be4154560e4">CA - Assessment, Authorization and Monitoring</a></li> <li><a data-control-id="b8b9a292-32ad-4698-abad-45c70b40757d">CM - Configuration Management</a></li> <li><a data-control-id="5604c7e8-b158-48c6-a497-c5357a43e7c2">CP - Contingency Planning</a></li> <li><a data-control-id="2b79dd04-6118-44ee-b54d-854948a5b55f">IA - Identification and Authentication</a></li> <li><a data-control-id="b6c1c9c0-3cf8-46c9-b2ae-4cd608f88b11">IR - Incident Response</a></li> <li><a data-control-id="c8219b58-a95d-4882-8e74-0c19369aceb6">MA - Maintenance</a></li> <li><a data-control-id="84b5d6fa-8fbc-4d32-b559-47a626a510b3">MP - Media Protection</a></li> <li><a data-control-id="f3703fe4-b51d-4139-98eb-1656b00fc4ed">PE - Physical and Environmental Protection</a></li> <li><a data-control-id="137c4d9f-6541-4431-bb88-d0d003ce039f">PL - Planning</a></li> <li><a data-control-id="6401481d-3689-49bb-840c-73256cfb102e">PM - Program Management</a></li> <li><a data-control-id="408d8a82-1783-414d-a303-d79525c87f6a">PS - Personnel Security</a></li> <li><a data-control-id="9f34a4cb-3ba3-49e1-8c5c-5aa38c2151e7">PT - PII Processing and Transparency</a></li> <li><a data-control-id="1d0ff39c-a0ed-408e-8251-fbcd24dc74eb">RA - Risk Assessment</a></li> <li><a data-control-id="d1d6d136-ad89-4ab2-9207-6bec08ef6299">SA - System and Services Acquisition</a></li> <li><a data-control-id="2067a45e-da04-471b-95ad-d0882d74ccaf">SC - System and Communications Protection</a></li> <li><a data-control-id="1d78556b-00f2-47e7-992a-9d8fb08bda2a">SI - System and Information Integrity</a></li> <li><a data-control-id="6a7ab58f-e8ef-4264-aad0-29c656a03c59">SR - Supply Chain Risk Management</a></li> </ul> </div> <div class="form-inline controls-type"> <label class="radio-label">Match ANY: <input name="controlsMatch-sm" checked="checked" id="controlsMatch-any-sm" name="Form.ControlsMatch" type="radio" value="ANY"/></label> <label class="radio-label">Match ALL: <input name="controlsMatch-sm" id="controlsMatch-all-sm" name="Form.ControlsMatch" type="radio" value="ALL"/></label> </div> </div> </div> <div style="display: none;" data-form-error-pane="true" class="text-danger"> <strong class="text-danger">Please fix the following:</strong> <ul data-form-error-list="true"> </ul> <div class="validation-summary-valid" data-valmsg-summary="true"><ul><li style="display:none"></li> </ul></div> </div> <div class="form-group"> <button type="submit" id="pubs-search-submit-sm" name="submit-btn" data-form-button="submit" class="btn">Search</button> <button type="reset" id="pubs-search-reset-sm" name="reset-btn" data-form-button="reset" class="btn">Reset</button> </div> <span style="display: none;" id="publications-status-info-sm"> <p><strong>Final:</strong> Published documents.</p> <p><strong>Public Draft:</strong> Documents have been posted as Public Drafts, typically with a public comment period.</p> <p> <strong>Withdrawn:</strong> Documents that have been withdrawn, and are no longer current. This includes:<br/> - Final publications that have been withdrawn;<br/> - Public drafts that have been obsoleted by a subsequent draft or final publication;<br/> - Public drafts that have been retired—further development was discontinued. </p> </span> </form> <div id="search-criteria-container" data-target-form="pubSearchDesktop"></div> <div class="row top-pagination-area"> <div class="col-md-6 col-sm-12"> <span id="showing-results-text" data-total-pages="1" data-first-record="1" data-last-record="309" data-current-page="1" data-items-per-page="0" data-total-results="309">Showing <strong id="showing-results-total">309</strong> matching records.</span> </div> <div class="col-md-6 col-sm-12"> <span class="pull-right hidden-sm hidden-xs hidden-xxs"> <span class="pagination-links" id="top-pagination-container" data-total-pages="0" data-min-page="1" data-max-page="0" data-current-page="1" data-show-first="False" data-show-last="True"></span> </span> <p class="text-center hidden-md hidden-lg"> <span class="pagination-links" id="mobile-top-pagination-container" data-total-pages="0" data-min-page="1" data-max-page="0" data-current-page="1" data-show-first="False" data-show-last="True"></span> </p> </div> </div> <table class="table table-striped table-condensed publications-table table-bordered" id="publications-results-table" data-total-records="309" data-page="1" data-first-record="1" data-last-record="309" data-ipp="0"> <thead> <tr> <th nowrap class="hidden-sm hidden-xs hidden-xxs">Series</th> <th nowrap class="hidden-sm hidden-xs hidden-xxs">Number</th> <th nowrap> <span class="hidden-sm hidden-xs hidden-xxs">Title</span> <span class="hidden-md hidden-lg">Publications</span> </th> <th nowrap class="hidden-sm hidden-xs hidden-xxs">Status</th> <th nowrap class="hidden-sm hidden-xs hidden-xxs">Release Date</th> </tr> </thead> <tbody> <tr id="result-1"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-1">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-1"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2022/09/28/a-study-of-error-floor-behavior-in-qcmdpc-codes/final" id="pub-title-link-1">A Study of Error Floor Behavior in QC-MDPC Codes</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-1">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2022/09/28/a-study-of-error-floor-behavior-in-qcmdpc-codes/final" class="mobile-pub-title" id="pub-title-link-sm-1">A Study of Error Floor Behavior in QC-MDPC Codes</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-1">9/28/2022</strong> <br/> Status: <span id="pub-status-sm-1">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-1"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-1"> 9/28/2022 </td> </tr> <tr id="result-2"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-2">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-2"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2022/09/28/breaking-category-five-sphincs-with-sha256/final" id="pub-title-link-2">Breaking Category Five SPHINCS+ with SHA-256</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-2">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2022/09/28/breaking-category-five-sphincs-with-sha256/final" class="mobile-pub-title" id="pub-title-link-sm-2">Breaking Category Five SPHINCS+ with SHA-256</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-2">9/28/2022</strong> <br/> Status: <span id="pub-status-sm-2">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-2"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-2"> 9/28/2022 </td> </tr> <tr id="result-3"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-3">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-3"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2022/09/28/2fnew-method-for-constructing-efficient-multivaria/final" id="pub-title-link-3">2F - A New Method for Constructing Efficient Multivariate Encryption Schemes</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-3">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2022/09/28/2fnew-method-for-constructing-efficient-multivaria/final" class="mobile-pub-title" id="pub-title-link-sm-3">2F - A New Method for Constructing Efficient Multivariate Encryption Schemes</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-3">9/28/2022</strong> <br/> Status: <span id="pub-status-sm-3">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-3"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-3"> 9/28/2022 </td> </tr> <tr id="result-4"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-4">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-4"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2022/09/28/iprainbow/final" id="pub-title-link-4">IPRainbow</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-4">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2022/09/28/iprainbow/final" class="mobile-pub-title" id="pub-title-link-sm-4">IPRainbow</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-4">9/28/2022</strong> <br/> Status: <span id="pub-status-sm-4">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-4"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-4"> 9/28/2022 </td> </tr> <tr id="result-5"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-5">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-5"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2022/09/11/new-bounds-on-the-multiplicative-complexity-of-boo/final" id="pub-title-link-5">New Bounds on the Multiplicative Complexity of Boolean Functions</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-5">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2022/09/11/new-bounds-on-the-multiplicative-complexity-of-boo/final" class="mobile-pub-title" id="pub-title-link-sm-5">New Bounds on the Multiplicative Complexity of Boolean Functions</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-5">9/11/2022</strong> <br/> Status: <span id="pub-status-sm-5">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-5"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-5"> 9/11/2022 </td> </tr> <tr id="result-6"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-6">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-6"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2022/05/09/a-new-conditional-cube-attack-on-reducedround-asco/final" id="pub-title-link-6">A New Conditional Cube Attack on Reduced-Round Ascon-128a in a Nonce-misuse Setting</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-6">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2022/05/09/a-new-conditional-cube-attack-on-reducedround-asco/final" class="mobile-pub-title" id="pub-title-link-sm-6">A New Conditional Cube Attack on Reduced-Round Ascon-128a in a Nonce-misuse Setting</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-6">5/09/2022</strong> <br/> Status: <span id="pub-status-sm-6">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-6"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-6"> 5/09/2022 </td> </tr> <tr id="result-7"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-7">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-7"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2022/04/28/generating-cps-risk-overlays-for-attack-and-fault/final" id="pub-title-link-7">Generating Cyber-Physical System Risk Overlays for Attack and Fault Trees using Systems Theory</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-7">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2022/04/28/generating-cps-risk-overlays-for-attack-and-fault/final" class="mobile-pub-title" id="pub-title-link-sm-7">Generating Cyber-Physical System Risk Overlays for Attack and Fault Trees using Systems Theory</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-7">4/28/2022</strong> <br/> Status: <span id="pub-status-sm-7">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-7"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-7"> 4/28/2022 </td> </tr> <tr id="result-8"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-8">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-8"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2022/04/04/combination-frequency-differencing/final" id="pub-title-link-8">Combination Frequency Differencing for Identifying Design Weaknesses in Physical Unclonable Functions</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-8">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2022/04/04/combination-frequency-differencing/final" class="mobile-pub-title" id="pub-title-link-sm-8">Combination Frequency Differencing for Identifying Design Weaknesses in Physical Unclonable Functions</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-8">4/04/2022</strong> <br/> Status: <span id="pub-status-sm-8">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-8"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-8"> 4/04/2022 </td> </tr> <tr id="result-9"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-9">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-9"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2021/12/16/identifying-tactics-of-apt-with-limited-attack-tra/final" id="pub-title-link-9">Identifying Tactics of Advanced Persistent Threats with Limited Attack Traces</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-9">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2021/12/16/identifying-tactics-of-apt-with-limited-attack-tra/final" class="mobile-pub-title" id="pub-title-link-sm-9">Identifying Tactics of Advanced Persistent Threats with Limited Attack Traces</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-9">12/16/2021</strong> <br/> Status: <span id="pub-status-sm-9">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-9"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-9"> 12/16/2021 </td> </tr> <tr id="result-10"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-10">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-10"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2021/08/11/perceptions-of-responsibility-smart-home-privacy-a/final" id="pub-title-link-10">It's the Company, the Government, You and I: User Perceptions of Responsibility for Smart Home Privacy and Security</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-10">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2021/08/11/perceptions-of-responsibility-smart-home-privacy-a/final" class="mobile-pub-title" id="pub-title-link-sm-10">It's the Company, the Government, You and I: User Perceptions of Responsibility for Smart Home Privacy and Security</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-10">8/11/2021</strong> <br/> Status: <span id="pub-status-sm-10">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-10"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-10"> 8/11/2021 </td> </tr> <tr id="result-11"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-11">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-11"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2021/08/02/clientside-xslt-validation-and-data-security/final" id="pub-title-link-11">Client-side XSLT, Validation and Data Security</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-11">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2021/08/02/clientside-xslt-validation-and-data-security/final" class="mobile-pub-title" id="pub-title-link-sm-11">Client-side XSLT, Validation and Data Security</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-11">8/02/2021</strong> <br/> Status: <span id="pub-status-sm-11">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-11"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-11"> 8/02/2021 </td> </tr> <tr id="result-12"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-12">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-12"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2021/06/02/metamorphic-testing-on-the-continuum-of-verificati/final" id="pub-title-link-12">Metamorphic Testing on the Continuum of Verification and Validation of Simulation Models</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-12">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2021/06/02/metamorphic-testing-on-the-continuum-of-verificati/final" class="mobile-pub-title" id="pub-title-link-sm-12">Metamorphic Testing on the Continuum of Verification and Validation of Simulation Models</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-12">6/02/2021</strong> <br/> Status: <span id="pub-status-sm-12">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-12"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-12"> 6/02/2021 </td> </tr> <tr id="result-13"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-13">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-13"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2021/05/17/sok-how-not-to-design-and-implement-postquantum-cr/final" id="pub-title-link-13">SoK: How (not) to Design and Implement Post-Quantum Cryptography</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-13">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2021/05/17/sok-how-not-to-design-and-implement-postquantum-cr/final" class="mobile-pub-title" id="pub-title-link-sm-13">SoK: How (not) to Design and Implement Post-Quantum Cryptography</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-13">5/17/2021</strong> <br/> Status: <span id="pub-status-sm-13">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-13"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-13"> 5/17/2021 </td> </tr> <tr id="result-14"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-14">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-14"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2021/04/18/a-historical-and-statistical-study-of-software-vul/final" id="pub-title-link-14">A Historical and Statistical Study of the Software Vulnerability Landscape</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-14">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2021/04/18/a-historical-and-statistical-study-of-software-vul/final" class="mobile-pub-title" id="pub-title-link-sm-14">A Historical and Statistical Study of the Software Vulnerability Landscape</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-14">4/18/2021</strong> <br/> Status: <span id="pub-status-sm-14">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-14"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-14"> 4/18/2021 </td> </tr> <tr id="result-15"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-15">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-15"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2021/04/12/combinatorial-testing-metrics-for-machine-learning/final" id="pub-title-link-15">Combinatorial Testing Metrics for Machine Learning</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-15">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2021/04/12/combinatorial-testing-metrics-for-machine-learning/final" class="mobile-pub-title" id="pub-title-link-sm-15">Combinatorial Testing Metrics for Machine Learning</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-15">4/12/2021</strong> <br/> Status: <span id="pub-status-sm-15">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-15"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-15"> 4/12/2021 </td> </tr> <tr id="result-16"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-16">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-16"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2020/12/18/apply-quantum-search-to-the-safety-check/final" id="pub-title-link-16">Apply Quantum Search to the Safety Check for Mono Operational Attribute Based Protection Systems</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-16">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2020/12/18/apply-quantum-search-to-the-safety-check/final" class="mobile-pub-title" id="pub-title-link-sm-16">Apply Quantum Search to the Safety Check for Mono Operational Attribute Based Protection Systems</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-16">12/18/2020</strong> <br/> Status: <span id="pub-status-sm-16">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-16"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-16"> 12/18/2020 </td> </tr> <tr id="result-17"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-17">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-17"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2020/12/07/improvements-of-algebraic-attacks-for-solving-minr/final" id="pub-title-link-17">Improvements of Algebraic Attacks for Solving the Rank Decoding and MinRank Problems</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-17">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2020/12/07/improvements-of-algebraic-attacks-for-solving-minr/final" class="mobile-pub-title" id="pub-title-link-sm-17">Improvements of Algebraic Attacks for Solving the Rank Decoding and MinRank Problems</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-17">12/07/2020</strong> <br/> Status: <span id="pub-status-sm-17">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-17"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-17"> 12/07/2020 </td> </tr> <tr id="result-18"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-18">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-18"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2020/12/07/measurements-of-most-significant-software-security/final" id="pub-title-link-18">Measurements of the Most Significant Software Security Weaknesses</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-18">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2020/12/07/measurements-of-most-significant-software-security/final" class="mobile-pub-title" id="pub-title-link-sm-18">Measurements of the Most Significant Software Security Weaknesses</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-18">12/07/2020</strong> <br/> Status: <span id="pub-status-sm-18">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-18"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-18"> 12/07/2020 </td> </tr> <tr id="result-19"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-19">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-19"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2020/10/24/combinatorial-methods-for-explainable-ai/final" id="pub-title-link-19">Combinatorial Methods for Explainable AI</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-19">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2020/10/24/combinatorial-methods-for-explainable-ai/final" class="mobile-pub-title" id="pub-title-link-sm-19">Combinatorial Methods for Explainable AI</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-19">10/24/2020</strong> <br/> Status: <span id="pub-status-sm-19">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-19"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-19"> 10/24/2020 </td> </tr> <tr id="result-20"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-20">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-20"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2020/09/17/towards-usable-updates-for-smart-home-devices/final" id="pub-title-link-20">Towards Usable Updates for Smart Home Devices</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-20">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2020/09/17/towards-usable-updates-for-smart-home-devices/final" class="mobile-pub-title" id="pub-title-link-sm-20">Towards Usable Updates for Smart Home Devices</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-20">9/17/2020</strong> <br/> Status: <span id="pub-status-sm-20">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-20"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-20"> 9/17/2020 </td> </tr> <tr id="result-21"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-21">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-21"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2020/08/17/cryptanalysis-of-ledacrypt/final" id="pub-title-link-21">Cryptanalysis of LEDAcrypt</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-21">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2020/08/17/cryptanalysis-of-ledacrypt/final" class="mobile-pub-title" id="pub-title-link-sm-21">Cryptanalysis of LEDAcrypt</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-21">8/17/2020</strong> <br/> Status: <span id="pub-status-sm-21">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-21"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-21"> 8/17/2020 </td> </tr> <tr id="result-22"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-22">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-22"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2020/08/03/aggregating-atomic-clocks-for-timestamping/final" id="pub-title-link-22">Aggregating Atomic Clocks for Time-Stamping</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-22">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2020/08/03/aggregating-atomic-clocks-for-timestamping/final" class="mobile-pub-title" id="pub-title-link-sm-22">Aggregating Atomic Clocks for Time-Stamping</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-22">8/03/2020</strong> <br/> Status: <span id="pub-status-sm-22">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-22"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-22"> 8/03/2020 </td> </tr> <tr id="result-23"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-23">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-23"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2020/07/27/systems-security-assurance-as-micro-publishing/final" id="pub-title-link-23">Systems security assurance as (micro) publishing: Declarative markup for systems description and assessment</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-23">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2020/07/27/systems-security-assurance-as-micro-publishing/final" class="mobile-pub-title" id="pub-title-link-sm-23">Systems security assurance as (micro) publishing: Declarative markup for systems description and assessment</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-23">7/27/2020</strong> <br/> Status: <span id="pub-status-sm-23">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-23"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-23"> 7/27/2020 </td> </tr> <tr id="result-24"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-24">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-24"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2020/07/19/smart-home-security-and-privacy-mitigations/final" id="pub-title-link-24">Smart Home Security and Privacy Mitigations: Consumer Perceptions, Practices, and Challenges</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-24">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2020/07/19/smart-home-security-and-privacy-mitigations/final" class="mobile-pub-title" id="pub-title-link-sm-24">Smart Home Security and Privacy Mitigations: Consumer Perceptions, Practices, and Challenges</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-24">7/19/2020</strong> <br/> Status: <span id="pub-status-sm-24">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-24"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-24"> 7/19/2020 </td> </tr> <tr id="result-25"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-25">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-25"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2020/07/13/a-suite-of-metrics-for-calculating-software-flaw-t/final" id="pub-title-link-25">A Suite of Metrics for Calculating the Most Significant Security Relevant Software Flaw Types</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-25">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2020/07/13/a-suite-of-metrics-for-calculating-software-flaw-t/final" class="mobile-pub-title" id="pub-title-link-sm-25">A Suite of Metrics for Calculating the Most Significant Security Relevant Software Flaw Types</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-25">7/13/2020</strong> <br/> Status: <span id="pub-status-sm-25">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-25"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-25"> 7/13/2020 </td> </tr> <tr id="result-26"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-26">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-26"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2020/06/29/evolving-advanced-persistent-threat-detection/final" id="pub-title-link-26">Evolving Advanced Persistent Threat Detection using Provenance Graph and Metric Learning</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-26">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2020/06/29/evolving-advanced-persistent-threat-detection/final" class="mobile-pub-title" id="pub-title-link-sm-26">Evolving Advanced Persistent Threat Detection using Provenance Graph and Metric Learning</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-26">6/29/2020</strong> <br/> Status: <span id="pub-status-sm-26">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-26"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-26"> 6/29/2020 </td> </tr> <tr id="result-27"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-27">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-27"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2020/06/22/the-impossibility-of-efficient-quantum-weak-coin-f/final" id="pub-title-link-27">The impossibility of efficient quantum weak coin flipping</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-27">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2020/06/22/the-impossibility-of-efficient-quantum-weak-coin-f/final" class="mobile-pub-title" id="pub-title-link-sm-27">The impossibility of efficient quantum weak coin flipping</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-27">6/22/2020</strong> <br/> Status: <span id="pub-status-sm-27">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-27"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-27"> 6/22/2020 </td> </tr> <tr id="result-28"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-28">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-28"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2020/05/18/defining-actionable-rules-for-verifying-iot-securi/final" id="pub-title-link-28">Defining Actionable Rules for Verifying IoT Security [poster]</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-28">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2020/05/18/defining-actionable-rules-for-verifying-iot-securi/final" class="mobile-pub-title" id="pub-title-link-sm-28">Defining Actionable Rules for Verifying IoT Security [poster]</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-28">5/18/2020</strong> <br/> Status: <span id="pub-status-sm-28">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-28"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-28"> 5/18/2020 </td> </tr> <tr id="result-29"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-29">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-29"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2020/04/10/combinatorial-rank-attacks-against-rectangular-sim/final" id="pub-title-link-29">Combinatorial Rank Attacks Against the Rectangular Simple Matrix Encryption Scheme</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-29">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2020/04/10/combinatorial-rank-attacks-against-rectangular-sim/final" class="mobile-pub-title" id="pub-title-link-sm-29">Combinatorial Rank Attacks Against the Rectangular Simple Matrix Encryption Scheme</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-29">4/10/2020</strong> <br/> Status: <span id="pub-status-sm-29">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-29"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-29"> 4/10/2020 </td> </tr> <tr id="result-30"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-30">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-30"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2020/03/16/automatic-recognition-of-advanced-persistent-threa/final" id="pub-title-link-30">Automatic Recognition of Advanced Persistent Threat Tactics for Enterprise Security</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-30">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2020/03/16/automatic-recognition-of-advanced-persistent-threa/final" class="mobile-pub-title" id="pub-title-link-sm-30">Automatic Recognition of Advanced Persistent Threat Tactics for Enterprise Security</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-30">3/16/2020</strong> <br/> Status: <span id="pub-status-sm-30">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-30"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-30"> 3/16/2020 </td> </tr> <tr id="result-31"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-31">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-31"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2020/02/24/tmps-ticketmediated-password-strengthening/final" id="pub-title-link-31">TMPS: Ticket-Mediated Password Strengthening</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-31">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2020/02/24/tmps-ticketmediated-password-strengthening/final" class="mobile-pub-title" id="pub-title-link-sm-31">TMPS: Ticket-Mediated Password Strengthening</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-31">2/24/2020</strong> <br/> Status: <span id="pub-status-sm-31">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-31"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-31"> 2/24/2020 </td> </tr> <tr id="result-32"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-32">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-32"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2020/02/23/method-for-effective-measurement-labeling-and-clas/final" id="pub-title-link-32">Method for Effective Measurement, Labeling, and Classification of Botnet C2s for Predicting Attacks [poster]</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-32">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2020/02/23/method-for-effective-measurement-labeling-and-clas/final" class="mobile-pub-title" id="pub-title-link-sm-32">Method for Effective Measurement, Labeling, and Classification of Botnet C2s for Predicting Attacks [poster]</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-32">2/23/2020</strong> <br/> Status: <span id="pub-status-sm-32">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-32"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-32"> 2/23/2020 </td> </tr> <tr id="result-33"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-33">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-33"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2020/01/06/forensic-analysis-of-apt-attacks-in-cloud-environm/final" id="pub-title-link-33">Forensic Analysis of Advanced Persistent Threat Attacks in Cloud Environments</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-33">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2020/01/06/forensic-analysis-of-apt-attacks-in-cloud-environm/final" class="mobile-pub-title" id="pub-title-link-sm-33">Forensic Analysis of Advanced Persistent Threat Attacks in Cloud Environments</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-33">1/06/2020</strong> <br/> Status: <span id="pub-status-sm-33">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-33"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-33"> 1/06/2020 </td> </tr> <tr id="result-34"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-34">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-34"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2019/11/24/augmenting-fiat-currency-with-cryptocurrency/final" id="pub-title-link-34">Augmenting Fiat Currency with an Integrated Managed Cryptocurrency</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-34">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2019/11/24/augmenting-fiat-currency-with-cryptocurrency/final" class="mobile-pub-title" id="pub-title-link-sm-34">Augmenting Fiat Currency with an Integrated Managed Cryptocurrency</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-34">11/24/2019</strong> <br/> Status: <span id="pub-status-sm-34">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-34"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-34"> 11/24/2019 </td> </tr> <tr id="result-35"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-35">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-35"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2019/11/24/implementing-a-protocol-native-managed-cryptocurre/final" id="pub-title-link-35">Implementing a Protocol Native Managed Cryptocurrency</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-35">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2019/11/24/implementing-a-protocol-native-managed-cryptocurre/final" class="mobile-pub-title" id="pub-title-link-sm-35">Implementing a Protocol Native Managed Cryptocurrency</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-35">11/24/2019</strong> <br/> Status: <span id="pub-status-sm-35">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-35"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-35"> 11/24/2019 </td> </tr> <tr id="result-36"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-36">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-36"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2019/10/14/automated-unified-framework-combinatorial-interact/final" id="pub-title-link-36">Towards an Automated Unified Framework to Run Applications for Combinatorial Interaction Testing</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-36">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2019/10/14/automated-unified-framework-combinatorial-interact/final" class="mobile-pub-title" id="pub-title-link-sm-36">Towards an Automated Unified Framework to Run Applications for Combinatorial Interaction Testing</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-36">10/14/2019</strong> <br/> Status: <span id="pub-status-sm-36">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-36"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-36"> 10/14/2019 </td> </tr> <tr