CINXE.COM
Search | CSRC
<!DOCTYPE html> <html lang="en-us" xml:lang="en-us"> <head><script type="text/javascript" src="/_static/js/bundle-playback.js?v=HxkREWBo" charset="utf-8"></script> <script type="text/javascript" src="/_static/js/wombat.js?v=txqj7nKC" charset="utf-8"></script> <script>window.RufflePlayer=window.RufflePlayer||{};window.RufflePlayer.config={"autoplay":"on","unmuteOverlay":"hidden"};</script> <script type="text/javascript" src="/_static/js/ruffle/ruffle.js"></script> <script type="text/javascript"> __wm.init("https://web.archive.org/web"); __wm.wombat("https://csrc.nist.gov/publications/ir","20231004155343","https://web.archive.org/","web","/_static/", "1696434823"); </script> <link rel="stylesheet" type="text/css" href="/_static/css/banner-styles.css?v=S1zqJCYt" /> <link rel="stylesheet" type="text/css" href="/_static/css/iconochive.css?v=3PDvdIFv" /> <!-- End Wayback Rewrite JS Include --> <meta charset="utf-8"/> <title>Search | CSRC</title> <meta http-equiv="content-type" content="text/html; charset=UTF-8"/> <meta http-equiv="content-style-type" content="text/css"/> <meta http-equiv="content-script-type" content="text/javascript"/> <meta name="viewport" content="width=device-width, initial-scale=1.0"/> <meta name="msapplication-config" content="/