id="result-37"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-37">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-37"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2019/09/10/bowtie-deep-learning-feedforward-neural-network-fo/final" id="pub-title-link-37">BowTie – A Deep Learning Feedforward Neural Network for Sentiment Analysis</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-37">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2019/09/10/bowtie-deep-learning-feedforward-neural-network-fo/final" class="mobile-pub-title" id="pub-title-link-sm-37">BowTie – A Deep Learning Feedforward Neural Network for Sentiment Analysis</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-37">9/10/2019</strong> <br/> Status: <span id="pub-status-sm-37">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-37"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-37"> 9/10/2019 </td> </tr> <tr id="result-38"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-38">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-38"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2019/08/26/knowledge-extraction-for-crypto-alg-validation-tes/final" id="pub-title-link-38">Knowledge Extraction for Cryptographic Algorithm Validation Test Vectors by Means of Combinatorial Coverage Measurement</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-38">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2019/08/26/knowledge-extraction-for-crypto-alg-validation-tes/final" class="mobile-pub-title" id="pub-title-link-sm-38">Knowledge Extraction for Cryptographic Algorithm Validation Test Vectors by Means of Combinatorial Coverage Measurement</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-38">8/26/2019</strong> <br/> Status: <span id="pub-status-sm-38">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-38"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-38"> 8/26/2019 </td> </tr> <tr id="result-39"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-39">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-39"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2019/08/11/security-awareness-in-action-a-case-study/final" id="pub-title-link-39">Security Awareness in Action: A Case Study [extended abstract]</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-39">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2019/08/11/security-awareness-in-action-a-case-study/final" class="mobile-pub-title" id="pub-title-link-sm-39">Security Awareness in Action: A Case Study [extended abstract]</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-39">8/11/2019</strong> <br/> Status: <span id="pub-status-sm-39">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-39"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-39"> 8/11/2019 </td> </tr> <tr id="result-40"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-40">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-40"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2019/08/11/perceptions-of-smart-home-privacy-and-security/final" id="pub-title-link-40">Perceptions of Smart Home Privacy and Security Responsibility, Concerns, and Mitigations</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-40">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2019/08/11/perceptions-of-smart-home-privacy-and-security/final" class="mobile-pub-title" id="pub-title-link-sm-40">Perceptions of Smart Home Privacy and Security Responsibility, Concerns, and Mitigations</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-40">8/11/2019</strong> <br/> Status: <span id="pub-status-sm-40">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-40"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-40"> 8/11/2019 </td> </tr> <tr id="result-41"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-41">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-41"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2019/07/30/oscal-schema-and-metaschema/final" id="pub-title-link-41">The Open Security Controls Assessment Language (OSCAL): Schema and Metaschema</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-41">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2019/07/30/oscal-schema-and-metaschema/final" class="mobile-pub-title" id="pub-title-link-sm-41">The Open Security Controls Assessment Language (OSCAL): Schema and Metaschema</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-41">7/30/2019</strong> <br/> Status: <span id="pub-status-sm-41">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-41"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-41"> 7/30/2019 </td> </tr> <tr id="result-42"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-42">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-42"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2019/07/15/casfinder-detecting-common-attack-surface/final" id="pub-title-link-42">CASFinder: Detecting Common Attack Surface</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-42">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2019/07/15/casfinder-detecting-common-attack-surface/final" class="mobile-pub-title" id="pub-title-link-sm-42">CASFinder: Detecting Common Attack Surface</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-42">7/15/2019</strong> <br/> Status: <span id="pub-status-sm-42">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-42"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-42"> 7/15/2019 </td> </tr> <tr id="result-43"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-43">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-43"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2019/06/24/searching-for-best-karatsuba-becurrences/final" id="pub-title-link-43">Searching for Best Karatsuba Recurrences</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-43">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2019/06/24/searching-for-best-karatsuba-becurrences/final" class="mobile-pub-title" id="pub-title-link-sm-43">Searching for Best Karatsuba Recurrences</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-43">6/24/2019</strong> <br/> Status: <span id="pub-status-sm-43">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-43"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-43"> 6/24/2019 </td> </tr> <tr id="result-44"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-44">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-44"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2019/06/20/motivating-cybersecurity-advocates-recruitment-and/final" id="pub-title-link-44">Motivating Cybersecurity Advocates: Implications for Recruitment and Retention</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-44">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2019/06/20/motivating-cybersecurity-advocates-recruitment-and/final" class="mobile-pub-title" id="pub-title-link-sm-44">Motivating Cybersecurity Advocates: Implications for Recruitment and Retention</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-44">6/20/2019</strong> <br/> Status: <span id="pub-status-sm-44">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-44"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-44"> 6/20/2019 </td> </tr> <tr id="result-45"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-45">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-45"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2019/05/15/postquantum-crypto-and-5g-security-tutorial/final" id="pub-title-link-45">Post-quantum Cryptography and 5G Security: Tutorial</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-45">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2019/05/15/postquantum-crypto-and-5g-security-tutorial/final" class="mobile-pub-title" id="pub-title-link-sm-45">Post-quantum Cryptography and 5G Security: Tutorial</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-45">5/15/2019</strong> <br/> Status: <span id="pub-status-sm-45">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-45"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-45"> 5/15/2019 </td> </tr> <tr id="result-46"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-46">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-46"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2019/05/08/constantround-group-key-exchange-from-the-ringlwe/final" id="pub-title-link-46">Constant-Round Group Key Exchange from the Ring-LWE Assumption</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-46">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2019/05/08/constantround-group-key-exchange-from-the-ringlwe/final" class="mobile-pub-title" id="pub-title-link-sm-46">Constant-Round Group Key Exchange from the Ring-LWE Assumption</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-46">5/08/2019</strong> <br/> Status: <span id="pub-status-sm-46">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-46"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-46"> 5/08/2019 </td> </tr> <tr id="result-47"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-47">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-47"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2019/04/23/rtlpsc/final" id="pub-title-link-47">RTL-PSC: Automated Power Side-Channel Leakage Assessment at Register-Transfer Level</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-47">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2019/04/23/rtlpsc/final" class="mobile-pub-title" id="pub-title-link-sm-47">RTL-PSC: Automated Power Side-Channel Leakage Assessment at Register-Transfer Level</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-47">4/23/2019</strong> <br/> Status: <span id="pub-status-sm-47">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-47"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-47"> 4/23/2019 </td> </tr> <tr id="result-48"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-48">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-48"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2019/04/01/browser-fingerprinting-using-combinatorial-sequenc/final" id="pub-title-link-48">Browser Fingerprinting using Combinatorial Sequence Testing</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-48">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2019/04/01/browser-fingerprinting-using-combinatorial-sequenc/final" class="mobile-pub-title" id="pub-title-link-sm-48">Browser Fingerprinting using Combinatorial Sequence Testing</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-48">4/01/2019</strong> <br/> Status: <span id="pub-status-sm-48">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-48"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-48"> 4/01/2019 </td> </tr> <tr id="result-49"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-49">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-49"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2019/03/28/smart-contract-federated-identity-management/final" id="pub-title-link-49">Smart Contract Federated Identity Management without Third Party Authentication Services</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-49">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2019/03/28/smart-contract-federated-identity-management/final" class="mobile-pub-title" id="pub-title-link-sm-49">Smart Contract Federated Identity Management without Third Party Authentication Services</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-49">3/28/2019</strong> <br/> Status: <span id="pub-status-sm-49">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-49"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-49"> 3/28/2019 </td> </tr> <tr id="result-50"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-50">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-50"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2019/02/24/exploring-childrens-password-knowledge-and-practic/final" id="pub-title-link-50">Case Study – Exploring Children’s Password Knowledge and Practices</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-50">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2019/02/24/exploring-childrens-password-knowledge-and-practic/final" class="mobile-pub-title" id="pub-title-link-sm-50">Case Study – Exploring Children’s Password Knowledge and Practices</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-50">2/24/2019</strong> <br/> Status: <span id="pub-status-sm-50">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-50"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-50"> 2/24/2019 </td> </tr> <tr id="result-51"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-51">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-51"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2019/02/24/rating-human-phishing-message-detection-difficulty/final" id="pub-title-link-51">A Phish Scale: Rating Human Phishing Message Detection Difficulty</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-51">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2019/02/24/rating-human-phishing-message-detection-difficulty/final" class="mobile-pub-title" id="pub-title-link-sm-51">A Phish Scale: Rating Human Phishing Message Detection Difficulty</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-51">2/24/2019</strong> <br/> Status: <span id="pub-status-sm-51">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-51"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-51"> 2/24/2019 </td> </tr> <tr id="result-52"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-52">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-52"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2019/01/28/determining-forensic-data-requirements/final" id="pub-title-link-52">Determining Forensic Data Requirements for Detecting Hypervisor Attacks</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-52">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2019/01/28/determining-forensic-data-requirements/final" class="mobile-pub-title" id="pub-title-link-sm-52">Determining Forensic Data Requirements for Detecting Hypervisor Attacks</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-52">1/28/2019</strong> <br/> Status: <span id="pub-status-sm-52">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-52"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-52"> 1/28/2019 </td> </tr> <tr id="result-53"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-53">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-53"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2018/12/10/test-generation-framework-for-debugging-big-data-a/final" id="pub-title-link-53">A Method-Level Test Generation Framework for Debugging Big Data Applications</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-53">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2018/12/10/test-generation-framework-for-debugging-big-data-a/final" class="mobile-pub-title" id="pub-title-link-sm-53">A Method-Level Test Generation Framework for Debugging Big Data Applications</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-53">12/10/2018</strong> <br/> Status: <span id="pub-status-sm-53">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-53"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-53"> 12/10/2018 </td> </tr> <tr id="result-54"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-54">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-54"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2018/11/26/the-new-randomness-beacon-format-standard/final" id="pub-title-link-54">The New Randomness Beacon Format Standard: An Exercise in Limiting the Power of a Trusted Third Party</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-54">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2018/11/26/the-new-randomness-beacon-format-standard/final" class="mobile-pub-title" id="pub-title-link-sm-54">The New Randomness Beacon Format Standard: An Exercise in Limiting the Power of a Trusted Third Party</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-54">11/26/2018</strong> <br/> Status: <span id="pub-status-sm-54">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-54"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-54"> 11/26/2018 </td> </tr> <tr id="result-55"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-55">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-55"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2018/08/12/security-mindsets-in-organizations-that-develop-cr/final" id="pub-title-link-55">"We make it a big deal in the company": Security Mindsets in Organizations that Develop Cryptographic Products</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-55">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2018/08/12/security-mindsets-in-organizations-that-develop-cr/final" class="mobile-pub-title" id="pub-title-link-sm-55">"We make it a big deal in the company": Security Mindsets in Organizations that Develop Cryptographic Products</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-55">8/12/2018</strong> <br/> Status: <span id="pub-status-sm-55">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-55"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-55"> 8/12/2018 </td> </tr> <tr id="result-56"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-56">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-56"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2018/08/01/quantifying-information-exposure-in-internet-routi/final" id="pub-title-link-56">Quantifying Information Exposure in Internet Routing</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-56">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2018/08/01/quantifying-information-exposure-in-internet-routi/final" class="mobile-pub-title" id="pub-title-link-sm-56">Quantifying Information Exposure in Internet Routing</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-56">8/01/2018</strong> <br/> Status: <span id="pub-status-sm-56">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-56"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-56"> 8/01/2018 </td> </tr> <tr id="result-57"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-57">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-57"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2018/08/01/managed-blockchain-based-cryptocurrencies/final" id="pub-title-link-57">Managed Blockchain Based Cryptocurrencies with Consensus Enforced Rules and Transparency</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-57">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2018/08/01/managed-blockchain-based-cryptocurrencies/final" class="mobile-pub-title" id="pub-title-link-sm-57">Managed Blockchain Based Cryptocurrencies with Consensus Enforced Rules and Transparency</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-57">8/01/2018</strong> <br/> Status: <span id="pub-status-sm-57">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-57"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-57"> 8/01/2018 </td> </tr> <tr id="result-58"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-58">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-58"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2018/07/10/insider-threat-of-remote-administrators-in-clouds/final" id="pub-title-link-58">Modeling and Mitigating the Insider Threat of Remote Administrators in Clouds</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-58">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2018/07/10/insider-threat-of-remote-administrators-in-clouds/final" class="mobile-pub-title" id="pub-title-link-sm-58">Modeling and Mitigating the Insider Threat of Remote Administrators in Clouds</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-58">7/10/2018</strong> <br/> Status: <span id="pub-status-sm-58">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-58"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-58"> 7/10/2018 </td> </tr> <tr id="result-59"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-59">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-59"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2018/07/10/assessing-attack-impact-on-business-processes/final" id="pub-title-link-59">Assessing Attack Impact on Business Processes by Interconnecting Attack Graphs and Entity Dependency Graphs</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-59">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2018/07/10/assessing-attack-impact-on-business-processes/final" class="mobile-pub-title" id="pub-title-link-sm-59">Assessing Attack Impact on Business Processes by Interconnecting Attack Graphs and Entity Dependency Graphs</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-59">7/10/2018</strong> <br/> Status: <span id="pub-status-sm-59">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-59"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-59"> 7/10/2018 </td> </tr> <tr id="result-60"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-60">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-60"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2018/07/01/pseudoexhaustive-verification-of-rule-based-system/final" id="pub-title-link-60">Pseudo-exhaustive Verification of Rule Based Systems</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-60">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2018/07/01/pseudoexhaustive-verification-of-rule-based-system/final" class="mobile-pub-title" id="pub-title-link-sm-60">Pseudo-exhaustive Verification of Rule Based Systems</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-60">7/01/2018</strong> <br/> Status: <span id="pub-status-sm-60">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-60"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-60"> 7/01/2018 </td> </tr> <tr id="result-61"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-61">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-61"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2018/06/12/parallel-selftesting-of-the-ghz-state-with-a-proof/final" id="pub-title-link-61">Parallel Self-Testing of the GHZ State with a Proof by Diagrams</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-61">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2018/06/12/parallel-selftesting-of-the-ghz-state-with-a-proof/final" class="mobile-pub-title" id="pub-title-link-sm-61">Parallel Self-Testing of the GHZ State with a Proof by Diagrams</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-61">6/12/2018</strong> <br/> Status: <span id="pub-status-sm-61">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-61"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-61"> 6/12/2018 </td> </tr> <tr id="result-62"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-62">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-62"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2018/04/10/what-proportion-of-vulns-attributed-to-ordinary-co/final" id="pub-title-link-62">What Proportion of Vulnerabilities can be Attributed to Ordinary Coding Errors? [poster]</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-62">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2018/04/10/what-proportion-of-vulns-attributed-to-ordinary-co/final" class="mobile-pub-title" id="pub-title-link-sm-62">What Proportion of Vulnerabilities can be Attributed to Ordinary Coding Errors? [poster]</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-62">4/10/2018</strong> <br/> Status: <span id="pub-status-sm-62">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-62"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-62"> 4/10/2018 </td> </tr> <tr id="result-63"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-63">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-63"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2018/04/10/combinatorial-security-testing-course/final" id="pub-title-link-63">Combinatorial Security Testing Course</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-63">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2018/04/10/combinatorial-security-testing-course/final" class="mobile-pub-title" id="pub-title-link-sm-63">Combinatorial Security Testing Course</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-63">4/10/2018</strong> <br/> Status: <span id="pub-status-sm-63">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-63"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-63"> 4/10/2018 </td> </tr> <tr id="result-64"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-64">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-64"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2018/04/09/hferp-a-new-multivariate-encryption-scheme/final" id="pub-title-link-64">HFERP - A New Multivariate Encryption Scheme</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-64">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2018/04/09/hferp-a-new-multivariate-encryption-scheme/final" class="mobile-pub-title" id="pub-title-link-sm-64">HFERP - A New Multivariate Encryption Scheme</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-64">4/09/2018</strong> <br/> Status: <span id="pub-status-sm-64">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-64"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-64"> 4/09/2018 </td> </tr> <tr id="result-65"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-65">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-65"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2018/04/08/improved-cryptanalysis-of-hfev-via-projection/final" id="pub-title-link-65">Improved Cryptanalysis of HFEv- via Projection</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-65">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2018/04/08/improved-cryptanalysis-of-hfev-via-projection/final" class="mobile-pub-title" id="pub-title-link-sm-65">Improved Cryptanalysis of HFEv- via Projection</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-65">4/08/2018</strong> <br/> Status: <span id="pub-status-sm-65">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-65"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-65"> 4/08/2018 </td> </tr> <tr id="result-66"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-66">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-66"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2018/03/26/testing-iot-systems/final" id="pub-title-link-66">Testing IoT Systems</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-66">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2018/03/26/testing-iot-systems/final" class="mobile-pub-title" id="pub-title-link-sm-66">Testing IoT Systems</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-66">3/26/2018</strong> <br/> Status: <span id="pub-status-sm-66">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-66"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-66"> 3/26/2018 </td> </tr> <tr id="result-67"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-67">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-67"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2018/03/21/a-system-for-centralized-abac-policy-administratio/final" id="pub-title-link-67">A System for Centralized ABAC Policy Administration and Local ABAC Policy Decision and Enforcement in Host Systems using Access Control Lists</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-67">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2018/03/21/a-system-for-centralized-abac-policy-administratio/final" class="mobile-pub-title" id="pub-title-link-sm-67">A System for Centralized ABAC Policy Administration and Local ABAC Policy Decision and Enforcement in Host Systems using Access Control Lists</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-67">3/21/2018</strong> <br/> Status: <span id="pub-status-sm-67">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-67"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-67"> 3/21/2018 </td> </tr> <tr id="result-68"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-68">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-68"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2018/02/18/user-context-an-explanatory-variable-in-phishing-s/final" id="pub-title-link-68">User Context: An Explanatory Variable in Phishing Susceptibility</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-68">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2018/02/18/user-context-an-explanatory-variable-in-phishing-s/final" class="mobile-pub-title" id="pub-title-link-sm-68">User Context: An Explanatory Variable in Phishing Susceptibility</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-68">2/18/2018</strong> <br/> Status: <span id="pub-status-sm-68">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-68"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-68"> 2/18/2018 </td> </tr> <tr id="result-69"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-69">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-69"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2018/01/19/thermodynamic-analysis-of-classical-quantum-search/final" id="pub-title-link-69">Thermodynamic Analysis of Classical and Quantum Search Algorithms</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-69">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2018/01/19/thermodynamic-analysis-of-classical-quantum-search/final" class="mobile-pub-title" id="pub-title-link-sm-69">Thermodynamic Analysis of Classical and Quantum Search Algorithms</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-69">1/19/2018</strong> <br/> Status: <span id="pub-status-sm-69">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-69"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-69"> 1/19/2018 </td> </tr> <tr id="result-70"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-70">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-70"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2018/01/05/graphical-model-for-cloud-forensic-and-mission-imp/final" id="pub-title-link-70">A Layered Graphical Model for Cloud Forensic and Mission Impact Analysis</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-70">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2018/01/05/graphical-model-for-cloud-forensic-and-mission-imp/final" class="mobile-pub-title" id="pub-title-link-sm-70">A Layered Graphical Model for Cloud Forensic and Mission Impact Analysis</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-70">1/05/2018</strong> <br/> Status: <span id="pub-status-sm-70">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-70"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-70"> 1/05/2018 </td> </tr> <tr id="result-71"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-71">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-71"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2017/12/07/the-iterated-random-function-problem/final" id="pub-title-link-71">The Iterated Random Function Problem</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-71">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2017/12/07/the-iterated-random-function-problem/final" class="mobile-pub-title" id="pub-title-link-sm-71">The Iterated Random Function Problem</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-71">12/07/2017</strong> <br/> Status: <span id="pub-status-sm-71">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-71"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-71"> 12/07/2017 </td> </tr> <tr id="result-72"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-72">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-72"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2017/10/20/key-recovery-attack-on-cubic-abc-simplematrix-encr/final" id="pub-title-link-72">Key Recovery Attack on the Cubic ABC Simple Matrix Multivariate Encryption Scheme</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-72">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2017/10/20/key-recovery-attack-on-cubic-abc-simplematrix-encr/final" class="mobile-pub-title" id="pub-title-link-sm-72">Key Recovery Attack on the Cubic ABC Simple Matrix Multivariate Encryption Scheme</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-72">10/20/2017</strong> <br/> Status: <span id="pub-status-sm-72">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-72"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-72"> 10/20/2017 </td> </tr> <tr id="result-73"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-73">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-73"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2017/10/11/a-layered-graphical-model-for-mission-attack-impac/final" id="pub-title-link-73">A Layered Graphical Model for Mission Attack Impact Analysis</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-73">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2017/10/11/a-layered-graphical-model-for-mission-attack-impac/final" class="mobile-pub-title" id="pub-title-link-sm-73">A Layered Graphical Model for Mission Attack Impact Analysis</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-73">10/11/2017</strong> <br/> Status: <span id="pub-status-sm-73">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-73"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-73"> 10/11/2017 </td> </tr> <tr id="result-74"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-74">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-74"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2017/10/09/organizational-practices-in-crypto-development-and/final" id="pub-title-link-74">Organizational Practices in Cryptographic Development and Testing</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-74">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2017/10/09/organizational-practices-in-crypto-development-and/final" class="mobile-pub-title" id="pub-title-link-sm-74">Organizational Practices in Cryptographic Development and Testing</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-74">10/09/2017</strong> <br/> Status: <span id="pub-status-sm-74">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-74"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-74"> 10/09/2017 </td> </tr> <tr id="result-75"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-75">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-75"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2017/10/07/cryptocurrency-smart-contracts/final" id="pub-title-link-75">Cryptocurrency Smart Contracts for Distributed Consensus of Public Randomness</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-75">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2017/10/07/cryptocurrency-smart-contracts/final" class="mobile-pub-title" id="pub-title-link-sm-75">Cryptocurrency Smart Contracts for Distributed Consensus of Public Randomness</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-75">10/07/2017</strong> <br/> Status: <span id="pub-status-sm-75">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-75"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-75"> 10/07/2017 </td> </tr> <tr id="result-76"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-76">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-76"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2017/09/18/evaluating-the-effects-of-cyberattacks-on-cps/final" id="pub-title-link-76">Evaluating the Effects of Cyber-Attacks on Cyber Physical Systems using a Hardware-in-the-Loop Simulation Testbed</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-76">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2017/09/18/evaluating-the-effects-of-cyberattacks-on-cps/final" class="mobile-pub-title" id="pub-title-link-sm-76">Evaluating the Effects of Cyber-Attacks on Cyber Physical Systems using a Hardware-in-the-Loop Simulation Testbed</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-76">9/18/2017</strong> <br/> Status: <span id="pub-status-sm-76">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-76"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-76"> 9/18/2017 </td> </tr> <tr id="result-77"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-77">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-77"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2017/09/18/cloud-security-automation-framework/final" id="pub-title-link-77">Cloud Security Automation Framework</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-77">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2017/09/18/cloud-security-automation-framework/final" class="mobile-pub-title" id="pub-title-link-sm-77">Cloud Security Automation Framework</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-77">9/18/2017</strong> <br/> Status: <span id="pub-status-sm-77">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-77"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-77"> 9/18/2017 </td> </tr> <tr id="result-78"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-78">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-78"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2017/08/31/identifying-evidence-for-cloud-forensic-analysis/final" id="pub-title-link-78">Identifying Evidence for Cloud Forensic Analysis</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-78">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2017/08/31/identifying-evidence-for-cloud-forensic-analysis/final" class="mobile-pub-title" id="pub-title-link-sm-78">Identifying Evidence for Cloud Forensic Analysis</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-78">8/31/2017</strong> <br/> Status: <span id="pub-status-sm-78">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-78"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-78"> 8/31/2017 </td> </tr> <tr id="result-79"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-79">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-79"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2017/08/18/total-break-of-the-srp-encryption-scheme/final" id="pub-title-link-79">Total Break of the SRP Encryption Scheme</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-79">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2017/08/18/total-break-of-the-srp-encryption-scheme/final" class="mobile-pub-title" id="pub-title-link-sm-79">Total Break of the SRP Encryption Scheme</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-79">8/18/2017</strong> <br/> Status: <span id="pub-status-sm-79">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-79"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-79"> 8/18/2017 </td> </tr> <tr id="result-80"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-80">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-80"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2017/07/25/an-analysis-of-vulnerability-trends-20082016/final" id="pub-title-link-80">An Analysis of Vulnerability Trends, 2008-2016</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-80">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2017/07/25/an-analysis-of-vulnerability-trends-20082016/final" class="mobile-pub-title" id="pub-title-link-sm-80">An Analysis of Vulnerability Trends, 2008-2016</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-80">7/25/2017</strong> <br/> Status: <span id="pub-status-sm-80">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-80"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-80"> 7/25/2017 </td> </tr> <tr id="result-81"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-81">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-81"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2017/07/25/combinatorial-and-mcdc-coverage-levels-of-random-t/final" id="pub-title-link-81">Combinatorial and MC/DC Coverage Levels of Random Testing</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-81">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2017/07/25/combinatorial-and-mcdc-coverage-levels-of-random-t/final" class="mobile-pub-title" id="pub-title-link-sm-81">Combinatorial and MC/DC Coverage Levels of Random Testing</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-81">7/25/2017</strong> <br/> Status: <span id="pub-status-sm-81">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-81"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-81"> 7/25/2017 </td> </tr> <tr id="result-82"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-82">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-82"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2017/07/25/combinatorial-testing-of-full-text-search-in-web-a/final" id="pub-title-link-82">Combinatorial Testing of Full Text Search in Web Applications</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-82">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2017/07/25/combinatorial-testing-of-full-text-search-in-web-a/final" class="mobile-pub-title" id="pub-title-link-sm-82">Combinatorial Testing of Full Text Search in Web Applications</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-82">7/25/2017</strong> <br/> Status: <span id="pub-status-sm-82">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-82"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-82"> 7/25/2017 </td> </tr> <tr id="result-83"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-83">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-83"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2017/06/28/improved-attacks-for-cubic-abc-simple-matrix-encry/final" id="pub-title-link-83">Improved Attacks for Characteristic-2 Parameters of the Cubic ABC Simple Matrix Encryption Scheme</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-83">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2017/06/28/improved-attacks-for-cubic-abc-simple-matrix-encry/final" class="mobile-pub-title" id="pub-title-link-sm-83">Improved Attacks for Characteristic-2 Parameters of the Cubic ABC Simple Matrix Encryption Scheme</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-83">6/28/2017</strong> <br/> Status: <span id="pub-status-sm-83">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-83"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-83"> 6/28/2017 </td> </tr> <tr id="result-84"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-84">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-84"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2017/06/28/hmfev-an-efficient-multivariate-signature-scheme/final" id="pub-title-link-84">HMFEv - An Efficient Multivariate Signature Scheme</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-84">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2017/06/28/hmfev-an-efficient-multivariate-signature-scheme/final" class="mobile-pub-title" id="pub-title-link-sm-84">HMFEv - An Efficient Multivariate Signature Scheme</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-84">6/28/2017</strong> <br/> Status: <span id="pub-status-sm-84">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-84"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-84"> 6/28/2017 </td> </tr> <tr id="result-85"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-85">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-85"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2017/06/22/securing-networks-against-unpatchable-and-unknown/final" id="pub-title-link-85">Securing Networks Against Unpatchable and Unknown Vulnerabilities Using Heterogeneous Hardening Options</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-85">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2017/06/22/securing-networks-against-unpatchable-and-unknown/final" class="mobile-pub-title" id="pub-title-link-sm-85">Securing Networks Against Unpatchable and Unknown Vulnerabilities Using Heterogeneous Hardening Options</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-85">6/22/2017</strong> <br/> Status: <span id="pub-status-sm-85">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-85"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-85"> 6/22/2017 </td> </tr> <tr id="result-86"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-86">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-86"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2017/06/22/towards-actionable-mission-impact-assessment-in-co/final" id="pub-title-link-86">Towards Actionable Mission Impact Assessment in the Context of Cloud Computing</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-86">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2017/06/22/towards-actionable-mission-impact-assessment-in-co/final" class="mobile-pub-title" id="pub-title-link-sm-86">Towards Actionable Mission Impact Assessment in the Context of Cloud Computing</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-86">6/22/2017</strong> <br/> Status: <span id="pub-status-sm-86">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-86"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-86"> 6/22/2017 </td> </tr> <tr id="result-87"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-87">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-87"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2017/05/26/inferring-previously-uninstalled-apps-from-digital/final" id="pub-title-link-87">Inferring Previously Uninstalled Applications from Digital Traces</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-87">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2017/05/26/inferring-previously-uninstalled-apps-from-digital/final" class="mobile-pub-title" id="pub-title-link-sm-87">Inferring Previously Uninstalled Applications from Digital Traces</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-87">5/26/2017</strong> <br/> Status: <span id="pub-status-sm-87">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-87"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-87"> 5/26/2017 </td> </tr> <tr id="result-88"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-88">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-88"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2017/03/24/imposing-finegrain-ngac-over-database-queries/final" id="pub-title-link-88">Imposing Fine-grain Next Generation Access Control over Database Queries</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-88">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2017/03/24/imposing-finegrain-ngac-over-database-queries/final" class="mobile-pub-title" id="pub-title-link-sm-88">Imposing Fine-grain Next Generation Access Control over Database Queries</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-88">3/24/2017</strong> <br/> Status: <span id="pub-status-sm-88">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-88"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-88"> 3/24/2017 </td> </tr> <tr id="result-89"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-89">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-89"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2017/03/24/verification-of-resilience-policies-that-assist-ab/final" id="pub-title-link-89">Verification of Resilience Policies that Assist Attribute Based Access Control</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-89">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2017/03/24/verification-of-resilience-policies-that-assist-ab/final" class="mobile-pub-title" id="pub-title-link-sm-89">Verification of Resilience Policies that Assist Attribute Based Access Control</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-89">3/24/2017</strong> <br/> Status: <span id="pub-status-sm-89">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-89"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-89"> 3/24/2017 </td> </tr> <tr id="result-90"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-90">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-90"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2017/02/26/be-prepared-how-us-government-experts-think-about/final" id="pub-title-link-90">Be Prepared: How US Government Experts Think About Cybersecurity</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-90">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2017/02/26/be-prepared-how-us-government-experts-think-about/final" class="mobile-pub-title" id="pub-title-link-sm-90">Be Prepared: How US Government Experts Think About Cybersecurity</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-90">2/26/2017</strong> <br/> Status: <span id="pub-status-sm-90">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-90"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-90"> 2/26/2017 </td> </tr> <tr id="result-91"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-91">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-91"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2017/02/23/towards-probabilistic-identification-of-zeroday-at/final" id="pub-title-link-91">Towards probabilistic identification of zero-day attack paths</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-91">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2017/02/23/towards-probabilistic-identification-of-zeroday-at/final" class="mobile-pub-title" id="pub-title-link-sm-91">Towards probabilistic identification of zero-day attack paths</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-91">2/23/2017</strong> <br/> Status: <span id="pub-status-sm-91">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-91"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-91"> 2/23/2017 </td> </tr> <tr id="result-92"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-92">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-92"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2017/01/26/measuring-improving-effectiveness-of-defenseindept/final" id="pub-title-link-92">Measuring and Improving the Effectiveness of Defense-in-Depth Postures</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-92">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2017/01/26/measuring-improving-effectiveness-of-defenseindept/final" class="mobile-pub-title" id="pub-title-link-sm-92">Measuring and Improving the Effectiveness of Defense-in-Depth Postures</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-92">1/26/2017</strong> <br/> Status: <span id="pub-status-sm-92">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-92"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-92"> 1/26/2017 </td> </tr> <tr id="result-93"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-93">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-93"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2017/01/10/full-disk-encryption-bridging-theory-and-practice/final" id="pub-title-link-93">Full Disk Encryption: Bridging Theory and Practice</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-93">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2017/01/10/full-disk-encryption-bridging-theory-and-practice/final" class="mobile-pub-title" id="pub-title-link-sm-93">Full Disk Encryption: Bridging Theory and Practice</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-93">1/10/2017</strong> <br/> Status: <span id="pub-status-sm-93">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-93"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-93"> 1/10/2017 </td> </tr> <tr id="result-94"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-94">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-94"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2016/12/20/memory-and-motor-processes-of-password-entry-error/final" id="pub-title-link-94">Memory and Motor Processes of Password Entry Error</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-94">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2016/12/20/memory-and-motor-processes-of-password-entry-error/final" class="mobile-pub-title" id="pub-title-link-sm-94">Memory and Motor Processes of Password Entry Error</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-94">12/20/2016</strong> <br/> Status: <span id="pub-status-sm-94">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-94"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-94"> 12/20/2016 </td> </tr> <tr id="result-95"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-95">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-95"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2016/11/02/secure-multicast-group-management-key-distribution/final" id="pub-title-link-95">Secure Multicast Group Management and Key Distribution in IEEE 802.21</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-95">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2016/11/02/secure-multicast-group-management-key-distribution/final" class="mobile-pub-title" id="pub-title-link-sm-95">Secure Multicast Group Management and Key Distribution in IEEE 802.21</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-95">11/02/2016</strong> <br/> Status: <span id="pub-status-sm-95">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-95"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-95"> 11/02/2016 </td> </tr> <tr id="result-96"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-96">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-96"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2016/10/28/restricting-insider-access-multipolicy-access-cont/final" id="pub-title-link-96">Restricting Insider Access through Efficient Implementation of Multi-Policy Access Control Systems</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-96">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2016/10/28/restricting-insider-access-multipolicy-access-cont/final" class="mobile-pub-title" id="pub-title-link-sm-96">Restricting Insider Access through Efficient Implementation of Multi-Policy Access Control Systems</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-96">10/28/2016</strong> <br/> Status: <span id="pub-status-sm-96">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-96"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-96"> 10/28/2016 </td> </tr> <tr id="result-97"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-97">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-97"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2016/10/26/threat-modeling-for-cloud-data-center-infrastructu/final" id="pub-title-link-97">Threat Modeling for Cloud Data Center Infrastructures</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-97">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2016/10/26/threat-modeling-for-cloud-data-center-infrastructu/final" class="mobile-pub-title" id="pub-title-link-sm-97">Threat Modeling for Cloud Data Center Infrastructures</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-97">10/26/2016</strong> <br/> Status: <span id="pub-status-sm-97">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-97"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-97"> 10/26/2016 </td> </tr> <tr id="result-98"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-98">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-98"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2016/10/25/microsignatures-effectiveness-of-known-bad-ngrams/final" id="pub-title-link-98">Micro-Signatures: The Effectiveness of Known Bad N-Grams for Network Anomaly Detection</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-98">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2016/10/25/microsignatures-effectiveness-of-known-bad-ngrams/final" class="mobile-pub-title" id="pub-title-link-sm-98">Micro-Signatures: The Effectiveness of Known Bad N-Grams for Network Anomaly Detection</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-98">10/25/2016</strong> <br/> Status: <span id="pub-status-sm-98">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-98"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-98"> 10/25/2016 </td> </tr> <tr id="result-99"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-99">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-99"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2016/10/24/limiting-the-impact-of-stealthy-attacks-on-ics/final" id="pub-title-link-99">Limiting The Impact of Stealthy Attacks on Industrial Control Systems</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-99">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2016/10/24/limiting-the-impact-of-stealthy-attacks-on-ics/final" class="mobile-pub-title" id="pub-title-link-sm-99">Limiting The Impact of Stealthy Attacks on Industrial Control Systems</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-99">10/24/2016</strong> <br/> Status: <span id="pub-status-sm-99">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-99"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-99"> 10/24/2016 </td> </tr> <tr id="result-100"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-100">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-100"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2016/10/11/betterthan3n-lower-bound-circuit-complexity-explic/final" id="pub-title-link-100">A Better-Than-3n Lower Bound for the Circuit Complexity of an Explicit Function</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-100">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2016/10/11/betterthan3n-lower-bound-circuit-complexity-explic/final" class="mobile-pub-title" id="pub-title-link-sm-100">A Better-Than-3n Lower Bound for the Circuit Complexity of an Explicit Function</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-100">10/11/2016</strong> <br/> Status: <span id="pub-status-sm-100">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-100"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-100"> 10/11/2016 </td> </tr> <tr id="result-101"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-101">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-101"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2016/09/20/probabilistic-network-forensics-model-for-evidence/final" id="pub-title-link-101">A Probabilistic Network Forensics Model for Evidence Analysis</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-101">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2016/09/20/probabilistic-network-forensics-model-for-evidence/final" class="mobile-pub-title" id="pub-title-link-sm-101">A Probabilistic Network Forensics Model for Evidence Analysis</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-101">9/20/2016</strong> <br/> Status: <span id="pub-status-sm-101">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-101"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-101"> 9/20/2016 </td> </tr> <tr id="result-102"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-102">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-102"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2016/09/07/estimating-tway-fault-profile-evolution-during-tes/final" id="pub-title-link-102">Estimating t-Way Fault Profile Evolution During Testing</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-102">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2016/09/07/estimating-tway-fault-profile-evolution-during-tes/final" class="mobile-pub-title" id="pub-title-link-sm-102">Estimating t-Way Fault Profile Evolution During Testing</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-102">9/07/2016</strong> <br/> Status: <span id="pub-status-sm-102">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-102"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-102"> 9/07/2016 </td> </tr> <tr id="result-103"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-103">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-103"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2016/09/01/whats-a-special-character-anyway-ambiguous-termino/final" id="pub-title-link-103">What’s a Special Character Anyway? Effects of Ambiguous Terminology in Password Rules</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-103">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2016/09/01/whats-a-special-character-anyway-ambiguous-termino/final" class="mobile-pub-title" id="pub-title-link-sm-103">What’s a Special Character Anyway? Effects of Ambiguous Terminology in Password Rules</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-103">9/01/2016</strong> <br/> Status: <span id="pub-status-sm-103">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-103"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-103"> 9/01/2016 </td> </tr> <tr id="result-104"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-104">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-104"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2016/07/30/general-methods-for-access-control-policy-verifica/final" id="pub-title-link-104">General Methods for Access Control Policy Verification</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-104">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2016/07/30/general-methods-for-access-control-policy-verifica/final" class="mobile-pub-title" id="pub-title-link-sm-104">General Methods for Access Control Policy Verification</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-104">7/30/2016</strong> <br/> Status: <span id="pub-status-sm-104">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-104"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-104"> 7/30/2016 </td> </tr> <tr id="result-105"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-105">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-105"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2016/07/20/diversifying-network-services-under-cost-constrain/final" id="pub-title-link-105">Diversifying Network Services under Cost Constraints for Better Resilience against Unknown Attacks</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-105">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2016/07/20/diversifying-network-services-under-cost-constrain/final" class="mobile-pub-title" id="pub-title-link-sm-105">Diversifying Network Services under Cost Constraints for Better Resilience against Unknown Attacks</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-105">7/20/2016</strong> <br/> Status: <span id="pub-status-sm-105">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-105"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-105"> 7/20/2016 </td> </tr> <tr id="result-106"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-106">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-106"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2016/05/11/inftesla-multicast-delayed-authentication-for-powe/final" id="pub-title-link-106">inf-TESLA: Multicast Delayed Authentication for Streaming Sensor Data in Electric Power Systems</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-106">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2016/05/11/inftesla-multicast-delayed-authentication-for-powe/final" class="mobile-pub-title" id="pub-title-link-sm-106">inf-TESLA: Multicast Delayed Authentication for Streaming Sensor Data in Electric Power Systems</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-106">5/11/2016</strong> <br/> Status: <span id="pub-status-sm-106">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-106"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-106"> 5/11/2016 </td> </tr> <tr id="result-107"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-107">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-107"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2016/05/10/combinatorial-coverage-analysis-tls-cipher-suite-r/final" id="pub-title-link-107">Combinatorial Coverage Analysis of Subsets of the TLS Cipher Suite Registry</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-107">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2016/05/10/combinatorial-coverage-analysis-tls-cipher-suite-r/final" class="mobile-pub-title" id="pub-title-link-sm-107">Combinatorial Coverage Analysis of Subsets of the TLS Cipher Suite Registry</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-107">5/10/2016</strong> <br/> Status: <span id="pub-status-sm-107">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-107"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-107"> 5/10/2016 </td> </tr> <tr id="result-108"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-108">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-108"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2016/04/11/pseudoexhaustive-testing-of-abac-rules/final" id="pub-title-link-108">Pseudo-Exhaustive Testing of Attribute Based Access Control Rules</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-108">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2016/04/11/pseudoexhaustive-testing-of-abac-rules/final" class="mobile-pub-title" id="pub-title-link-sm-108">Pseudo-Exhaustive Testing of Attribute Based Access Control Rules</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-108">4/11/2016</strong> <br/> Status: <span id="pub-status-sm-108">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-108"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-108"> 4/11/2016 </td> </tr> <tr id="result-109"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-109">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-109"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2016/04/05/performance-eval-of-secure-ics-design-railway-cont/final" id="pub-title-link-109">Performance Evaluation of Secure Industrial Control System Design: A Railway Control System Case Study</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-109">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2016/04/05/performance-eval-of-secure-ics-design-railway-cont/final" class="mobile-pub-title" id="pub-title-link-sm-109">Performance Evaluation of Secure Industrial Control System Design: A Railway Control System Case Study</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-109">4/05/2016</strong> <br/> Status: <span id="pub-status-sm-109">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-109"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-109"> 4/05/2016 </td> </tr> <tr id="result-110"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-110">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-110"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2016/03/20/analysis-virtual-networking-options-securing-virtu/final" id="pub-title-link-110">Analysis of Virtual Networking Options for Securing Virtual Machines</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-110">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2016/03/20/analysis-virtual-networking-options-securing-virtu/final" class="mobile-pub-title" id="pub-title-link-sm-110">Analysis of Virtual Networking Options for Securing Virtual Machines</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-110">3/20/2016</strong> <br/> Status: <span id="pub-status-sm-110">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-110"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-110"> 3/20/2016 </td> </tr> <tr id="result-111"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-111">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-111"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2016/03/11/xacml-and-next-generation-access-control-ngac/final" id="pub-title-link-111">Extensible Access Control Markup Language (XACML) and Next Generation Access Control (NGAC)</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-111">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2016/03/11/xacml-and-next-generation-access-control-ngac/final" class="mobile-pub-title" id="pub-title-link-sm-111">Extensible Access Control Markup Language (XACML) and Next Generation Access Control (NGAC)</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-111">3/11/2016</strong> <br/> Status: <span id="pub-status-sm-111">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-111"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-111"> 3/11/2016 </td> </tr> <tr id="result-112"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-112">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-112"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2016/03/03/vulnerabilities-of-mceliece-in-the-world-of-escher/final" id="pub-title-link-112">Vulnerabilities of "McEliece in the World of Escher"</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-112">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2016/03/03/vulnerabilities-of-mceliece-in-the-world-of-escher/final" class="mobile-pub-title" id="pub-title-link-sm-112">Vulnerabilities of "McEliece in the World of Escher"</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-112">3/03/2016</strong> <br/> Status: <span id="pub-status-sm-112">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-112"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-112"> 3/03/2016 </td> </tr> <tr id="result-113"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-113">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-113"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2016/02/24/on-the-differential-security-of-the-hfev-signature/final" id="pub-title-link-113">On the Differential Security of the HFEv- Signature Primitive</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-113">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2016/02/24/on-the-differential-security-of-the-hfev-signature/final" class="mobile-pub-title" id="pub-title-link-sm-113">On the Differential Security of the HFEv- Signature Primitive</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-113">2/24/2016</strong> <br/> Status: <span id="pub-status-sm-113">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-113"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-113"> 2/24/2016 </td> </tr> <tr id="result-114"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-114">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-114"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2016/02/24/security-analysis-and-key-modification-for-zhfe/final" id="pub-title-link-114">Security Analysis and Key Modification for ZHFE</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-114">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2016/02/24/security-analysis-and-key-modification-for-zhfe/final" class="mobile-pub-title" id="pub-title-link-sm-114">Security Analysis and Key Modification for ZHFE</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-114">2/24/2016</strong> <br/> Status: <span id="pub-status-sm-114">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-114"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-114"> 2/24/2016 </td> </tr> <tr id="result-115"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-115">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-115"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2015/11/15/minimizing-attack-graph-data-structures/final" id="pub-title-link-115">Minimizing Attack Graph Data Structures</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-115">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2015/11/15/minimizing-attack-graph-data-structures/final" class="mobile-pub-title" id="pub-title-link-sm-115">Minimizing Attack Graph Data Structures</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-115">11/15/2015</strong> <br/> Status: <span id="pub-status-sm-115">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-115"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-115"> 11/15/2015 </td> </tr> <tr id="result-116"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-116">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-116"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2015/10/15/a-logic-based-network-forensics-model-for-evidence/final" id="pub-title-link-116">A Logic Based Network Forensics Model for Evidence Analysis [poster]</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-116">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2015/10/15/a-logic-based-network-forensics-model-for-evidence/final" class="mobile-pub-title" id="pub-title-link-sm-116">A Logic Based Network Forensics Model for Evidence Analysis [poster]</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-116">10/15/2015</strong> <br/> Status: <span id="pub-status-sm-116">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-116"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-116"> 10/15/2015 </td> </tr> <tr id="result-117"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-117">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-117"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2015/10/12/who-touched-my-mission-probabilistic-mission-impac/final" id="pub-title-link-117">Who Touched My Mission: Towards Probabilistic Mission Impact Assessment</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-117">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2015/10/12/who-touched-my-mission-probabilistic-mission-impac/final" class="mobile-pub-title" id="pub-title-link-sm-117">Who Touched My Mission: Towards Probabilistic Mission Impact Assessment</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-117">10/12/2015</strong> <br/> Status: <span id="pub-status-sm-117">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-117"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-117"> 10/12/2015 </td> </tr> <tr id="result-118"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-118">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-118"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2015/09/13/predictive-models-for-minentropy-estimation/final" id="pub-title-link-118">Predictive Models for Min-Entropy Estimation</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-118">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2015/09/13/predictive-models-for-minentropy-estimation/final" class="mobile-pub-title" id="pub-title-link-sm-118">Predictive Models for Min-Entropy Estimation</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-118">9/13/2015</strong> <br/> Status: <span id="pub-status-sm-118">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-118"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-118"> 9/13/2015 </td> </tr> <tr id="result-119"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-119">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-119"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2015/08/13/implementing-and-managing-policy-rules-in-attribut/final" id="pub-title-link-119">Implementing and Managing Policy Rules in Attribute Based Access Control</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-119">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2015/08/13/implementing-and-managing-policy-rules-in-attribut/final" class="mobile-pub-title" id="pub-title-link-sm-119">Implementing and Managing Policy Rules in Attribute Based Access Control</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-119">8/13/2015</strong> <br/> Status: <span id="pub-status-sm-119">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-119"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-119"> 8/13/2015 </td> </tr> <tr id="result-120"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-120">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-120"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2015/08/04/constructive-relationships-between-algebraic-thick/final" id="pub-title-link-120">Constructive Relationships Between Algebraic Thickness and Normality</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-120">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2015/08/04/constructive-relationships-between-algebraic-thick/final" class="mobile-pub-title" id="pub-title-link-sm-120">Constructive Relationships Between Algebraic Thickness and Normality</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-120">8/04/2015</strong> <br/> Status: <span id="pub-status-sm-120">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-120"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-120"> 8/04/2015 </td> </tr> <tr id="result-121"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-121">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-121"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2015/08/02/human-generated-passwords-impacts-of-password-requ/final" id="pub-title-link-121">Human Generated Passwords -- The Impacts of Password Requirements and Presentation Styles</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-121">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2015/08/02/human-generated-passwords-impacts-of-password-requ/final" class="mobile-pub-title" id="pub-title-link-sm-121">Human Generated Passwords -- The Impacts of Password Requirements and Presentation Styles</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-121">8/02/2015</strong> <br/> Status: <span id="pub-status-sm-121">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-121"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-121"> 8/02/2015 </td> </tr> <tr id="result-122"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-122">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-122"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2015/08/02/the-authentication-equation-tool-to-visualize-pass/final" id="pub-title-link-122">The Authentication Equation: A Tool to Visualize the Convergence of Security and Usability of Text-Based Passwords</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-122">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2015/08/02/the-authentication-equation-tool-to-visualize-pass/final" class="mobile-pub-title" id="pub-title-link-sm-122">The Authentication Equation: A Tool to Visualize the Convergence of Security and Usability of Text-Based Passwords</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-122">8/02/2015</strong> <br/> Status: <span id="pub-status-sm-122">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-122"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-122"> 8/02/2015 </td> </tr> <tr id="result-123"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-123">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-123"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2015/08/02/effects-of-password-permutation-on-subjective-usab/final" id="pub-title-link-123">Effects of Password Permutation on Subjective Usability Across Platforms</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-123">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2015/08/02/effects-of-password-permutation-on-subjective-usab/final" class="mobile-pub-title" id="pub-title-link-sm-123">Effects of Password Permutation on Subjective Usability Across Platforms</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-123">8/02/2015</strong> <br/> Status: <span id="pub-status-sm-123">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-123"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-123"> 8/02/2015 </td> </tr> <tr id="result-124"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-124">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-124"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2015/08/02/password-policy-languages-usable-translation-infor/final" id="pub-title-link-124">Password Policy Languages: Usable Translation from the Informal to the Formal</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-124">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2015/08/02/password-policy-languages-usable-translation-infor/final" class="mobile-pub-title" id="pub-title-link-sm-124">Password Policy Languages: Usable Translation from the Informal to the Formal</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-124">8/02/2015</strong> <br/> Status: <span id="pub-status-sm-124">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-124"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-124"> 8/02/2015 </td> </tr> <tr id="result-125"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-125">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-125"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2015/08/02/what-4500-people-can-tell-you-employees-attitudes/final" id="pub-title-link-125">What 4,500+ People Can Tell You: Employees' Attitudes Toward Organizational Password Policy Do Matter</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-125">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2015/08/02/what-4500-people-can-tell-you-employees-attitudes/final" class="mobile-pub-title" id="pub-title-link-sm-125">What 4,500+ People Can Tell You: Employees' Attitudes Toward Organizational Password Policy Do Matter</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-125">8/02/2015</strong> <br/> Status: <span id="pub-status-sm-125">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-125"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-125"> 8/02/2015 </td> </tr> <tr id="result-126"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-126">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-126"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2015/08/02/privacy-security-in-brave-new-world-multiple-menta/final" id="pub-title-link-126">Privacy and Security in the Brave New World: The Use of Multiple Mental Models</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-126">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2015/08/02/privacy-security-in-brave-new-world-multiple-menta/final" class="mobile-pub-title" id="pub-title-link-sm-126">Privacy and Security in the Brave New World: The Use of Multiple Mental Models</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-126">8/02/2015</strong> <br/> Status: <span id="pub-status-sm-126">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-126"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-126"> 8/02/2015 </td> </tr> <tr id="result-127"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-127">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-127"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2015/07/30/analysis-of-network-segmentation-techniques-in-clo/final" id="pub-title-link-127">Analysis of Network Segmentation Techniques in Cloud Data Centers</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-127">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2015/07/30/analysis-of-network-segmentation-techniques-in-clo/final" class="mobile-pub-title" id="pub-title-link-sm-127">Analysis of Network Segmentation Techniques in Cloud Data Centers</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-127">7/30/2015</strong> <br/> Status: <span id="pub-status-sm-127">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-127"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-127"> 7/30/2015 </td> </tr> <tr id="result-128"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-128">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-128"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2015/07/24/measuring-systematic-and-random-error-in-digital-f/final" id="pub-title-link-128">Measuring Systematic and Random Error in Digital Forensics [abstract]</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-128">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2015/07/24/measuring-systematic-and-random-error-in-digital-f/final" class="mobile-pub-title" id="pub-title-link-sm-128">Measuring Systematic and Random Error in Digital Forensics [abstract]</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-128">7/24/2015</strong> <br/> Status: <span id="pub-status-sm-128">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-128"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-128"> 7/24/2015 </td> </tr> <tr id="result-129"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-129">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-129"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2015/07/20/pflash-secure-asymmetric-signatures-on-smart-cards/final" id="pub-title-link-129">PFLASH - Secure Asymmetric Signatures on Smart Cards</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-129">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2015/07/20/pflash-secure-asymmetric-signatures-on-smart-cards/final" class="mobile-pub-title" id="pub-title-link-sm-129">PFLASH - Secure Asymmetric Signatures on Smart Cards</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-129">7/20/2015</strong> <br/> Status: <span id="pub-status-sm-129">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-129"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-129"> 7/20/2015 </td> </tr> <tr id="result-130"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-130">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-130"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2015/04/17/equivalence-class-verification-oraclefree-testing/final" id="pub-title-link-130">Equivalence Class Verification and Oracle-Free Testing Using Two-layer Covering Arrays</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-130">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2015/04/17/equivalence-class-verification-oraclefree-testing/final" class="mobile-pub-title" id="pub-title-link-sm-130">Equivalence Class Verification and Oracle-Free Testing Using Two-layer Covering Arrays</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-130">4/17/2015</strong> <br/> Status: <span id="pub-status-sm-130">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-130"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-130"> 4/17/2015 </td> </tr> <tr id="result-131"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-131">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-131"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2015/04/09/password-entry-errors-memory-or-motor/final" id="pub-title-link-131">Password Entry Errors: Memory or Motor?</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-131">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2015/04/09/password-entry-errors-memory-or-motor/final" class="mobile-pub-title" id="pub-title-link-sm-131">Password Entry Errors: Memory or Motor?</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-131">4/09/2015</strong> <br/> Status: <span id="pub-status-sm-131">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-131"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-131"> 4/09/2015 </td> </tr> <tr id="result-132"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-132">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-132"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2015/04/02/actr-modeling-of-password-entry-errors-poster/final" id="pub-title-link-132">ACT-R Modeling of Password Entry Errors [poster]</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-132">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2015/04/02/actr-modeling-of-password-entry-errors-poster/final" class="mobile-pub-title" id="pub-title-link-sm-132">ACT-R Modeling of Password Entry Errors [poster]</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-132">4/02/2015</strong> <br/> Status: <span id="pub-status-sm-132">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-132"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-132"> 4/02/2015 </td> </tr> <tr id="result-133"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-133">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-133"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2015/03/17/multiplicative-complexity-of-boolean-functions-on/final" id="pub-title-link-133">The Multiplicative Complexity of Boolean Functions on Four and Five Variables</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-133">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2015/03/17/multiplicative-complexity-of-boolean-functions-on/final" class="mobile-pub-title" id="pub-title-link-sm-133">The Multiplicative Complexity of Boolean Functions on Four and Five Variables</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-133">3/17/2015</strong> <br/> Status: <span id="pub-status-sm-133">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-133"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-133"> 3/17/2015 </td> </tr> <tr id="result-134"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-134">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-134"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2015/03/03/resilience-of-internet-to-colluding-country-induce/final" id="pub-title-link-134">The Resilience of the Internet to Colluding Country Induced Connectivity Disruptions</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-134">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2015/03/03/resilience-of-internet-to-colluding-country-induce/final" class="mobile-pub-title" id="pub-title-link-sm-134">The Resilience of the Internet to Colluding Country Induced Connectivity Disruptions</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-134">3/03/2015</strong> <br/> Status: <span id="pub-status-sm-134">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-134"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-134"> 3/03/2015 </td> </tr> <tr id="result-135"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-135">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-135"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2015/01/28/a-logic-based-network-forensics-model-for-evidence/final" id="pub-title-link-135">A Logic Based Network Forensics Model for Evidence Analysis</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-135">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2015/01/28/a-logic-based-network-forensics-model-for-evidence/final" class="mobile-pub-title" id="pub-title-link-sm-135">A Logic Based Network Forensics Model for Evidence Analysis</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-135">1/28/2015</strong> <br/> Status: <span id="pub-status-sm-135">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-135"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-135"> 1/28/2015 </td> </tr> <tr id="result-136"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-136">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-136"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2015/01/18/how-random-is-your-rng/final" id="pub-title-link-136">How Random is Your RNG?</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-136">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2015/01/18/how-random-is-your-rng/final" class="mobile-pub-title" id="pub-title-link-sm-136">How Random is Your RNG?</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-136">1/18/2015</strong> <br/> Status: <span id="pub-status-sm-136">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-136"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-136"> 1/18/2015 </td> </tr> <tr id="result-137"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-137">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-137"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2014/12/28/deploymentdriven-security-configuration-for-virtua/final" id="pub-title-link-137">Deployment-driven Security Configuration for Virtual Networks</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-137">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2014/12/28/deploymentdriven-security-configuration-for-virtua/final" class="mobile-pub-title" id="pub-title-link-sm-137">Deployment-driven Security Configuration for Virtual Networks</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-137">12/28/2014</strong> <br/> Status: <span id="pub-status-sm-137">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-137"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-137"> 12/28/2014 </td> </tr> <tr id="result-138"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-138">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-138"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2014/11/18/electrodermal-activity-eye-movements-inform-usabil/final" id="pub-title-link-138">Electrodermal Activity and Eye Movements Inform the Usability of Passwords [poster]</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-138">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2014/11/18/electrodermal-activity-eye-movements-inform-usabil/final" class="mobile-pub-title" id="pub-title-link-sm-138">Electrodermal Activity and Eye Movements Inform the Usability of Passwords [poster]</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-138">11/18/2014</strong> <br/> Status: <span id="pub-status-sm-138">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-138"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-138"> 11/18/2014 </td> </tr> <tr id="result-139"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-139">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-139"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2014/11/11/an-access-control-scheme-for-big-data-processing/final" id="pub-title-link-139">An Access Control Scheme for Big Data Processing</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-139">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2014/11/11/an-access-control-scheme-for-big-data-processing/final" class="mobile-pub-title" id="pub-title-link-sm-139">An Access Control Scheme for Big Data Processing</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-139">11/11/2014</strong> <br/> Status: <span id="pub-status-sm-139">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-139"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-139"> 11/11/2014 </td> </tr> <tr id="result-140"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-140">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-140"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2014/10/08/lightweight-packing-of-log-files-for-improved-comp/final" id="pub-title-link-140">Lightweight Packing of Log Files for Improved Compression in Mobile Tactical Networks</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-140">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2014/10/08/lightweight-packing-of-log-files-for-improved-comp/final" class="mobile-pub-title" id="pub-title-link-sm-140">Lightweight Packing of Log Files for Improved Compression in Mobile Tactical Networks</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-140">10/08/2014</strong> <br/> Status: <span id="pub-status-sm-140">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-140"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-140"> 10/08/2014 </td> </tr> <tr id="result-141"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-141">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-141"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2014/10/06/a-cybersecurity-testbed-for-industrial-control-sys/final" id="pub-title-link-141">A Cybersecurity Testbed for Industrial Control Systems</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-141">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2014/10/06/a-cybersecurity-testbed-for-industrial-control-sys/final" class="mobile-pub-title" id="pub-title-link-sm-141">A Cybersecurity Testbed for Industrial Control Systems</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-141">10/06/2014</strong> <br/> Status: <span id="pub-status-sm-141">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-141"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-141"> 10/06/2014 </td> </tr> <tr id="result-142"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-142">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-142"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2014/10/03/optimizing-information-set-decoding-algorithms-to/final" id="pub-title-link-142">Optimizing Information Set Decoding Algorithms to Attack Cyclosymmetric MDPC Codes</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-142">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2014/10/03/optimizing-information-set-decoding-algorithms-to/final" class="mobile-pub-title" id="pub-title-link-sm-142">Optimizing Information Set Decoding Algorithms to Attack Cyclosymmetric MDPC Codes</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-142">10/03/2014</strong> <br/> Status: <span id="pub-status-sm-142">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-142"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-142"> 10/03/2014 </td> </tr> <tr id="result-143"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-143">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-143"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2014/10/03/an-asymptotically-optimal-structural-attack-on-the/final" id="pub-title-link-143">An Asymptotically Optimal Structural Attack on the ABC Multivariate Encryption Scheme</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-143">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2014/10/03/an-asymptotically-optimal-structural-attack-on-the/final" class="mobile-pub-title" id="pub-title-link-sm-143">An Asymptotically Optimal Structural Attack on the ABC Multivariate Encryption Scheme</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-143">10/03/2014</strong> <br/> Status: <span id="pub-status-sm-143">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-143"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-143"> 10/03/2014 </td> </tr> <tr id="result-144"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-144">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-144"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2014/10/01/differential-properties-of-the-hfe-cryptosystem/final" id="pub-title-link-144">Differential Properties of the HFE Cryptosystem</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-144">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2014/10/01/differential-properties-of-the-hfe-cryptosystem/final" class="mobile-pub-title" id="pub-title-link-sm-144">Differential Properties of the HFE Cryptosystem</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-144">10/01/2014</strong> <br/> Status: <span id="pub-status-sm-144">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-144"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-144"> 10/01/2014 </td> </tr> <tr id="result-145"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-145">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-145"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2014/09/24/inferring-the-stealthy-bridges-btwn-enterprise-net/final" id="pub-title-link-145">Inferring the Stealthy Bridges between Enterprise Network Islands in Cloud Using Cross-Layer Bayesian Networks</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-145">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2014/09/24/inferring-the-stealthy-bridges-btwn-enterprise-net/final" class="mobile-pub-title" id="pub-title-link-sm-145">Inferring the Stealthy Bridges between Enterprise Network Islands in Cloud Using Cross-Layer Bayesian Networks</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-145">9/24/2014</strong> <br/> Status: <span id="pub-status-sm-145">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-145"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-145"> 9/24/2014 </td> </tr> <tr id="result-146"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-146">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-146"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2014/09/11/modeling-network-diversity-for-evaluating-the-robu/final" id="pub-title-link-146">Modeling Network Diversity for Evaluating the Robustness of Networks against Zero-Day Attacks</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-146">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2014/09/11/modeling-network-diversity-for-evaluating-the-robu/final" class="mobile-pub-title" id="pub-title-link-sm-146">Modeling Network Diversity for Evaluating the Robustness of Networks against Zero-Day Attacks</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-146">9/11/2014</strong> <br/> Status: <span id="pub-status-sm-146">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-146"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-146"> 9/11/2014 </td> </tr> <tr id="result-147"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-147">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-147"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2014/08/15/on-the-unification-of-access-control-and-data-serv/final" id="pub-title-link-147">On the Unification of Access Control and Data Services</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-147">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2014/08/15/on-the-unification-of-access-control-and-data-serv/final" class="mobile-pub-title" id="pub-title-link-sm-147">On the Unification of Access Control and Data Services</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-147">8/15/2014</strong> <br/> Status: <span id="pub-status-sm-147">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-147"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-147"> 8/15/2014 </td> </tr> <tr id="result-148"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-148">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-148"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2014/07/01/using-network-tainting-to-bound-the-scope-of-netwo/final" id="pub-title-link-148">Using Network Tainting to Bound the Scope of Network Ingress Attacks</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-148">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2014/07/01/using-network-tainting-to-bound-the-scope-of-netwo/final" class="mobile-pub-title" id="pub-title-link-sm-148">Using Network Tainting to Bound the Scope of Network Ingress Attacks</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-148">7/01/2014</strong> <br/> Status: <span id="pub-status-sm-148">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-148"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-148"> 7/01/2014 </td> </tr> <tr id="result-149"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-149">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-149"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2014/06/22/cognitivebehavioral-framework-user-password-mgmt-l/final" id="pub-title-link-149">A Cognitive-Behavioral Framework of User Password Management Lifecycle</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-149">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2014/06/22/cognitivebehavioral-framework-user-password-mgmt-l/final" class="mobile-pub-title" id="pub-title-link-sm-149">A Cognitive-Behavioral Framework of User Password Management Lifecycle</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-149">6/22/2014</strong> <br/> Status: <span id="pub-status-sm-149">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-149"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-149"> 6/22/2014 </td> </tr> <tr id="result-150"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-150">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-150"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2014/06/22/character-strings-memory-and-passwords/final" id="pub-title-link-150">Character Strings, Memory and Passwords: What a Recall Study Can Tell Us</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-150">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2014/06/22/character-strings-memory-and-passwords/final" class="mobile-pub-title" id="pub-title-link-sm-150">Character Strings, Memory and Passwords: What a Recall Study Can Tell Us</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-150">6/22/2014</strong> <br/> Status: <span id="pub-status-sm-150">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-150"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-150"> 6/22/2014 </td> </tr> <tr id="result-151"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-151">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-151"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2014/06/22/preserving-privacy-more-than-reading-a-message/final" id="pub-title-link-151">Preserving Privacy – More Than Reading a Message</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-151">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2014/06/22/preserving-privacy-more-than-reading-a-message/final" class="mobile-pub-title" id="pub-title-link-sm-151">Preserving Privacy – More Than Reading a Message</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-151">6/22/2014</strong> <br/> Status: <span id="pub-status-sm-151">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-151"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-151"> 6/22/2014 </td> </tr> <tr id="result-152"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-152">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-152"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2014/06/22/scale-to-assess-linguistic-phonological-difficulty/final" id="pub-title-link-152">Development of a Scale to Assess the Linguistic and Phonological Difficulty of Passwords</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-152">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2014/06/22/scale-to-assess-linguistic-phonological-difficulty/final" class="mobile-pub-title" id="pub-title-link-sm-152">Development of a Scale to Assess the Linguistic and Phonological Difficulty of Passwords</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-152">6/22/2014</strong> <br/> Status: <span id="pub-status-sm-152">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-152"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-152"> 6/22/2014 </td> </tr> <tr id="result-153"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-153">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-153"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2014/06/22/i-cant-type-that-password-entry-on-mobile-devices/final" id="pub-title-link-153">I Can't Type That! P@$$w0rd Entry on Mobile Devices</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-153">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2014/06/22/i-cant-type-that-password-entry-on-mobile-devices/final" class="mobile-pub-title" id="pub-title-link-sm-153">I Can't Type That! P@$$w0rd Entry on Mobile Devices</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-153">6/22/2014</strong> <br/> Status: <span id="pub-status-sm-153">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-153"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-153"> 6/22/2014 </td> </tr> <tr id="result-154"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-154">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-154"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2014/05/29/analysis-of-protection-options-for-virtualized-inf/final" id="pub-title-link-154">Analysis of Protection Options for Virtualized Infrastructures in Infrastructure as a Service Cloud</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-154">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2014/05/29/analysis-of-protection-options-for-virtualized-inf/final" class="mobile-pub-title" id="pub-title-link-sm-154">Analysis of Protection Options for Virtualized Infrastructures in Infrastructure as a Service Cloud</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-154">5/29/2014</strong> <br/> Status: <span id="pub-status-sm-154">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-154"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-154"> 5/29/2014 </td> </tr> <tr id="result-155"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-155">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-155"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2014/04/27/using-evidence-from-security-events-for-network-at/final" id="pub-title-link-155">A Model Towards Using Evidence from Security Events for Network Attack Analysis</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-155">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2014/04/27/using-evidence-from-security-events-for-network-at/final" class="mobile-pub-title" id="pub-title-link-sm-155">A Model Towards Using Evidence from Security Events for Network Attack Analysis</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-155">4/27/2014</strong> <br/> Status: <span id="pub-status-sm-155">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-155"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-155"> 4/27/2014 </td> </tr> <tr id="result-156"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-156">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-156"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2014/04/01/an-empirical-comparison-of-combinatorial-and-rando/final" id="pub-title-link-156">An Empirical Comparison of Combinatorial and Random Testing</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-156">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2014/04/01/an-empirical-comparison-of-combinatorial-and-rando/final" class="mobile-pub-title" id="pub-title-link-sm-156">An Empirical Comparison of Combinatorial and Random Testing</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-156">4/01/2014</strong> <br/> Status: <span id="pub-status-sm-156">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-156"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-156"> 4/01/2014 </td> </tr> <tr id="result-157"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-157">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-157"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2014/04/01/introducing-combinatorial-testing-in-a-large-organ/final" id="pub-title-link-157">Introducing Combinatorial Testing in a Large Organization: Pilot Project Experience Report [poster]</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-157">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2014/04/01/introducing-combinatorial-testing-in-a-large-organ/final" class="mobile-pub-title" id="pub-title-link-sm-157">Introducing Combinatorial Testing in a Large Organization: Pilot Project Experience Report [poster]</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-157">4/01/2014</strong> <br/> Status: <span id="pub-status-sm-157">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-157"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-157"> 4/01/2014 </td> </tr> <tr id="result-158"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-158">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-158"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2014/04/01/estimating-fault-detection-effectiveness-poster/final" id="pub-title-link-158">Estimating Fault Detection Effectiveness [poster]</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-158">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2014/04/01/estimating-fault-detection-effectiveness-poster/final" class="mobile-pub-title" id="pub-title-link-sm-158">Estimating Fault Detection Effectiveness [poster]</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-158">4/01/2014</strong> <br/> Status: <span id="pub-status-sm-158">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-158"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-158"> 4/01/2014 </td> </tr> <tr id="result-159"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-159">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-159"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2014/02/03/realtime-access-control-rule-fault-detection-using/final" id="pub-title-link-159">Real-Time Access Control Rule Fault Detection Using a Simulated Logic Circuit</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-159">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2014/02/03/realtime-access-control-rule-fault-detection-using/final" class="mobile-pub-title" id="pub-title-link-sm-159">Real-Time Access Control Rule Fault Detection Using a Simulated Logic Circuit</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-159">2/03/2014</strong> <br/> Status: <span id="pub-status-sm-159">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-159"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-159"> 2/03/2014 </td> </tr> <tr id="result-160"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-160">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-160"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2013/10/30/pdr-a-prevention-detection-and-response-mechanism/final" id="pub-title-link-160">PDR: A Prevention, Detection and Response Mechanism for Anomalies in Energy Control Systems</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-160">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2013/10/30/pdr-a-prevention-detection-and-response-mechanism/final" class="mobile-pub-title" id="pub-title-link-sm-160">PDR: A Prevention, Detection and Response Mechanism for Anomalies in Energy Control Systems</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-160">10/30/2013</strong> <br/> Status: <span id="pub-status-sm-160">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-160"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-160"> 10/30/2013 </td> </tr> <tr id="result-161"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-161">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-161"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2013/10/18/creating-integrated-evidence-graphs-for-network-fo/final" id="pub-title-link-161">Creating Integrated Evidence Graphs for Network Forensics</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-161">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2013/10/18/creating-integrated-evidence-graphs-for-network-fo/final" class="mobile-pub-title" id="pub-title-link-sm-161">Creating Integrated Evidence Graphs for Network Forensics</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-161">10/18/2013</strong> <br/> Status: <span id="pub-status-sm-161">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-161"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-161"> 10/18/2013 </td> </tr> <tr id="result-162"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-162">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-162"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2013/10/16/limitations-to-threshold-random-walk-scan-detectio/final" id="pub-title-link-162">Limitations to Threshold Random Walk Scan Detection and Mitigating Enhancements</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-162">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2013/10/16/limitations-to-threshold-random-walk-scan-detectio/final" class="mobile-pub-title" id="pub-title-link-sm-162">Limitations to Threshold Random Walk Scan Detection and Mitigating Enhancements</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-162">10/16/2013</strong> <br/> Status: <span id="pub-status-sm-162">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-162"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-162"> 10/16/2013 </td> </tr> <tr id="result-163"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-163">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-163"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2013/10/10/ccm-a-tool-for-measuring-combinatorial-coverage-of/final" id="pub-title-link-163">CCM: A Tool for Measuring Combinatorial Coverage of System State Space</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-163">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2013/10/10/ccm-a-tool-for-measuring-combinatorial-coverage-of/final" class="mobile-pub-title" id="pub-title-link-sm-163">CCM: A Tool for Measuring Combinatorial Coverage of System State Space</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-163">10/10/2013</strong> <br/> Status: <span id="pub-status-sm-163">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-163"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-163"> 10/10/2013 </td> </tr> <tr id="result-164"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-164">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-164"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2013/09/18/relatedkey-slide-attacks-on-block-ciphers-with-sec/final" id="pub-title-link-164">Related-Key Slide Attacks on Block Ciphers with Secret Components</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-164">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2013/09/18/relatedkey-slide-attacks-on-block-ciphers-with-sec/final" class="mobile-pub-title" id="pub-title-link-sm-164">Related-Key Slide Attacks on Block Ciphers with Secret Components</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-164">9/18/2013</strong> <br/> Status: <span id="pub-status-sm-164">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-164"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-164"> 9/18/2013 </td> </tr> <tr id="result-165"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-165">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-165"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2013/08/15/investigating-the-application-of-moving-target-def/final" id="pub-title-link-165">Investigating the Application of Moving Target Defenses to Enterprise Network Security</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-165">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2013/08/15/investigating-the-application-of-moving-target-def/final" class="mobile-pub-title" id="pub-title-link-sm-165">Investigating the Application of Moving Target Defenses to Enterprise Network Security</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-165">8/15/2013</strong> <br/> Status: <span id="pub-status-sm-165">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-165"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-165"> 8/15/2013 </td> </tr> <tr id="result-166"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-166">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-166"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2013/07/31/an-efficient-approach-to-assessing-the-risk-of-zer/final" id="pub-title-link-166">An Efficient Approach to Assessing the Risk of Zero Day Vulnerabilities</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-166">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2013/07/31/an-efficient-approach-to-assessing-the-risk-of-zer/final" class="mobile-pub-title" id="pub-title-link-sm-166">An Efficient Approach to Assessing the Risk of Zero Day Vulnerabilities</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-166">7/31/2013</strong> <br/> Status: <span id="pub-status-sm-166">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-166"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-166"> 7/31/2013 </td> </tr> <tr id="result-167"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-167">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-167"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2013/07/24/a-chosen-iv-related-key-attack-on-grain128a/final" id="pub-title-link-167">A Chosen IV Related Key Attack on Grain-128a</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-167">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2013/07/24/a-chosen-iv-related-key-attack-on-grain128a/final" class="mobile-pub-title" id="pub-title-link-sm-167">A Chosen IV Related Key Attack on Grain-128a</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-167">7/24/2013</strong> <br/> Status: <span id="pub-status-sm-167">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-167"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-167"> 7/24/2013 </td> </tr> <tr id="result-168"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-168">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-168"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2013/06/23/four-measures-of-nonlinearity/final" id="pub-title-link-168">Four Measures of Nonlinearity</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-168">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2013/06/23/four-measures-of-nonlinearity/final" class="mobile-pub-title" id="pub-title-link-sm-168">Four Measures of Nonlinearity</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-168">6/23/2013</strong> <br/> Status: <span id="pub-status-sm-168">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-168"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-168"> 6/23/2013 </td> </tr> <tr id="result-169"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-169">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-169"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2013/06/21/exposing-software-security-and-availability-risks/final" id="pub-title-link-169">Exposing Software Security and Availability Risks For Commercial Mobile Devices</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-169">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2013/06/21/exposing-software-security-and-availability-risks/final" class="mobile-pub-title" id="pub-title-link-sm-169">Exposing Software Security and Availability Risks For Commercial Mobile Devices</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-169">6/21/2013</strong> <br/> Status: <span id="pub-status-sm-169">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-169"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-169"> 6/21/2013 </td> </tr> <tr id="result-170"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-170">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-170"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2013/06/21/a-classification-of-differential-invariants-for-mu/final" id="pub-title-link-170">A Classification of Differential Invariants for Multivariate Post-quantum Cryptosystems</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-170">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2013/06/21/a-classification-of-differential-invariants-for-mu/final" class="mobile-pub-title" id="pub-title-link-sm-170">A Classification of Differential Invariants for Multivariate Post-quantum Cryptosystems</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-170">6/21/2013</strong> <br/> Status: <span id="pub-status-sm-170">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-170"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-170"> 6/21/2013 </td> </tr> <tr id="result-171"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-171">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-171"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2013/06/20/vulcan-vulnerability-assessment-framework-for-clou/final" id="pub-title-link-171">VULCAN: Vulnerability Assessment Framework for Cloud Computing</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-171">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2013/06/20/vulcan-vulnerability-assessment-framework-for-clou/final" class="mobile-pub-title" id="pub-title-link-sm-171">VULCAN: Vulnerability Assessment Framework for Cloud Computing</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-171">6/20/2013</strong> <br/> Status: <span id="pub-status-sm-171">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-171"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-171"> 6/20/2013 </td> </tr> <tr id="result-172"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-172">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-172"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2013/03/22/applying-combinatorial-testing-to-the-siemens-suit/final" id="pub-title-link-172">Applying Combinatorial Testing to the Siemens Suite</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-172">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2013/03/22/applying-combinatorial-testing-to-the-siemens-suit/final" class="mobile-pub-title" id="pub-title-link-sm-172">Applying Combinatorial Testing to the Siemens Suite</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-172">3/22/2013</strong> <br/> Status: <span id="pub-status-sm-172">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-172"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-172"> 3/22/2013 </td> </tr> <tr id="result-173"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-173">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-173"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2013/03/22/combinatorial-coverage-measurement-concepts-and-ap/final" id="pub-title-link-173">Combinatorial Coverage Measurement Concepts and Applications</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-173">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2013/03/22/combinatorial-coverage-measurement-concepts-and-ap/final" class="mobile-pub-title" id="pub-title-link-sm-173">Combinatorial Coverage Measurement Concepts and Applications</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-173">3/22/2013</strong> <br/> Status: <span id="pub-status-sm-173">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-173"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-173"> 3/22/2013 </td> </tr> <tr id="result-174"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-174">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-174"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2013/03/22/an-input-space-modeling-methodology-for-combinator/final" id="pub-title-link-174">An Input Space Modeling Methodology for Combinatorial Testing</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-174">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2013/03/22/an-input-space-modeling-methodology-for-combinator/final" class="mobile-pub-title" id="pub-title-link-sm-174">An Input Space Modeling Methodology for Combinatorial Testing</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-174">3/22/2013</strong> <br/> Status: <span id="pub-status-sm-174">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-174"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-174"> 3/22/2013 </td> </tr> <tr id="result-175"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-175">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-175"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2013/02/24/security-assurance-requirements-for-hypervisor-dep/final" id="pub-title-link-175">Security Assurance Requirements for Hypervisor Deployment Features</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-175">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2013/02/24/security-assurance-requirements-for-hypervisor-dep/final" class="mobile-pub-title" id="pub-title-link-sm-175">Security Assurance Requirements for Hypervisor Deployment Features</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-175">2/24/2013</strong> <br/> Status: <span id="pub-status-sm-175">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-175"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-175"> 2/24/2013 </td> </tr> <tr id="result-176"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-176">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-176"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2013/01/17/mapping-evidence-graphs-to-attack-graphs/final" id="pub-title-link-176">Mapping Evidence Graphs to Attack Graphs</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-176">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2013/01/17/mapping-evidence-graphs-to-attack-graphs/final" class="mobile-pub-title" id="pub-title-link-sm-176">Mapping Evidence Graphs to Attack Graphs</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-176">1/17/2013</strong> <br/> Status: <span id="pub-status-sm-176">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-176"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-176"> 1/17/2013 </td> </tr> <tr id="result-177"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-177">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-177"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2013/01/16/using-attack-graphs-in-forensic-examinations/final" id="pub-title-link-177">Using Attack Graphs in Forensic Examinations</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-177">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2013/01/16/using-attack-graphs-in-forensic-examinations/final" class="mobile-pub-title" id="pub-title-link-sm-177">Using Attack Graphs in Forensic Examinations</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-177">1/16/2013</strong> <br/> Status: <span id="pub-status-sm-177">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-177"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-177"> 1/16/2013 </td> </tr> <tr id="result-178"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-178">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-178"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2012/12/07/security-ontologies-for-enterprise-level-risk-asse/final" id="pub-title-link-178">Security Ontologies for Enterprise Level Risk Assessment</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-178">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2012/12/07/security-ontologies-for-enterprise-level-risk-asse/final" class="mobile-pub-title" id="pub-title-link-sm-178">Security Ontologies for Enterprise Level Risk Assessment</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-178">12/07/2012</strong> <br/> Status: <span id="pub-status-sm-178">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-178"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-178"> 12/07/2012 </td> </tr> <tr id="result-179"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-179">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-179"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2012/10/16/efficient-algorithms-for-tway-test-sequence-genera/final" id="pub-title-link-179">Efficient Algorithms for T-way Test Sequence Generation</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-179">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2012/10/16/efficient-algorithms-for-tway-test-sequence-genera/final" class="mobile-pub-title" id="pub-title-link-sm-179">Efficient Algorithms for T-way Test Sequence Generation</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-179">10/16/2012</strong> <br/> Status: <span id="pub-status-sm-179">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-179"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-179"> 10/16/2012 </td> </tr> <tr id="result-180"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-180">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-180"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2012/10/11/aggregating-cvss-base-scores-for-semanticsrich-net/final" id="pub-title-link-180">Aggregating CVSS Base Scores for Semantics-Rich Network Security Metrics</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-180">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2012/10/11/aggregating-cvss-base-scores-for-semanticsrich-net/final" class="mobile-pub-title" id="pub-title-link-sm-180">Aggregating CVSS Base Scores for Semantics-Rich Network Security Metrics</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-180">10/11/2012</strong> <br/> Status: <span id="pub-status-sm-180">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-180"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-180"> 10/11/2012 </td> </tr> <tr id="result-181"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-181">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-181"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2012/09/13/measuring-combinatorial-coverage-of-system-statesp/final" id="pub-title-link-181">Measuring Combinatorial Coverage of System State-space for IV&V</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-181">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2012/09/13/measuring-combinatorial-coverage-of-system-statesp/final" class="mobile-pub-title" id="pub-title-link-sm-181">Measuring Combinatorial Coverage of System State-space for IV&V</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-181">9/13/2012</strong> <br/> Status: <span id="pub-status-sm-181">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-181"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-181"> 9/13/2012 </td> </tr> <tr id="result-182"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-182">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-182"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2012/08/27/the-triton-transformation/final" id="pub-title-link-182">The TriTon Transformation</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-182">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2012/08/27/the-triton-transformation/final" class="mobile-pub-title" id="pub-title-link-sm-182">The TriTon Transformation</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-182">8/27/2012</strong> <br/> Status: <span id="pub-status-sm-182">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-182"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-182"> 8/27/2012 </td> </tr> <tr id="result-183"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-183">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-183"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2012/07/31/mobile-application-and-device-power-usage-measurem/final" id="pub-title-link-183">Mobile Application and Device Power Usage Measurements</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-183">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2012/07/31/mobile-application-and-device-power-usage-measurem/final" class="mobile-pub-title" id="pub-title-link-sm-183">Mobile Application and Device Power Usage Measurements</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-183">7/31/2012</strong> <br/> Status: <span id="pub-status-sm-183">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-183"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-183"> 7/31/2012 </td> </tr> <tr id="result-184"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-184">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-184"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2012/07/20/evolutionary-construction-of-de-bruijn-sequences/final" id="pub-title-link-184">Evolutionary Construction of de Bruijn Sequences</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-184">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2012/07/20/evolutionary-construction-of-de-bruijn-sequences/final" class="mobile-pub-title" id="pub-title-link-sm-184">Evolutionary Construction of de Bruijn Sequences</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-184">7/20/2012</strong> <br/> Status: <span id="pub-status-sm-184">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-184"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-184"> 7/20/2012 </td> </tr> <tr id="result-185"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-185">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-185"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2012/06/11/simulationbased-approaches-to-studying-effectivene/final" id="pub-title-link-185">Simulation-based Approaches to Studying Effectiveness of Moving-Target Network Defense</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-185">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2012/06/11/simulationbased-approaches-to-studying-effectivene/final" class="mobile-pub-title" id="pub-title-link-sm-185">Simulation-based Approaches to Studying Effectiveness of Moving-Target Network Defense</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-185">6/11/2012</strong> <br/> Status: <span id="pub-status-sm-185">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-185"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-185"> 6/11/2012 </td> </tr> <tr id="result-186"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-186">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-186"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2012/04/21/combinatorial-methods-for-event-sequence-testing/final" id="pub-title-link-186">Combinatorial Methods for Event Sequence Testing</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-186">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2012/04/21/combinatorial-methods-for-event-sequence-testing/final" class="mobile-pub-title" id="pub-title-link-sm-186">Combinatorial Methods for Event Sequence Testing</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-186">4/21/2012</strong> <br/> Status: <span id="pub-status-sm-186">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-186"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-186"> 4/21/2012 </td> </tr> <tr id="result-187"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-187">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-187"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2012/04/21/isolating-failureinducing-combinations-in-combinat/final" id="pub-title-link-187">Isolating Failure-Inducing Combinations in Combinatorial Testing using Test Augmentation and Classification</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-187">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2012/04/21/isolating-failureinducing-combinations-in-combinat/final" class="mobile-pub-title" id="pub-title-link-sm-187">Isolating Failure-Inducing Combinations in Combinatorial Testing using Test Augmentation and Classification</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-187">4/21/2012</strong> <br/> Status: <span id="pub-status-sm-187">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-187"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-187"> 4/21/2012 </td> </tr> <tr id="result-188"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-188">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-188"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2012/04/21/combinatorial-testing-of-acts-a-case-study/final" id="pub-title-link-188">Combinatorial Testing of ACTS: a Case Study</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-188">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2012/04/21/combinatorial-testing-of-acts-a-case-study/final" class="mobile-pub-title" id="pub-title-link-sm-188">Combinatorial Testing of ACTS: a Case Study</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-188">4/21/2012</strong> <br/> Status: <span id="pub-status-sm-188">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-188"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-188"> 4/21/2012 </td> </tr> <tr id="result-189"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-189">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-189"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2012/03/30/criteria-towards-metrics-for-benchmarking-template/final" id="pub-title-link-189">Criteria Towards Metrics for Benchmarking Template Protection Algorithms</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-189">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2012/03/30/criteria-towards-metrics-for-benchmarking-template/final" class="mobile-pub-title" id="pub-title-link-sm-189">Criteria Towards Metrics for Benchmarking Template Protection Algorithms</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-189">3/30/2012</strong> <br/> Status: <span id="pub-status-sm-189">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-189"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-189"> 3/30/2012 </td> </tr> <tr id="result-190"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-190">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-190"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2012/03/22/improved-indifferentiability-security-bound-for-th/final" id="pub-title-link-190">Improved Indifferentiability Security Bound for the JH Mode</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-190">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2012/03/22/improved-indifferentiability-security-bound-for-th/final" class="mobile-pub-title" id="pub-title-link-sm-190">Improved Indifferentiability Security Bound for the JH Mode</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-190">3/22/2012</strong> <br/> Status: <span id="pub-status-sm-190">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-190"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-190"> 3/22/2012 </td> </tr> <tr id="result-191"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-191">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-191"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2012/03/22/a-keyed-sponge-construction-with-pseudorandomness/final" id="pub-title-link-191">A Keyed Sponge Construction with Pseudorandomness in a Standard Model</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-191">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2012/03/22/a-keyed-sponge-construction-with-pseudorandomness/final" class="mobile-pub-title" id="pub-title-link-sm-191">A Keyed Sponge Construction with Pseudorandomness in a Standard Model</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-191">3/22/2012</strong> <br/> Status: <span id="pub-status-sm-191">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-191"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-191"> 3/22/2012 </td> </tr> <tr id="result-192"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-192">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-192"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2012/01/30/determining-authentication-strength-for-smart-card/final" id="pub-title-link-192">Determining Authentication Strength for Smart Card-based Authentication Use Cases</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-192">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2012/01/30/determining-authentication-strength-for-smart-card/final" class="mobile-pub-title" id="pub-title-link-sm-192">Determining Authentication Strength for Smart Card-based Authentication Use Cases</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-192">1/30/2012</strong> <br/> Status: <span id="pub-status-sm-192">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-192"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-192"> 1/30/2012 </td> </tr> <tr id="result-193"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-193">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-193"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2011/12/27/vulnerability-hierarchies-in-access-control-config/final" id="pub-title-link-193">Vulnerability Hierarchies in Access Control Configurations</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-193">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2011/12/27/vulnerability-hierarchies-in-access-control-config/final" class="mobile-pub-title" id="pub-title-link-sm-193">Vulnerability Hierarchies in Access Control Configurations</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-193">12/27/2011</strong> <br/> Status: <span id="pub-status-sm-193">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-193"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-193"> 12/27/2011 </td> </tr> <tr id="result-194"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-194">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-194"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2011/11/29/differential-security-of-multivariate-public-key-c/final" id="pub-title-link-194">On the Differential Security of Multivariate Public Key Cryptosystems</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-194">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2011/11/29/differential-security-of-multivariate-public-key-c/final" class="mobile-pub-title" id="pub-title-link-sm-194">On the Differential Security of Multivariate Public Key Cryptosystems</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-194">11/29/2011</strong> <br/> Status: <span id="pub-status-sm-194">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-194"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-194"> 11/29/2011 </td> </tr> <tr id="result-195"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-195">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-195"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2011/11/06/service-model-driven-variations-in-security-measur/final" id="pub-title-link-195">Service Model Driven Variations in Security Measures for Cloud Environments</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-195">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2011/11/06/service-model-driven-variations-in-security-measur/final" class="mobile-pub-title" id="pub-title-link-sm-195">Service Model Driven Variations in Security Measures for Cloud Environments</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-195">11/06/2011</strong> <br/> Status: <span id="pub-status-sm-195">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-195"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-195"> 11/06/2011 </td> </tr> <tr id="result-196"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-196">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-196"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2011/09/05/field-study-of-user-behavior-perception-in-smartca/final" id="pub-title-link-196">A Field Study of User Behavior and Perception in Smartcard Authentication</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-196">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2011/09/05/field-study-of-user-behavior-perception-in-smartca/final" class="mobile-pub-title" id="pub-title-link-sm-196">A Field Study of User Behavior and Perception in Smartcard Authentication</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-196">9/05/2011</strong> <br/> Status: <span id="pub-status-sm-196">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-196"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-196"> 9/05/2011 </td> </tr> <tr id="result-197"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-197">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-197"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2011/08/18/an-empirical-study-of-a-vulnerability-metric-aggre/final" id="pub-title-link-197">An Empirical Study of a Vulnerability Metric Aggregation Method</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-197">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2011/08/18/an-empirical-study-of-a-vulnerability-metric-aggre/final" class="mobile-pub-title" id="pub-title-link-sm-197">An Empirical Study of a Vulnerability Metric Aggregation Method</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-197">8/18/2011</strong> <br/> Status: <span id="pub-status-sm-197">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-197"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-197"> 8/18/2011 </td> </tr> <tr id="result-198"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-198">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-198"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2011/07/21/a-public-randomness-service/final" id="pub-title-link-198">A public randomness service</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-198">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2011/07/21/a-public-randomness-service/final" class="mobile-pub-title" id="pub-title-link-sm-198">A public randomness service</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-198">7/21/2011</strong> <br/> Status: <span id="pub-status-sm-198">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-198"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-198"> 7/21/2011 </td> </tr> <tr id="result-199"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-199">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-199"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2011/07/19/cloud-service-feature-driven-security-policies-for/final" id="pub-title-link-199">Cloud Service Feature Driven Security Policies for Virtualized Infrastructures</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-199">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2011/07/19/cloud-service-feature-driven-security-policies-for/final" class="mobile-pub-title" id="pub-title-link-sm-199">Cloud Service Feature Driven Security Policies for Virtualized Infrastructures</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-199">7/19/2011</strong> <br/> Status: <span id="pub-status-sm-199">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-199"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-199"> 7/19/2011 </td> </tr> <tr id="result-200"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-200">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-200"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2011/07/14/on-the-security-of-hash-functions-employing-blockc/final" id="pub-title-link-200">On the Security of Hash Functions Employing Blockcipher Postprocessing</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-200">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2011/07/14/on-the-security-of-hash-functions-employing-blockc/final" class="mobile-pub-title" id="pub-title-link-sm-200">On the Security of Hash Functions Employing Blockcipher Postprocessing</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-200">7/14/2011</strong> <br/> Status: <span id="pub-status-sm-200">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-200"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-200"> 7/14/2011 </td> </tr> <tr id="result-201"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-201">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-201"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2011/06/13/division-polynomials-for-jacobi-quartic-curves/final" id="pub-title-link-201">Division Polynomials for Jacobi Quartic Curves</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-201">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2011/06/13/division-polynomials-for-jacobi-quartic-curves/final" class="mobile-pub-title" id="pub-title-link-sm-201">Division Polynomials for Jacobi Quartic Curves</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-201">6/13/2011</strong> <br/> Status: <span id="pub-status-sm-201">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-201"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-201"> 6/13/2011 </td> </tr> <tr id="result-202"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-202">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-202"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2011/01/04/cloud-hooks-security-and-privacy-issues-in-cloud-c/final" id="pub-title-link-202">Cloud Hooks: Security and Privacy Issues in Cloud Computing</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-202">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2011/01/04/cloud-hooks-security-and-privacy-issues-in-cloud-c/final" class="mobile-pub-title" id="pub-title-link-sm-202">Cloud Hooks: Security and Privacy Issues in Cloud Computing</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-202">1/04/2011</strong> <br/> Status: <span id="pub-status-sm-202">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-202"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-202"> 1/04/2011 </td> </tr> <tr id="result-203"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-203">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-203"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2010/12/12/speeding-up-the-widepipe-secure-and-fast-hashing/final" id="pub-title-link-203">Speeding Up the Wide-Pipe: Secure and Fast Hashing</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-203">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2010/12/12/speeding-up-the-widepipe-secure-and-fast-hashing/final" class="mobile-pub-title" id="pub-title-link-sm-203">Speeding Up the Wide-Pipe: Secure and Fast Hashing</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-203">12/12/2010</strong> <br/> Status: <span id="pub-status-sm-203">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-203"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-203"> 12/12/2010 </td> </tr> <tr id="result-204"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-204">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-204"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2010/12/10/kzero-day-safety-measuring-security-risk-of-networ/final" id="pub-title-link-204">k-Zero Day Safety: Measuring the Security Risk of Networks Against Unknown Attacks</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-204">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2010/12/10/kzero-day-safety-measuring-security-risk-of-networ/final" class="mobile-pub-title" id="pub-title-link-sm-204">k-Zero Day Safety: Measuring the Security Risk of Networks Against Unknown Attacks</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-204">12/10/2010</strong> <br/> Status: <span id="pub-status-sm-204">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-204"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-204"> 12/10/2010 </td> </tr> <tr id="result-205"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-205">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-205"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2010/11/30/cryptanalysis-of-the-essence-family-of-hash-functi/final" id="pub-title-link-205">Cryptanalysis of the ESSENCE Family of Hash Functions</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-205">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2010/11/30/cryptanalysis-of-the-essence-family-of-hash-functi/final" class="mobile-pub-title" id="pub-title-link-sm-205">Cryptanalysis of the ESSENCE Family of Hash Functions</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-205">11/30/2010</strong> <br/> Status: <span id="pub-status-sm-205">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-205"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-205"> 11/30/2010 </td> </tr> <tr id="result-206"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-206">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-206"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2010/10/10/an-inconvenient-truth-about-tunneled-authenticatio/final" id="pub-title-link-206">An Inconvenient Truth About Tunneled Authentications</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-206">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2010/10/10/an-inconvenient-truth-about-tunneled-authenticatio/final" class="mobile-pub-title" id="pub-title-link-sm-206">An Inconvenient Truth About Tunneled Authentications</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-206">10/10/2010</strong> <br/> Status: <span id="pub-status-sm-206">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-206"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-206"> 10/10/2010 </td> </tr> <tr id="result-207"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-207">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-207"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2010/08/23/specification-of-attribute-relations-for-access-co/final" id="pub-title-link-207">Specification of Attribute Relations for Access Control Policies and Constraints Using Policy Machine</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-207">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2010/08/23/specification-of-attribute-relations-for-access-co/final" class="mobile-pub-title" id="pub-title-link-sm-207">Specification of Attribute Relations for Access Control Policies and Constraints Using Policy Machine</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-207">8/23/2010</strong> <br/> Status: <span id="pub-status-sm-207">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-207"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-207"> 8/23/2010 </td> </tr> <tr id="result-208"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-208">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-208"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2010/08/23/practical-nearcollisions-for-reduced-round-blake-f/final" id="pub-title-link-208">Practical Near-Collisions for Reduced Round Blake, Fugue, Hamsi and JH</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-208">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2010/08/23/practical-nearcollisions-for-reduced-round-blake-f/final" class="mobile-pub-title" id="pub-title-link-sm-208">Practical Near-Collisions for Reduced Round Blake, Fugue, Hamsi and JH</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-208">8/23/2010</strong> <br/> Status: <span id="pub-status-sm-208">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-208"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-208"> 8/23/2010 </td> </tr> <tr id="result-209"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-209">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-209"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2010/08/09/performance-requirements-for-endtoend-verifiable-e/final" id="pub-title-link-209">Performance Requirements for End-to-End Verifiable Elections</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-209">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2010/08/09/performance-requirements-for-endtoend-verifiable-e/final" class="mobile-pub-title" id="pub-title-link-sm-209">Performance Requirements for End-to-End Verifiable Elections</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-209">8/09/2010</strong> <br/> Status: <span id="pub-status-sm-209">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-209"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-209"> 8/09/2010 </td> </tr> <tr id="result-210"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-210">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-210"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2010/08/08/message-recovery-and-pseudopreimage-attacks-on-the/final" id="pub-title-link-210">Message Recovery and Pseudo-Preimage Attacks on the Compression Function of Hamsi-256</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-210">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2010/08/08/message-recovery-and-pseudopreimage-attacks-on-the/final" class="mobile-pub-title" id="pub-title-link-sm-210">Message Recovery and Pseudo-Preimage Attacks on the Compression Function of Hamsi-256</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-210">8/08/2010</strong> <br/> Status: <span id="pub-status-sm-210">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-210"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-210"> 8/08/2010 </td> </tr> <tr id="result-211"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-211">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-211"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2010/07/21/sigma-ballots/final" id="pub-title-link-211">Sigma Ballots</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-211">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2010/07/21/sigma-ballots/final" class="mobile-pub-title" id="pub-title-link-sm-211">Sigma Ballots</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-211">7/21/2010</strong> <br/> Status: <span id="pub-status-sm-211">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-211"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-211"> 7/21/2010 </td> </tr> <tr id="result-212"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-212">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-212"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2010/06/21/authentication-assurance-level-taxonomies-for-smar/final" id="pub-title-link-212">Authentication Assurance Level Taxonomies for Smart Identity Token Deployments – A New Approach</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-212">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2010/06/21/authentication-assurance-level-taxonomies-for-smar/final" class="mobile-pub-title" id="pub-title-link-sm-212">Authentication Assurance Level Taxonomies for Smart Identity Token Deployments – A New Approach</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-212">6/21/2010</strong> <br/> Status: <span id="pub-status-sm-212">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-212"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-212"> 6/21/2010 </td> </tr> <tr id="result-213"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-213">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-213"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2010/05/20/a-new-combinational-logic-minimization-technique-w/final" id="pub-title-link-213">A New Combinational Logic Minimization Technique with Applications to Cryptology</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-213">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2010/05/20/a-new-combinational-logic-minimization-technique-w/final" class="mobile-pub-title" id="pub-title-link-sm-213">A New Combinational Logic Minimization Technique with Applications to Cryptology</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-213">5/20/2010</strong> <br/> Status: <span id="pub-status-sm-213">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-213"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-213"> 5/20/2010 </td> </tr> <tr id="result-214"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-214">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-214"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2010/04/13/privacypreserving-drm/final" id="pub-title-link-214">Privacy-Preserving DRM</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-214">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2010/04/13/privacypreserving-drm/final" class="mobile-pub-title" id="pub-title-link-sm-214">Privacy-Preserving DRM</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-214">4/13/2010</strong> <br/> Status: <span id="pub-status-sm-214">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-214"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-214"> 4/13/2010 </td> </tr> <tr id="result-215"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-215">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-215"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2009/12/04/indifferentiability-characterization-of-hash-funct/final" id="pub-title-link-215">Indifferentiability Characterization of Hash Functions and Optimal Bounds of Popular Domain Extensions</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-215">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2009/12/04/indifferentiability-characterization-of-hash-funct/final" class="mobile-pub-title" id="pub-title-link-sm-215">Indifferentiability Characterization of Hash Functions and Optimal Bounds of Popular Domain Extensions</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-215">12/04/2009</strong> <br/> Status: <span id="pub-status-sm-215">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-215"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-215"> 12/04/2009 </td> </tr> <tr id="result-216"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-216">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-216"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2009/11/03/herding-second-preimage-and-trojan-message-attacks/final" id="pub-title-link-216">Herding, Second Preimage, and Trojan Message Attacks Beyond Merkle-Damgard</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-216">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2009/11/03/herding-second-preimage-and-trojan-message-attacks/final" class="mobile-pub-title" id="pub-title-link-sm-216">Herding, Second Preimage, and Trojan Message Attacks Beyond Merkle-Damgard</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-216">11/03/2009</strong> <br/> Status: <span id="pub-status-sm-216">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-216"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-216"> 11/03/2009 </td> </tr> <tr id="result-217"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-217">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-217"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2009/10/16/random-vs-combinatorial-methods-for-simulation-of/final" id="pub-title-link-217">Random vs. Combinatorial Methods for Discrete Event Simulation of a Grid Computer Network</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-217">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2009/10/16/random-vs-combinatorial-methods-for-simulation-of/final" class="mobile-pub-title" id="pub-title-link-sm-217">Random vs. Combinatorial Methods for Discrete Event Simulation of a Grid Computer Network</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-217">10/16/2009</strong> <br/> Status: <span id="pub-status-sm-217">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-217"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-217"> 10/16/2009 </td> </tr> <tr id="result-218"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-218">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-218"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2009/10/14/an-analysis-of-cvss-version-2-vulnerability-scorin/final" id="pub-title-link-218">An Analysis of CVSS Version 2 Vulnerability Scoring</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-218">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2009/10/14/an-analysis-of-cvss-version-2-vulnerability-scorin/final" class="mobile-pub-title" id="pub-title-link-sm-218">An Analysis of CVSS Version 2 Vulnerability Scoring</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-218">10/14/2009</strong> <br/> Status: <span id="pub-status-sm-218">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-218"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-218"> 10/14/2009 </td> </tr> <tr id="result-219"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-219">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-219"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2009/09/25/desirable-properties-of-voting-systems/final" id="pub-title-link-219">Desirable Properties of Voting Systems</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-219">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2009/09/25/desirable-properties-of-voting-systems/final" class="mobile-pub-title" id="pub-title-link-sm-219">Desirable Properties of Voting Systems</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-219">9/25/2009</strong> <br/> Status: <span id="pub-status-sm-219">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-219"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-219"> 9/25/2009 </td> </tr> <tr id="result-220"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-220">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-220"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2009/07/21/fast-and-secure-cbctype-mac-algorithms/final" id="pub-title-link-220">Fast and Secure CBC-Type MAC Algorithms</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-220">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2009/07/21/fast-and-secure-cbctype-mac-algorithms/final" class="mobile-pub-title" id="pub-title-link-sm-220">Fast and Secure CBC-Type MAC Algorithms</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-220">7/21/2009</strong> <br/> Status: <span id="pub-status-sm-220">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-220"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-220"> 7/21/2009 </td> </tr> <tr id="result-221"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-221">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-221"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2009/07/10/access-specification-and-validation-framework-for/final" id="pub-title-link-221">Access Specification and Validation Framework for Secure Smart ID Cards Deployment</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-221">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2009/07/10/access-specification-and-validation-framework-for/final" class="mobile-pub-title" id="pub-title-link-sm-221">Access Specification and Validation Framework for Secure Smart ID Cards Deployment</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-221">7/10/2009</strong> <br/> Status: <span id="pub-status-sm-221">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-221"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-221"> 7/10/2009 </td> </tr> <tr id="result-222"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-222">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-222"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2009/06/29/characterizing-padding-rules-of-md-hash-functions/final" id="pub-title-link-222">Characterizing Padding Rules of MD Hash Functions Preserving Collision Security</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-222">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2009/06/29/characterizing-padding-rules-of-md-hash-functions/final" class="mobile-pub-title" id="pub-title-link-sm-222">Characterizing Padding Rules of MD Hash Functions Preserving Collision Security</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-222">6/29/2009</strong> <br/> Status: <span id="pub-status-sm-222">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-222"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-222"> 6/29/2009 </td> </tr> <tr id="result-223"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-223">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-223"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2009/04/14/quantum-resistant-public-key-cryptography-a-survey/final" id="pub-title-link-223">Quantum Resistant Public Key Cryptography: A Survey</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-223">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2009/04/14/quantum-resistant-public-key-cryptography-a-survey/final" class="mobile-pub-title" id="pub-title-link-sm-223">Quantum Resistant Public Key Cryptography: A Survey</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-223">4/14/2009</strong> <br/> Status: <span id="pub-status-sm-223">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-223"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-223"> 4/14/2009 </td> </tr> <tr id="result-224"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-224">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-224"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2009/03/31/a-locationbased-mechanism-for-mobile-device-securi/final" id="pub-title-link-224">A Location-Based Mechanism for Mobile Device Security</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-224">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2009/03/31/a-locationbased-mechanism-for-mobile-device-securi/final" class="mobile-pub-title" id="pub-title-link-sm-224">A Location-Based Mechanism for Mobile Device Security</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-224">3/31/2009</strong> <br/> Status: <span id="pub-status-sm-224">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-224"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-224"> 3/31/2009 </td> </tr> <tr id="result-225"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-225">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-225"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2009/03/30/making-the-case-for-eap-channel-bindings/final" id="pub-title-link-225">Making the Case for EAP Channel Bindings</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-225">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2009/03/30/making-the-case-for-eap-channel-bindings/final" class="mobile-pub-title" id="pub-title-link-sm-225">Making the Case for EAP Channel Bindings</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-225">3/30/2009</strong> <br/> Status: <span id="pub-status-sm-225">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-225"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-225"> 3/30/2009 </td> </tr> <tr id="result-226"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-226">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-226"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2008/12/20/property-verification-for-generic-access-control-m/final" id="pub-title-link-226">Property Verification for Generic Access Control Models</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-226">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2008/12/20/property-verification-for-generic-access-control-m/final" class="mobile-pub-title" id="pub-title-link-sm-226">Property Verification for Generic Access Control Models</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-226">12/20/2008</strong> <br/> Status: <span id="pub-status-sm-226">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-226"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-226"> 12/20/2008 </td> </tr> <tr id="result-227"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-227">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-227"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2008/12/17/two-new-efficient-ccasecure-online-ciphers-mhcbc-a/final" id="pub-title-link-227">Two New Efficient CCA-Secure Online Ciphers : MHCBC and MCBC</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-227">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2008/12/17/two-new-efficient-ccasecure-online-ciphers-mhcbc-a/final" class="mobile-pub-title" id="pub-title-link-sm-227">Two New Efficient CCA-Secure Online Ciphers : MHCBC and MCBC</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-227">12/17/2008</strong> <br/> Status: <span id="pub-status-sm-227">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-227"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-227"> 12/17/2008 </td> </tr> <tr id="result-228"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-228">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-228"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2008/11/30/security-challenges-in-seamless-mobility-how-to-ha/final" id="pub-title-link-228">Security Challenges in Seamless Mobility: How to "Handover" the Keys?</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-228">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2008/11/30/security-challenges-in-seamless-mobility-how-to-ha/final" class="mobile-pub-title" id="pub-title-link-sm-228">Security Challenges in Seamless Mobility: How to "Handover" the Keys?</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-228">11/30/2008</strong> <br/> Status: <span id="pub-status-sm-228">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-228"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-228"> 11/30/2008 </td> </tr> <tr id="result-229"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-229">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-229"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2008/11/13/access-control-policy-composition-for-resource-fed/final" id="pub-title-link-229">Access Control Policy Composition for Resource Federation Networks Using Semantic Web and Resource Description Framework (RDF)</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-229">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2008/11/13/access-control-policy-composition-for-resource-fed/final" class="mobile-pub-title" id="pub-title-link-sm-229">Access Control Policy Composition for Resource Federation Networks Using Semantic Web and Resource Description Framework (RDF)</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-229">11/13/2008</strong> <br/> Status: <span id="pub-status-sm-229">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-229"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-229"> 11/13/2008 </td> </tr> <tr id="result-230"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-230">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-230"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2008/10/29/vulnerability-scoring-for-security-configuration-s/final" id="pub-title-link-230">Vulnerability Scoring for Security Configuration Settings</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-230">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2008/10/29/vulnerability-scoring-for-security-configuration-s/final" class="mobile-pub-title" id="pub-title-link-sm-230">Vulnerability Scoring for Security Configuration Settings</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-230">10/29/2008</strong> <br/> Status: <span id="pub-status-sm-230">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-230"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-230"> 10/29/2008 </td> </tr> <tr id="result-231"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-231">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-231"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2008/08/29/shortest-linear-straightline-program-for-computing/final" id="pub-title-link-231">On the Shortest Linear Straight-Line Program for Computing Linear Forms</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-231">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2008/08/29/shortest-linear-straightline-program-for-computing/final" class="mobile-pub-title" id="pub-title-link-sm-231">On the Shortest Linear Straight-Line Program for Computing Linear Forms</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-231">8/29/2008</strong> <br/> Status: <span id="pub-status-sm-231">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-231"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-231"> 8/29/2008 </td> </tr> <tr id="result-232"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-232">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-232"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2008/08/04/evidencebased-good-enough-and-open/final" id="pub-title-link-232">Evidence-Based, Good Enough, and Open</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-232">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2008/08/04/evidencebased-good-enough-and-open/final" class="mobile-pub-title" id="pub-title-link-sm-232">Evidence-Based, Good Enough, and Open</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-232">8/04/2008</strong> <br/> Status: <span id="pub-status-sm-232">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-232"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-232"> 8/04/2008 </td> </tr> <tr id="result-233"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-233">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-233"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2008/07/24/forensic-protocol-filtering-of-phone-managers/final" id="pub-title-link-233">Forensic Protocol Filtering of Phone Managers</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-233">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2008/07/24/forensic-protocol-filtering-of-phone-managers/final" class="mobile-pub-title" id="pub-title-link-sm-233">Forensic Protocol Filtering of Phone Managers</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-233">7/24/2008</strong> <br/> Status: <span id="pub-status-sm-233">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-233"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-233"> 7/24/2008 </td> </tr> <tr id="result-234"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-234">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-234"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2008/07/21/web-services-security-techniques-and-challenges-ex/final" id="pub-title-link-234">Web Services Security: Techniques and Challenges (Extended Abstract)</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-234">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2008/07/21/web-services-security-techniques-and-challenges-ex/final" class="mobile-pub-title" id="pub-title-link-sm-234">Web Services Security: Techniques and Challenges (Extended Abstract)</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-234">7/21/2008</strong> <br/> Status: <span id="pub-status-sm-234">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-234"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-234"> 7/21/2008 </td> </tr> <tr id="result-235"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-235">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-235"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2008/07/16/an-attack-graphbased-probabilistic-security-metric/final" id="pub-title-link-235">An Attack Graph-Based Probabilistic Security Metric</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-235">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2008/07/16/an-attack-graphbased-probabilistic-security-metric/final" class="mobile-pub-title" id="pub-title-link-sm-235">An Attack Graph-Based Probabilistic Security Metric</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-235">7/16/2008</strong> <br/> Status: <span id="pub-status-sm-235">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-235"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-235"> 7/16/2008 </td> </tr> <tr id="result-236"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-236">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-236"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2008/06/30/a-framework-for-measuring-the-vulnerability-of-hos/final" id="pub-title-link-236">A Framework for Measuring the Vulnerability of Hosts</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-236">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2008/06/30/a-framework-for-measuring-the-vulnerability-of-hos/final" class="mobile-pub-title" id="pub-title-link-sm-236">A Framework for Measuring the Vulnerability of Hosts</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-236">6/30/2008</strong> <br/> Status: <span id="pub-status-sm-236">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-236"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-236"> 6/30/2008 </td> </tr> <tr id="result-237"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-237">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-237"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2008/06/11/a-meta-model-for-access-control/final" id="pub-title-link-237">A Meta Model for Access Control: Why is it needed and Is it even possible to achieve?</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-237">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2008/06/11/a-meta-model-for-access-control/final" class="mobile-pub-title" id="pub-title-link-sm-237">A Meta Model for Access Control: Why is it needed and Is it even possible to achieve?</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-237">6/11/2008</strong> <br/> Status: <span id="pub-status-sm-237">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-237"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-237"> 6/11/2008 </td> </tr> <tr id="result-238"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-238">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-238"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2008/06/03/policy-specification-and-enforcement-for-smart-id/final" id="pub-title-link-238">Policy Specification and Enforcement for Smart ID Cards Deployment</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-238">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2008/06/03/policy-specification-and-enforcement-for-smart-id/final" class="mobile-pub-title" id="pub-title-link-sm-238">Policy Specification and Enforcement for Smart ID Cards Deployment</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-238">6/03/2008</strong> <br/> Status: <span id="pub-status-sm-238">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-238"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-238"> 6/03/2008 </td> </tr> <tr id="result-239"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-239">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-239"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2008/04/19/infrastructure-system-design-methodology-for-smart/final" id="pub-title-link-239">Infrastructure System Design Methodology for Smart ID Cards Deployment</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-239">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2008/04/19/infrastructure-system-design-methodology-for-smart/final" class="mobile-pub-title" id="pub-title-link-sm-239">Infrastructure System Design Methodology for Smart ID Cards Deployment</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-239">4/19/2008</strong> <br/> Status: <span id="pub-status-sm-239">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-239"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-239"> 4/19/2008 </td> </tr> <tr id="result-240"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-240">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-240"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2008/04/17/linearxor-and-additive-checksums-dont-protect-damg/final" id="pub-title-link-240">Linear-XOR and Additive Checksums Don't Protect Damgard-Merkle Hashes from Generic Attacks</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-240">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2008/04/17/linearxor-and-additive-checksums-dont-protect-damg/final" class="mobile-pub-title" id="pub-title-link-sm-240">Linear-XOR and Additive Checksums Don't Protect Damgard-Merkle Hashes from Generic Attacks</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-240">4/17/2008</strong> <br/> Status: <span id="pub-status-sm-240">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-240"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-240"> 4/17/2008 </td> </tr> <tr id="result-241"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-241">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-241"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2008/04/17/second-preimage-attacks-on-dithered-hash-functions/final" id="pub-title-link-241">Second Preimage Attacks on Dithered Hash Functions</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-241">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2008/04/17/second-preimage-attacks-on-dithered-hash-functions/final" class="mobile-pub-title" id="pub-title-link-sm-241">Second Preimage Attacks on Dithered Hash Functions</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-241">4/17/2008</strong> <br/> Status: <span id="pub-status-sm-241">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-241"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-241"> 4/17/2008 </td> </tr> <tr id="result-242"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-242">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-242"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2008/01/16/overcoming-impediments-to-cell-phone-forensics/final" id="pub-title-link-242">Overcoming Impediments to Cell Phone Forensics</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-242">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2008/01/16/overcoming-impediments-to-cell-phone-forensics/final" class="mobile-pub-title" id="pub-title-link-sm-242">Overcoming Impediments to Cell Phone Forensics</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-242">1/16/2008</strong> <br/> Status: <span id="pub-status-sm-242">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-242"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-242"> 1/16/2008 </td> </tr> <tr id="result-243"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-243">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-243"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2007/03/29/ipog-a-general-strategy-for-tway-software-testing/final" id="pub-title-link-243">IPOG: a General Strategy for T-way Software Testing</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-243">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2007/03/29/ipog-a-general-strategy-for-tway-software-testing/final" class="mobile-pub-title" id="pub-title-link-sm-243">IPOG: a General Strategy for T-way Software Testing</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-243">3/29/2007</strong> <br/> Status: <span id="pub-status-sm-243">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-243"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-243"> 3/29/2007 </td> </tr> <tr id="result-244"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-244">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-244"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2006/04/28/pseudoexhaustive-testing-for-software/final" id="pub-title-link-244">Pseudo-exhaustive Testing for Software</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-244">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2006/04/28/pseudoexhaustive-testing-for-software/final" class="mobile-pub-title" id="pub-title-link-sm-244">Pseudo-exhaustive Testing for Software</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-244">4/28/2006</strong> <br/> Status: <span id="pub-status-sm-244">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-244"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-244"> 4/28/2006 </td> </tr> <tr id="result-245"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-245">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-245"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2005/06/01/composing-and-combining-policies-under-the-policy/final" id="pub-title-link-245">Composing and Combining Policies Under the Policy Machine</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-245">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2005/06/01/composing-and-combining-policies-under-the-policy/final" class="mobile-pub-title" id="pub-title-link-sm-245">Composing and Combining Policies Under the Policy Machine</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-245">6/01/2005</strong> <br/> Status: <span id="pub-status-sm-245">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-245"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-245"> 6/01/2005 </td> </tr> <tr id="result-246"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-246">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-246"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2004/06/28/quantifying-assurance-of-knowledge-based-authentic/final" id="pub-title-link-246">Quantifying Assurance of Knowledge Based Authentication</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-246">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2004/06/28/quantifying-assurance-of-knowledge-based-authentic/final" class="mobile-pub-title" id="pub-title-link-sm-246">Quantifying Assurance of Knowledge Based Authentication</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-246">6/28/2004</strong> <br/> Status: <span id="pub-status-sm-246">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-246"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-246"> 6/28/2004 </td> </tr> <tr id="result-247"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-247">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-247"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2003/07/30/specification-and-validation-of-enterprise-access/final" id="pub-title-link-247">Specification and Validation of Enterprise Access Control Data for Conformance to Model and Policy Constraints</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-247">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2003/07/30/specification-and-validation-of-enterprise-access/final" class="mobile-pub-title" id="pub-title-link-sm-247">Specification and Validation of Enterprise Access Control Data for Conformance to Model and Policy Constraints</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-247">7/30/2003</strong> <br/> Status: <span id="pub-status-sm-247">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-247"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-247"> 7/30/2003 </td> </tr> <tr id="result-248"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-248">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-248"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2003/06/04/the-role-control-center-features-and-case-studies/final" id="pub-title-link-248">The Role Control Center: Features and Case Studies</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-248">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2003/06/04/the-role-control-center-features-and-case-studies/final" class="mobile-pub-title" id="pub-title-link-sm-248">The Role Control Center: Features and Case Studies</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-248">6/04/2003</strong> <br/> Status: <span id="pub-status-sm-248">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-248"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-248"> 6/04/2003 </td> </tr> <tr id="result-249"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-249">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-249"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2002/12/06/an-investigation-of-the-applicability-of-design-of/final" id="pub-title-link-249">An Investigation of the Applicability of Design of Experiments to Software Testing</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-249">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2002/12/06/an-investigation-of-the-applicability-of-design-of/final" class="mobile-pub-title" id="pub-title-link-sm-249">An Investigation of the Applicability of Design of Experiments to Software Testing</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-249">12/06/2002</strong> <br/> Status: <span id="pub-status-sm-249">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-249"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-249"> 12/06/2002 </td> </tr> <tr id="result-250"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-250">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-250"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2000/10/19/proceedings-of-the-23rd-nissc-2000/final" id="pub-title-link-250">Proceedings of the 23rd National Information Systems Security Conference</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-250">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2000/10/19/proceedings-of-the-23rd-nissc-2000/final" class="mobile-pub-title" id="pub-title-link-sm-250">Proceedings of the 23rd National Information Systems Security Conference</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-250">10/19/2000</strong> <br/> Status: <span id="pub-status-sm-250">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-250"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-250"> 10/19/2000 </td> </tr> <tr id="result-251"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-251">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-251"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2000/10/19/business-process-driven-framework-defining-access/final" id="pub-title-link-251">Business Process Driven Framework for Defining an Access Control Service Based on Roles and Rules</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-251">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2000/10/19/business-process-driven-framework-defining-access/final" class="mobile-pub-title" id="pub-title-link-sm-251">Business Process Driven Framework for Defining an Access Control Service Based on Roles and Rules</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-251">10/19/2000</strong> <br/> Status: <span id="pub-status-sm-251">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-251"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-251"> 10/19/2000 </td> </tr> <tr id="result-252"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-252">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-252"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2000/07/27/application-of-xml-tools-for-enterprisewide-rbac-i/final" id="pub-title-link-252">Application of XML Tools for Enterprise-Wide RBAC Implementation Tasks</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-252">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2000/07/27/application-of-xml-tools-for-enterprisewide-rbac-i/final" class="mobile-pub-title" id="pub-title-link-sm-252">Application of XML Tools for Enterprise-Wide RBAC Implementation Tasks</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-252">7/27/2000</strong> <br/> Status: <span id="pub-status-sm-252">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-252"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-252"> 7/27/2000 </td> </tr> <tr id="result-253"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-253">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-253"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2000/07/26/nist-model-for-rbac-towards-a-unified-standard/final" id="pub-title-link-253">The NIST Model for Role-Based Access Control: Towards a Unified Standard</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-253">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/2000/07/26/nist-model-for-rbac-towards-a-unified-standard/final" class="mobile-pub-title" id="pub-title-link-sm-253">The NIST Model for Role-Based Access Control: Towards a Unified Standard</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-253">7/26/2000</strong> <br/> Status: <span id="pub-status-sm-253">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-253"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-253"> 7/26/2000 </td> </tr> <tr id="result-254"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-254">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-254"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1999/12/10/resource-access-decision-service-corbabased-distri/final" id="pub-title-link-254">A Resource Access Decision Service for CORBA-based Distributed Systems</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-254">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1999/12/10/resource-access-decision-service-corbabased-distri/final" class="mobile-pub-title" id="pub-title-link-sm-254">A Resource Access Decision Service for CORBA-based Distributed Systems</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-254">12/10/1999</strong> <br/> Status: <span id="pub-status-sm-254">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-254"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-254"> 12/10/1999 </td> </tr> <tr id="result-255"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-255">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-255"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1999/10/29/supporting-relationships-in-access-control-using-r/final" id="pub-title-link-255">Supporting Relationships in Access Control Using Role Based Access Control</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-255">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1999/10/29/supporting-relationships-in-access-control-using-r/final" class="mobile-pub-title" id="pub-title-link-sm-255">Supporting Relationships in Access Control Using Role Based Access Control</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-255">10/29/1999</strong> <br/> Status: <span id="pub-status-sm-255">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-255"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-255"> 10/29/1999 </td> </tr> <tr id="result-256"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-256">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-256"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1999/10/21/proceedings-of-the-22nd-nissc-1999/final" id="pub-title-link-256">Proceedings of the 22nd National Information Systems Security Conference</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-256">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1999/10/21/proceedings-of-the-22nd-nissc-1999/final" class="mobile-pub-title" id="pub-title-link-sm-256">Proceedings of the 22nd National Information Systems Security Conference</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-256">10/21/1999</strong> <br/> Status: <span id="pub-status-sm-256">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-256"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-256"> 10/21/1999 </td> </tr> <tr id="result-257"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-257">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-257"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1998/10/29/rolebased-access-control-for-the-web/final" id="pub-title-link-257">Role-Based Access Control for the Web</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-257">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1998/10/29/rolebased-access-control-for-the-web/final" class="mobile-pub-title" id="pub-title-link-sm-257">Role-Based Access Control for the Web</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-257">10/29/1998</strong> <br/> Status: <span id="pub-status-sm-257">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-257"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-257"> 10/29/1998 </td> </tr> <tr id="result-258"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-258">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-258"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1998/10/23/role-based-access-control-on-mls-systems-without-k/final" id="pub-title-link-258">Role Based Access Control on MLS Systems Without Kernel Changes</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-258">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1998/10/23/role-based-access-control-on-mls-systems-without-k/final" class="mobile-pub-title" id="pub-title-link-sm-258">Role Based Access Control on MLS Systems Without Kernel Changes</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-258">10/23/1998</strong> <br/> Status: <span id="pub-status-sm-258">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-258"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-258"> 10/23/1998 </td> </tr> <tr id="result-259"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-259">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-259"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1998/10/23/managing-rolepermission-relationships-using-object/final" id="pub-title-link-259">Managing Role/Permission Relationships Using Object Access Types</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-259">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1998/10/23/managing-rolepermission-relationships-using-object/final" class="mobile-pub-title" id="pub-title-link-sm-259">Managing Role/Permission Relationships Using Object Access Types</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-259">10/23/1998</strong> <br/> Status: <span id="pub-status-sm-259">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-259"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-259"> 10/23/1998 </td> </tr> <tr id="result-260"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-260">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-260"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1998/10/09/rolebased-access-control-features-in-commercial-db/final" id="pub-title-link-260">Role-Based Access Control Features in Commercial Database Management Systems</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-260">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1998/10/09/rolebased-access-control-features-in-commercial-db/final" class="mobile-pub-title" id="pub-title-link-sm-260">Role-Based Access Control Features in Commercial Database Management Systems</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-260">10/09/1998</strong> <br/> Status: <span id="pub-status-sm-260">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-260"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-260"> 10/09/1998 </td> </tr> <tr id="result-261"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-261">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-261"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1998/10/08/proceedings-of-the-21st-nissc-1998/final" id="pub-title-link-261">Proceedings of the 21st National Information Systems Security Conference</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-261">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1998/10/08/proceedings-of-the-21st-nissc-1998/final" class="mobile-pub-title" id="pub-title-link-sm-261">Proceedings of the 21st National Information Systems Security Conference</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-261">10/08/1998</strong> <br/> Status: <span id="pub-status-sm-261">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-261"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-261"> 10/08/1998 </td> </tr> <tr id="result-262"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-262">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-262"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1998/10/06/inheritance-properties-of-role-hierarchies/final" id="pub-title-link-262">Inheritance Properties of Role Hierarchies</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-262">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1998/10/06/inheritance-properties-of-role-hierarchies/final" class="mobile-pub-title" id="pub-title-link-sm-262">Inheritance Properties of Role Hierarchies</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-262">10/06/1998</strong> <br/> Status: <span id="pub-status-sm-262">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-262"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-262"> 10/06/1998 </td> </tr> <tr id="result-263"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-263">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-263"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1998/10/01/formal-specification-for-role-based-access-control/final" id="pub-title-link-263">Formal Specification for Role Based Access Control User/Role and Role/Role Relationship Management</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-263">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1998/10/01/formal-specification-for-role-based-access-control/final" class="mobile-pub-title" id="pub-title-link-sm-263">Formal Specification for Role Based Access Control User/Role and Role/Role Relationship Management</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-263">10/01/1998</strong> <br/> Status: <span id="pub-status-sm-263">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-263"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-263"> 10/01/1998 </td> </tr> <tr id="result-264"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-264">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-264"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1997/11/07/specifying-and-managing-rolebased-access-control-w/final" id="pub-title-link-264">Specifying and Managing Role-Based Access Control Within a Corporate Intranet</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-264">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1997/11/07/specifying-and-managing-rolebased-access-control-w/final" class="mobile-pub-title" id="pub-title-link-sm-264">Specifying and Managing Role-Based Access Control Within a Corporate Intranet</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-264">11/07/1997</strong> <br/> Status: <span id="pub-status-sm-264">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-264"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-264"> 11/07/1997 </td> </tr> <tr id="result-265"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-265">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-265"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1997/11/07/comparing-simple-rbac-models-and-access-control-li/final" id="pub-title-link-265">Comparing Simple Role Based Access Control Models and Access Control Lists</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-265">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1997/11/07/comparing-simple-rbac-models-and-access-control-li/final" class="mobile-pub-title" id="pub-title-link-sm-265">Comparing Simple Role Based Access Control Models and Access Control Lists</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-265">11/07/1997</strong> <br/> Status: <span id="pub-status-sm-265">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-265"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-265"> 11/07/1997 </td> </tr> <tr id="result-266"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-266">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-266"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1997/11/07/mutual-exclusion-of-roles-to-implement-separation/final" id="pub-title-link-266">Mutual Exclusion of Roles as a Means of Implementing Separation of Duty in Role-Based Access Control Systems</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-266">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1997/11/07/mutual-exclusion-of-roles-to-implement-separation/final" class="mobile-pub-title" id="pub-title-link-sm-266">Mutual Exclusion of Roles as a Means of Implementing Separation of Duty in Role-Based Access Control Systems</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-266">11/07/1997</strong> <br/> Status: <span id="pub-status-sm-266">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-266"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-266"> 11/07/1997 </td> </tr> <tr id="result-267"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-267">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-267"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1997/10/10/proceedings-of-the-20th-nissc-1997/final" id="pub-title-link-267">Proceedings of the 20th National Information Systems Security Conference</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-267">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1997/10/10/proceedings-of-the-20th-nissc-1997/final" class="mobile-pub-title" id="pub-title-link-sm-267">Proceedings of the 20th National Information Systems Security Conference</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-267">10/10/1997</strong> <br/> Status: <span id="pub-status-sm-267">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-267"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-267"> 10/10/1997 </td> </tr> <tr id="result-268"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-268">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-268"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1997/10/10/role-based-access-control-for-the-world-wide-web/final" id="pub-title-link-268">Role Based Access Control for the World Wide Web</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-268">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1997/10/10/role-based-access-control-for-the-world-wide-web/final" class="mobile-pub-title" id="pub-title-link-sm-268">Role Based Access Control for the World Wide Web</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-268">10/10/1997</strong> <br/> Status: <span id="pub-status-sm-268">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-268"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-268"> 10/10/1997 </td> </tr> <tr id="result-269"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-269">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-269"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1997/04/01/us-govt-activities-to-protect-the-information-infr/final" id="pub-title-link-269">U.S. Government Activities to Protect the Information Infrastructure</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-269">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1997/04/01/us-govt-activities-to-protect-the-information-infr/final" class="mobile-pub-title" id="pub-title-link-sm-269">U.S. Government Activities to Protect the Information Infrastructure</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-269">4/01/1997</strong> <br/> Status: <span id="pub-status-sm-269">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-269"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-269"> 4/01/1997 </td> </tr> <tr id="result-270"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-270">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-270"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1996/10/22/proceedings-of-the-19th-nissc-1996/final" id="pub-title-link-270">Proceedings of the 19th National Information Systems Security Conference</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-270">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1996/10/22/proceedings-of-the-19th-nissc-1996/final" class="mobile-pub-title" id="pub-title-link-sm-270">Proceedings of the 19th National Information Systems Security Conference</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-270">10/22/1996</strong> <br/> Status: <span id="pub-status-sm-270">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-270"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-270"> 10/22/1996 </td> </tr> <tr id="result-271"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-271">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-271"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1996/03/21/developing-fed-stds-and-accreditations-data-protec/final" id="pub-title-link-271">Developing Federal Standards and Accreditations for Data Protection Products</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-271">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1996/03/21/developing-fed-stds-and-accreditations-data-protec/final" class="mobile-pub-title" id="pub-title-link-sm-271">Developing Federal Standards and Accreditations for Data Protection Products</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-271">3/21/1996</strong> <br/> Status: <span id="pub-status-sm-271">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-271"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-271"> 3/21/1996 </td> </tr> <tr id="result-272"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-272">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-272"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1995/12/15/rolebased-access-control-rbac-features-and-motivat/final" id="pub-title-link-272">Role-Based Access Control (RBAC): Features and Motivations</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-272">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1995/12/15/rolebased-access-control-rbac-features-and-motivat/final" class="mobile-pub-title" id="pub-title-link-sm-272">Role-Based Access Control (RBAC): Features and Motivations</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-272">12/15/1995</strong> <br/> Status: <span id="pub-status-sm-272">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-272"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-272"> 12/15/1995 </td> </tr> <tr id="result-273"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-273">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-273"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1995/12/01/implementing-rolebased-access-control-using-object/final" id="pub-title-link-273">Implementing Role-Based Access Control Using Object Technology</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-273">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1995/12/01/implementing-rolebased-access-control-using-object/final" class="mobile-pub-title" id="pub-title-link-sm-273">Implementing Role-Based Access Control Using Object Technology</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-273">12/01/1995</strong> <br/> Status: <span id="pub-status-sm-273">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-273"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-273"> 12/01/1995 </td> </tr> <tr id="result-274"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-274">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-274"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1995/10/10/proceedings-of-the-18th-nissc-1995/final" id="pub-title-link-274">Proceedings of the 18th National Information Systems Security Conference</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-274">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1995/10/10/proceedings-of-the-18th-nissc-1995/final" class="mobile-pub-title" id="pub-title-link-sm-274">Proceedings of the 18th National Information Systems Security Conference</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-274">10/10/1995</strong> <br/> Status: <span id="pub-status-sm-274">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-274"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-274"> 10/10/1995 </td> </tr> <tr id="result-275"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-275">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-275"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1995/10/10/functional-security-criteria-for-distributed-syste/final" id="pub-title-link-275">Functional Security Criteria for Distributed Systems</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-275">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1995/10/10/functional-security-criteria-for-distributed-syste/final" class="mobile-pub-title" id="pub-title-link-sm-275">Functional Security Criteria for Distributed Systems</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-275">10/10/1995</strong> <br/> Status: <span id="pub-status-sm-275">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-275"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-275"> 10/10/1995 </td> </tr> <tr id="result-276"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-276">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-276"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1994/10/11/proceedings-17th-national-computer-security-confer/final" id="pub-title-link-276">Proceedings of the 17th National Computer Security Conference</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-276">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1994/10/11/proceedings-17th-national-computer-security-confer/final" class="mobile-pub-title" id="pub-title-link-sm-276">Proceedings of the 17th National Computer Security Conference</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-276">10/11/1994</strong> <br/> Status: <span id="pub-status-sm-276">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-276"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-276"> 10/11/1994 </td> </tr> <tr id="result-277"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-277">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-277"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1993/12/06/a-second-look-at-the-sdns-key-management-protocol/final" id="pub-title-link-277">A Second Look at the SDNS Key Management Protocol</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-277">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1993/12/06/a-second-look-at-the-sdns-key-management-protocol/final" class="mobile-pub-title" id="pub-title-link-sm-277">A Second Look at the SDNS Key Management Protocol</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-277">12/06/1993</strong> <br/> Status: <span id="pub-status-sm-277">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-277"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-277"> 12/06/1993 </td> </tr> <tr id="result-278"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-278">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-278"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1993/10/04/approximating-clarkwilson-access-triples-basic-uni/final" id="pub-title-link-278">Approximating Clark-Wilson, Access Triples with Basic UNIX Controls</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-278">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1993/10/04/approximating-clarkwilson-access-triples-basic-uni/final" class="mobile-pub-title" id="pub-title-link-sm-278">Approximating Clark-Wilson, Access Triples with Basic UNIX Controls</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-278">10/04/1993</strong> <br/> Status: <span id="pub-status-sm-278">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-278"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-278"> 10/04/1993 </td> </tr> <tr id="result-279"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-279">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-279"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1993/09/20/integrity-model-needed-for-computerized-voting-sys/final" id="pub-title-link-279">An Integrity Model is Needed for Computerized Voting and Similar Systems</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-279">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1993/09/20/integrity-model-needed-for-computerized-voting-sys/final" class="mobile-pub-title" id="pub-title-link-sm-279">An Integrity Model is Needed for Computerized Voting and Similar Systems</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-279">9/20/1993</strong> <br/> Status: <span id="pub-status-sm-279">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-279"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-279"> 9/20/1993 </td> </tr> <tr id="result-280"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-280">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-280"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1993/09/20/examination-of-federal-commercial-access-control-p/final" id="pub-title-link-280">An Examination of Federal and Commercial Access Control Policy Needs</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-280">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1993/09/20/examination-of-federal-commercial-access-control-p/final" class="mobile-pub-title" id="pub-title-link-sm-280">An Examination of Federal and Commercial Access Control Policy Needs</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-280">9/20/1993</strong> <br/> Status: <span id="pub-status-sm-280">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-280"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-280"> 9/20/1993 </td> </tr> <tr id="result-281"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-281">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-281"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1993/09/20/proceedings-16th-national-computer-security-confer/final" id="pub-title-link-281">Proceedings of the 16th National Computer Security Conference</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-281">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1993/09/20/proceedings-16th-national-computer-security-confer/final" class="mobile-pub-title" id="pub-title-link-sm-281">Proceedings of the 16th National Computer Security Conference</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-281">9/20/1993</strong> <br/> Status: <span id="pub-status-sm-281">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-281"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-281"> 9/20/1993 </td> </tr> <tr id="result-282"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-282">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-282"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1993/09/20/choosing-among-standards-for-lower-layer-security/final" id="pub-title-link-282">Choosing Among Standards for Lower Layer Security Protocols</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-282">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1993/09/20/choosing-among-standards-for-lower-layer-security/final" class="mobile-pub-title" id="pub-title-link-sm-282">Choosing Among Standards for Lower Layer Security Protocols</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-282">9/20/1993</strong> <br/> Status: <span id="pub-status-sm-282">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-282"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-282"> 9/20/1993 </td> </tr> <tr id="result-283"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-283">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-283"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1993/02/11/an-overview-of-asacs/final" id="pub-title-link-283">An Overview of the Advanced Smartcard Access Control System (ASACS)</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-283">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1993/02/11/an-overview-of-asacs/final" class="mobile-pub-title" id="pub-title-link-sm-283">An Overview of the Advanced Smartcard Access Control System (ASACS)</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-283">2/11/1993</strong> <br/> Status: <span id="pub-status-sm-283">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-283"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-283"> 2/11/1993 </td> </tr> <tr id="result-284"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-284">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-284"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1993/01/01/response-to-comments-on-nist-proposed-digital-sign/final" id="pub-title-link-284">Response to Comments on the NIST Proposed Digital Signature Standard</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-284">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1993/01/01/response-to-comments-on-nist-proposed-digital-sign/final" class="mobile-pub-title" id="pub-title-link-sm-284">Response to Comments on the NIST Proposed Digital Signature Standard</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-284">1/01/1993</strong> <br/> Status: <span id="pub-status-sm-284">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-284"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-284"> 1/01/1993 </td> </tr> <tr id="result-285"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-285">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-285"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1992/10/13/precise-identification-of-computer-viruses/final" id="pub-title-link-285">Precise Identification of Computer Viruses</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-285">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1992/10/13/precise-identification-of-computer-viruses/final" class="mobile-pub-title" id="pub-title-link-sm-285">Precise Identification of Computer Viruses</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-285">10/13/1992</strong> <br/> Status: <span id="pub-status-sm-285">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-285"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-285"> 10/13/1992 </td> </tr> <tr id="result-286"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-286">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-286"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1992/10/13/proceedings-15th-national-computer-security-confer/final" id="pub-title-link-286">Proceedings of the 15th National Computer Security Conference</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-286">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1992/10/13/proceedings-15th-national-computer-security-confer/final" class="mobile-pub-title" id="pub-title-link-sm-286">Proceedings of the 15th National Computer Security Conference</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-286">10/13/1992</strong> <br/> Status: <span id="pub-status-sm-286">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-286"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-286"> 10/13/1992 </td> </tr> <tr id="result-287"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-287">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-287"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1992/10/13/rolebased-access-controls/final" id="pub-title-link-287">Role-Based Access Controls</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-287">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1992/10/13/rolebased-access-controls/final" class="mobile-pub-title" id="pub-title-link-sm-287">Role-Based Access Controls</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-287">10/13/1992</strong> <br/> Status: <span id="pub-status-sm-287">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-287"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-287"> 10/13/1992 </td> </tr> <tr id="result-288"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-288">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-288"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1992/06/15/an-analysis-of-selected-software-safety-standards/final" id="pub-title-link-288">An Analysis of Selected Software Safety Standards</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-288">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1992/06/15/an-analysis-of-selected-software-safety-standards/final" class="mobile-pub-title" id="pub-title-link-sm-288">An Analysis of Selected Software Safety Standards</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-288">6/15/1992</strong> <br/> Status: <span id="pub-status-sm-288">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-288"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-288"> 6/15/1992 </td> </tr> <tr id="result-289"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-289">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-289"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1991/10/07/high-integrity-software-standards-activities-at-ni/final" id="pub-title-link-289">High Integrity Software Standards Activities at NIST</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-289">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1991/10/07/high-integrity-software-standards-activities-at-ni/final" class="mobile-pub-title" id="pub-title-link-sm-289">High Integrity Software Standards Activities at NIST</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-289">10/07/1991</strong> <br/> Status: <span id="pub-status-sm-289">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-289"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-289"> 10/07/1991 </td> </tr> <tr id="result-290"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-290">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-290"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1991/10/01/proceedings-14th-national-computer-security-confer/final" id="pub-title-link-290">Proceedings of the 14th National Computer Security Conference</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-290">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1991/10/01/proceedings-14th-national-computer-security-confer/final" class="mobile-pub-title" id="pub-title-link-sm-290">Proceedings of the 14th National Computer Security Conference</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-290">10/01/1991</strong> <br/> Status: <span id="pub-status-sm-290">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-290"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-290"> 10/01/1991 </td> </tr> <tr id="result-291"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-291">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-291"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1990/10/01/proceedings-13th-national-computer-security-confer/final" id="pub-title-link-291">Proceedings of the 13th National Computer Security Conference</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-291">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1990/10/01/proceedings-13th-national-computer-security-confer/final" class="mobile-pub-title" id="pub-title-link-sm-291">Proceedings of the 13th National Computer Security Conference</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-291">10/01/1990</strong> <br/> Status: <span id="pub-status-sm-291">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-291"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-291"> 10/01/1990 </td> </tr> <tr id="result-292"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-292">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-292"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1990/10/01/latest-research-on-minimizing-security-risks-for-p/final" id="pub-title-link-292">Latest Research on Minimizing Security Risks for PCs and LANS</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-292">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1990/10/01/latest-research-on-minimizing-security-risks-for-p/final" class="mobile-pub-title" id="pub-title-link-sm-292">Latest Research on Minimizing Security Risks for PCs and LANS</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-292">10/01/1990</strong> <br/> Status: <span id="pub-status-sm-292">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-292"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-292"> 10/01/1990 </td> </tr> <tr id="result-293"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-293">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-293"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1990/04/23/effective-use-of-software-standards-in-systems-int/final" id="pub-title-link-293">On the Effective Use of Software Standards in Systems Integration</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-293">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1990/04/23/effective-use-of-software-standards-in-systems-int/final" class="mobile-pub-title" id="pub-title-link-sm-293">On the Effective Use of Software Standards in Systems Integration</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-293">4/23/1990</strong> <br/> Status: <span id="pub-status-sm-293">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-293"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-293"> 4/23/1990 </td> </tr> <tr id="result-294"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-294">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-294"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1989/10/10/proceedings-12th-national-computer-security-confer/final" id="pub-title-link-294">Proceedings of the 12th National Computer Security Conference</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-294">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1989/10/10/proceedings-12th-national-computer-security-confer/final" class="mobile-pub-title" id="pub-title-link-sm-294">Proceedings of the 12th National Computer Security Conference</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-294">10/10/1989</strong> <br/> Status: <span id="pub-status-sm-294">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-294"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-294"> 10/10/1989 </td> </tr> <tr id="result-295"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-295">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-295"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1989/10/10/a-token-based-access-control-system-for-computer-n/final" id="pub-title-link-295">A Token Based Access Control System for Computer Networks</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-295">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1989/10/10/a-token-based-access-control-system-for-computer-n/final" class="mobile-pub-title" id="pub-title-link-sm-295">A Token Based Access Control System for Computer Networks</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-295">10/10/1989</strong> <br/> Status: <span id="pub-status-sm-295">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-295"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-295"> 10/10/1989 </td> </tr> <tr id="result-296"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-296">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-296"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1988/12/05/expert-assistance-for-manipulation-of-sgml-dtds/final" id="pub-title-link-296">Expert assistance for manipulating of SGML document type definitions</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-296">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1988/12/05/expert-assistance-for-manipulation-of-sgml-dtds/final" class="mobile-pub-title" id="pub-title-link-sm-296">Expert assistance for manipulating of SGML document type definitions</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-296">12/05/1988</strong> <br/> Status: <span id="pub-status-sm-296">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-296"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-296"> 12/05/1988 </td> </tr> <tr id="result-297"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-297">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-297"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1988/10/17/proceedings-11th-national-computer-security-confer/final" id="pub-title-link-297">Proceedings of the 11th National Computer Security Conference</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-297">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1988/10/17/proceedings-11th-national-computer-security-confer/final" class="mobile-pub-title" id="pub-title-link-sm-297">Proceedings of the 11th National Computer Security Conference</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-297">10/17/1988</strong> <br/> Status: <span id="pub-status-sm-297">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-297"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-297"> 10/17/1988 </td> </tr> <tr id="result-298"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-298">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-298"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1988/10/17/static-analysis-tools-for-software-security-certif/final" id="pub-title-link-298">Static Analysis Tools for Software Security Certification</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-298">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1988/10/17/static-analysis-tools-for-software-security-certif/final" class="mobile-pub-title" id="pub-title-link-sm-298">Static Analysis Tools for Software Security Certification</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-298">10/17/1988</strong> <br/> Status: <span id="pub-status-sm-298">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-298"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-298"> 10/17/1988 </td> </tr> <tr id="result-299"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-299">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-299"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1987/09/21/proceedings-10th-national-computer-security-confer/final" id="pub-title-link-299">Proceedings of the 10th National Computer Security Conference</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-299">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1987/09/21/proceedings-10th-national-computer-security-confer/final" class="mobile-pub-title" id="pub-title-link-sm-299">Proceedings of the 10th National Computer Security Conference</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-299">9/21/1987</strong> <br/> Status: <span id="pub-status-sm-299">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-299"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-299"> 9/21/1987 </td> </tr> <tr id="result-300"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-300">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-300"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1986/09/15/proceedings-9th-national-computer-security-confere/final" id="pub-title-link-300">Proceedings of the 9th National Computer Security Conference</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-300">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1986/09/15/proceedings-9th-national-computer-security-confere/final" class="mobile-pub-title" id="pub-title-link-sm-300">Proceedings of the 9th National Computer Security Conference</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-300">9/15/1986</strong> <br/> Status: <span id="pub-status-sm-300">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-300"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-300"> 9/15/1986 </td> </tr> <tr id="result-301"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-301">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-301"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1985/09/30/proceedings-8th-national-computer-security-confere/final" id="pub-title-link-301">Proceedings of the 8th National Computer Security Conference</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-301">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1985/09/30/proceedings-8th-national-computer-security-confere/final" class="mobile-pub-title" id="pub-title-link-sm-301">Proceedings of the 8th National Computer Security Conference</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-301">9/30/1985</strong> <br/> Status: <span id="pub-status-sm-301">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-301"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-301"> 9/30/1985 </td> </tr> <tr id="result-302"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-302">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-302"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1984/09/24/7th-dodnbs-computer-security-conference/final" id="pub-title-link-302">7th DoD/NBS Computer Security Conference</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-302">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1984/09/24/7th-dodnbs-computer-security-conference/final" class="mobile-pub-title" id="pub-title-link-sm-302">7th DoD/NBS Computer Security Conference</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-302">9/24/1984</strong> <br/> Status: <span id="pub-status-sm-302">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-302"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-302"> 9/24/1984 </td> </tr> <tr id="result-303"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-303">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-303"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1983/11/15/proceedings-6th-seminar-on-the-dod-computer-securi/final" id="pub-title-link-303">Proceedings of the Sixth Seminar on the DoD Computer Security Initiative</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-303">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1983/11/15/proceedings-6th-seminar-on-the-dod-computer-securi/final" class="mobile-pub-title" id="pub-title-link-sm-303">Proceedings of the Sixth Seminar on the DoD Computer Security Initiative</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-303">11/15/1983</strong> <br/> Status: <span id="pub-status-sm-303">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-303"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-303"> 11/15/1983 </td> </tr> <tr id="result-304"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-304">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-304"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1982/05/24/proceedings-5th-seminar-dod-computer-security-init/final" id="pub-title-link-304">Proceedings of the Fifth Seminar on the DoD Computer Security Initiative</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-304">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1982/05/24/proceedings-5th-seminar-dod-computer-security-init/final" class="mobile-pub-title" id="pub-title-link-sm-304">Proceedings of the Fifth Seminar on the DoD Computer Security Initiative</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-304">5/24/1982</strong> <br/> Status: <span id="pub-status-sm-304">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-304"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-304"> 5/24/1982 </td> </tr> <tr id="result-305"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-305">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-305"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1981/08/10/proceedings-4th-seminar-dod-computer-security-init/final" id="pub-title-link-305">Proceedings of the Fourth Seminar on the DoD Computer Security Initiative</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-305">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1981/08/10/proceedings-4th-seminar-dod-computer-security-init/final" class="mobile-pub-title" id="pub-title-link-sm-305">Proceedings of the Fourth Seminar on the DoD Computer Security Initiative</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-305">8/10/1981</strong> <br/> Status: <span id="pub-status-sm-305">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-305"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-305"> 8/10/1981 </td> </tr> <tr id="result-306"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-306">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-306"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1980/11/18/proceedings-3rd-seminar-dod-computer-security-init/final" id="pub-title-link-306">Proceedings of the Third Seminar on the DoD Computer Security Initiative Program</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-306">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1980/11/18/proceedings-3rd-seminar-dod-computer-security-init/final" class="mobile-pub-title" id="pub-title-link-sm-306">Proceedings of the Third Seminar on the DoD Computer Security Initiative Program</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-306">11/18/1980</strong> <br/> Status: <span id="pub-status-sm-306">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-306"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-306"> 11/18/1980 </td> </tr> <tr id="result-307"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-307">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-307"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1980/01/15/proceedings-2nd-seminar-dod-computer-security-init/final" id="pub-title-link-307">Proceedings of the Second Seminar on the DoD Computer Security Initiative Program</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-307">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1980/01/15/proceedings-2nd-seminar-dod-computer-security-init/final" class="mobile-pub-title" id="pub-title-link-sm-307">Proceedings of the Second Seminar on the DoD Computer Security Initiative Program</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-307">1/15/1980</strong> <br/> Status: <span id="pub-status-sm-307">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-307"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-307"> 1/15/1980 </td> </tr> <tr id="result-308"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-308">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-308"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1979/07/17/proceedings-first-seminar-dod-computer-security-in/final" id="pub-title-link-308">Proceedings of the Seminar on the DoD Computer Security Initiative Program</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-308">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1979/07/17/proceedings-first-seminar-dod-computer-security-in/final" class="mobile-pub-title" id="pub-title-link-sm-308">Proceedings of the Seminar on the DoD Computer Security Initiative Program</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-308">7/17/1979</strong> <br/> Status: <span id="pub-status-sm-308">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-308"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-308"> 7/17/1979 </td> </tr> <tr id="result-309"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-309">Conference Paper</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-309"></td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1975/10/07/encryption-protection-in-computer-data-communicati/final" id="pub-title-link-309">Encryption Protection in Computer Data Communications</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-309">Conference Paper (Final)</span><br/> <a href="/web/20230923062103/https://csrc.nist.gov/pubs/conference/1975/10/07/encryption-protection-in-computer-data-communicati/final" class="mobile-pub-title" id="pub-title-link-sm-309">Encryption Protection in Computer Data Communications</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-309">10/07/1975</strong> <br/> Status: <span id="pub-status-sm-309">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-309"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-309"> 10/07/1975 </td> </tr> </tbody> </table> <div class="row bottom-pagination-area"> <p class="text-center"> <span class="pagination-links" id="bottom-pagination-container" data-total-pages="0" data-min-page="1" data-max-page="0" data-current-page="1" data-show-first="False" data-show-last="True"></span> </p> </div> <div> <span class="pull-right"> <a href="/web/20230923062103/https://csrc.nist.gov/publications/search" id="view-all-pubs-link">View All Publications</a> </span> </div> <div id="publications-quicklinks-sm" class="bs-callout bs-callout-subnav hidden-md hidden-lg"> <h4>Current Publications <i class="fa fa-bolt"></i></h4> <ul> <li> <strong> NIST Series Pubs <i class="fa fa-info-circle" aria-hidden="true" data-placement="right" data-html="true" data-tooltip-toggle="tooltipWithFunction" data-title-container="nist-series-pubs-tooltip-lg"></i> </strong> <ul> <li><a href="/web/20230923062103/https://csrc.nist.gov/publications/final-pubs" id="quick-link-final-sm">Final Pubs</a></li> <li><a href="/web/20230923062103/https://csrc.nist.gov/publications/drafts-open-for-comment" id="quick-links-comments-sm">Drafts Open for Comment</a></li> <li><a href="/web/20230923062103/https://csrc.nist.gov/publications/draft-pubs" id="quick-link-draft-sm">Drafts</a> (all)</li> <li> <strong> View By Series <i class="fa fa-info-circle" aria-hidden="true" data-placement="right" data-html="true" data-tooltip-toggle="tooltipWithFunction" data-title-container="nist-view-series-pubs-tooltip-lg"></i> </strong> <ul> <li><a href="/web/20230923062103/https://csrc.nist.gov/publications/fips" id="quick-link-fips-sm">FIPS</a> (standards)</li> <li><a href="/web/20230923062103/https://csrc.nist.gov/publications/sp800" id="quick-link-sp-800-sm">SP 800</a> (guidance)</li> <li><a href="/web/20230923062103/https://csrc.nist.gov/publications/sp1800" id="quick-link-sp-1800-sm">SP 1800</a> (practice guides)</li> <li><a href="/web/20230923062103/https://csrc.nist.gov/publications/sp" id="quick-link-sp-sm">SP</a> (all subseries)</li> <li><a href="/web/20230923062103/https://csrc.nist.gov/publications/ir" id="quick-link-nistir-sm">IR</a> (interagency/internal reports)</li> <li><a href="/web/20230923062103/https://csrc.nist.gov/publications/cswp" id="quick-link-white-papers-sm">CSWP</a> (cybersecurity white papers)</li> <li><a href="/web/20230923062103/https://csrc.nist.gov/publications/itl-bulletin" id="quick-link-itl-bul-sm">ITL Bulletins</a></li> </ul> </li> </ul> </li> <li> <strong> Other Pubs <i class="fa fa-info-circle" aria-hidden="true" data-placement="right" data-html="true" data-tooltip-toggle="tooltipWithFunction" data-title-container="nist-other-pubs-tooltip-lg"></i> </strong> <ul> <li><a href="/web/20230923062103/https://csrc.nist.gov/publications/project-description" id="quick-link-project-description-sm">Project Descriptions</a></li> <li><a href="/web/20230923062103/https://csrc.nist.gov/publications/journal-article" id="quick-link-journal-articles-sm">Journal Articles</a></li> <li><a href="/web/20230923062103/https://csrc.nist.gov/publications/conference-paper" id="quick-link-conference-papers-sm">Conference Papers</a></li> <li><a href="/web/20230923062103/https://csrc.nist.gov/publications/book" id="quick-link-books-sm">Books</a></li> <li><a href="/web/20230923062103/https://csrc.nist.gov/publications/other" id="quick-link-other-sm">Other</a></li> </ul> </li> </ul> <span style="display: none;" id="nist-series-pubs-tooltip-lg"> <strong>Final:</strong> <em>Current list of all published NIST cybersecurity documents.</em> Does not include "Withdrawn" documents. Includes FIPS, Special Publications, NISTIRs, ITL Bulletins, and NIST Cybersecurity White Papers.<br/> <br/> <strong>Public Drafts:</strong> <em>Current list of all draft NIST cybersecurity documents--they are typically posted for public comment.</em> "Current" public drafts are the latest draft versions that have not yet been published as "Final." </span> <span style="display: none;" id="nist-view-series-pubs-tooltip-lg"> <strong>FIPS:</strong> <em>Current Federal Information Processing Standard Publications (FIPS).</em> Includes current (Final and Draft) FIPS.<br/> <br/> <strong>SP 800 Series:</strong> <em>Current NIST Special Publication (SP) 800 series publications, which focus on Computer/Information Security.</em> Includes current (Final and Draft) SP 800 pubs.<br/> <br/> <strong>All SP Series:</strong> <em> Current NIST Special Publications (SP), including SP 800 (Computer/Information Security) and SP 1800 (Cybersecurity Practice Guides) pubs. Also includes SP 500 (Computer Systems Technology) pubs related to cybersecurity and privacy. </em> Includes current (Final and Draft) NIST Special Publications.<br/> <br/> <strong>NISTIRs:</strong> <em>Current list of NIST Interagency or Internal Reports (NISTIR) related to cybersecurity and privacy.</em> Includes current (Final and Draft) NISTIRs.<br/> <br/> <strong>ITL Bulletins:</strong> Current list of NIST Information Technology Laboratory (ITL) Bulletins. </span> <span style="display: none;" id="nist-other-pubs-tooltip-lg"> <strong>White Papers:</strong> <em> Consists of NIST Cybersecurity White Papers; NCCoE Project Descriptions, Building Blocks and Use Cases; and other NIST-authored papers that are not part of a formal series. </em> Includes current (Final and Draft) papers.<br/> <br/> <strong>Journal Articles:</strong> NIST-authored articles published in external journals and in the NIST Journal of Research (JRES).<br/> <br/> <strong>Conference Papers:</strong> NIST-authored conference papers related to cybersecurity and privacy.<br/> <br/> <strong>Books:</strong> NIST-authored books, book sections, and encyclopedia entries related to cybersecurity and privacy. </span> </div> </div> </div> </div> <div id="footer-pusher"></div> </div> <footer id="footer"> <div class="container"> <div class="row"> <div class="col-sm-6"> <span class="hidden-xs"> <a href="https://web.archive.org/web/20230923062103/https://www.nist.gov/" title="National Institute of Standards and Technology" rel="home" target="_blank" class="footer-nist-logo" id="footer-nist-logo-link"> <img src="/web/20230923062103im_/https://csrc.nist.gov/CSRC/Media/images/nist-logo-brand-white.svg" alt="National Institute of Standards and Technology logo" id="footer-nist-logo"/> </a> </span> <div class="row footer-contact-container"> <div class="col-sm-12" id="footer-address"> <strong>HEADQUARTERS</strong><br> 100 Bureau Drive<br> Gaithersburg, MD 20899 </div> </div> </div> <div class="col-sm-6"> <ul class="social-list text-right" style="display: block;"> <li class="field-item service-twitter list-horiz"> <a href="https://web.archive.org/web/20230923062103/https://twitter.com/NISTCyber" class="social-btn social-btn--large extlink ext" id="footer-social-twitter-link"> <i class="fa fa-twitter fa-fw"><span class="element-invisible">twitter</span></i><span class="ext"><span class="element-invisible"> (link is external)</span></span> </a> </li> <li class="field-item service-facebook list-horiz"> <a href="https://web.archive.org/web/20230923062103/https://www.facebook.com/NIST" class="social-btn social-btn--large extlink ext" id="footer-social-facebook-link"> <i class="fa fa-facebook fa-fw"><span class="element-invisible">facebook</span></i><span class="ext"><span class="element-invisible"> (link is external)</span></span> </a> </li> <li class="field-item service-linkedin list-horiz"> <a href="https://web.archive.org/web/20230923062103/https://www.linkedin.com/company/nist" class="social-btn social-btn--large extlink ext" id="footer-social-linkedin-link"> <i class="fa fa-linkedin fa-fw"><span class="element-invisible">linkedin</span></i><span class="ext"><span class="element-invisible"> (link is external)</span></span> </a> </li> <li class="field-item service-instagram list-horiz"> <a href="https://web.archive.org/web/20230923062103/https://www.instagram.com/usnistgov/" class="social-btn social-btn--large extlink ext" id="footer-social-instagram-link"> <i class="fa fa-instagram fa-fw"><span class="element-invisible">instagram</span></i> <span class="ext"><span class="element-invisible"> (link is external)</span></span> </a> </li> <li class="field-item service-youtube list-horiz"> <a href="https://web.archive.org/web/20230923062103/https://www.youtube.com/user/USNISTGOV" class="social-btn social-btn--large extlink ext" id="footer-social-youtube-link"> <i class="fa fa-youtube fa-fw"><span class="element-invisible">youtube</span></i><span class="ext"><span class="element-invisible"> (link is external)</span></span> </a> </li> <li class="field-item service-rss list-horiz"> <a href="https://web.archive.org/web/20230923062103/https://www.nist.gov/news-events/nist-rss-feeds" class="social-btn social-btn--large extlink" id="footer-social-rss-link"> <i class="fa fa-rss fa-fw"><span class="element-invisible">rss</span></i> </a> </li> <li class="field-item service-govdelivery list-horiz last"> <a href="https://web.archive.org/web/20230923062103/https://public.govdelivery.com/accounts/USNIST/subscriber/new?qsp=USNIST_3" class="social-btn social-btn--large extlink ext" title="Subscribe to CSRC and publication updates, and other NIST cybersecurity news" id="footer-social-govdelivery-link"> <i class="fa fa-envelope fa-fw"><span class="element-invisible">govdelivery</span></i><span class="ext"><span class="element-invisible"> (link is external)</span></span> </a> </li> </ul> <p class="text-right"> Want updates about CSRC and our publications? <a href="https://web.archive.org/web/20230923062103/https://public.govdelivery.com/accounts/USNIST/subscriber/new?qsp=USNIST_3" class="btn btn-lg btn-primary" style="background-color: #12659c!important; border-color: #12659c!important;" id="footer-subscribe-link">Subscribe</a> </p> </div> </div> <div class="row hidden-sm hidden-md hidden-lg"> <div class="col-sm-12"> <a href="https://web.archive.org/web/20230923062103/https://www.nist.gov/" title="National Institute of Standards and Technology" rel="home" target="_blank" class="footer-nist-logo" id="footer-bottom-nist-logo-link"> <img src="/web/20230923062103im_/https://csrc.nist.gov/CSRC/Media/images/logo_rev.png" alt="National Institute of Standards and Technology logo" id="footer-bottom-nist-logo"/> </a> </div> </div> <div class="row"> <div class="col-sm-6"> <p> <a href="/web/20230923062103/https://csrc.nist.gov/about/contact" id="footer-contact-us-link">Contact Us</a> | <a href="https://web.archive.org/web/20230923062103/https://www.nist.gov/about-nist/our-organization" style="display: inline-block;" id="footer-org-link">Our Other Offices</a> </p> </div> <div class="col-sm-6"> <span class="pull-right text-right"> Send inquiries to <a href="https://web.archive.org/web/20230923062103/mailto:csrc-inquiry@nist.gov?subject=CSRC Inquiry" style="display: inline-block;" id="footer-inquiries-link">csrc-inquiry@nist.gov</a> </span> </div> </div> <div class="row"> <div class="footer-bottom-links-container" id="footer-bottom-links-container"> <ul> <li><a href="https://web.archive.org/web/20230923062103/https://www.nist.gov/privacy-policy">Site Privacy</a></li> <li><a href="https://web.archive.org/web/20230923062103/https://www.nist.gov/oism/accessibility">Accessibility</a></li> <li><a href="https://web.archive.org/web/20230923062103/https://www.nist.gov/privacy">Privacy Program</a></li> <li><a href="https://web.archive.org/web/20230923062103/https://www.nist.gov/oism/copyrights">Copyrights</a></li> <li><a href="https://web.archive.org/web/20230923062103/https://www.commerce.gov/vulnerability-disclosure-policy">Vulnerability Disclosure</a></li> <li><a href="https://web.archive.org/web/20230923062103/https://www.nist.gov/no-fear-act-policy">No Fear Act Policy</a></li> <li><a href="https://web.archive.org/web/20230923062103/https://www.nist.gov/foia">FOIA</a></li> <li><a href="https://web.archive.org/web/20230923062103/https://www.nist.gov/environmental-policy-statement">Environmental Policy</a></li> <li><a href="https://web.archive.org/web/20230923062103/https://www.nist.gov/summary-report-scientific-integrity">Scientific Integrity</a></li> <li><a href="https://web.archive.org/web/20230923062103/https://www.nist.gov/nist-information-quality-standards">Information Quality Standards</a></li> <li><a href="https://web.archive.org/web/20230923062103/https://www.commerce.gov/">Commerce.gov</a></li> <li><a href="https://web.archive.org/web/20230923062103/https://www.science.gov/">Science.gov</a></li> <li><a href="https://web.archive.org/web/20230923062103/https://www.usa.gov/">USA.gov</a></li> <li><a href="https://web.archive.org/web/20230923062103/https://vote.gov/">Vote.gov</a></li> </ul> </div> </div> </div> </footer> <script type="text/javascript" src="/web/20230923062103js_/https://csrc.nist.gov/dist/js/quick-collapse.js"></script> <script type="text/javascript" src="/web/20230923062103js_/https://csrc.nist.gov/dist/app.bundle.js"></script> </body> </html> <!-- FILE ARCHIVED ON 06:21:03 Sep 23, 2023 AND RETRIEVED FROM THE INTERNET ARCHIVE ON 03:19:06 Dec 01, 2024. JAVASCRIPT APPENDED BY WAYBACK MACHINE, COPYRIGHT INTERNET ARCHIVE. ALL OTHER CONTENT MAY ALSO BE PROTECTED BY COPYRIGHT (17 U.S.C. SECTION 108(a)(3)). --> <!-- playback timings (ms): captures_list: 0.537 exclusion.robots: 0.033 exclusion.robots.policy: 0.02 esindex: 0.01 cdx.remote: 12.788 LoadShardBlock: 291.705 (3) PetaboxLoader3.datanode: 201.297 (4) PetaboxLoader3.resolve: 206.696 (3) load_resource: 167.634 -->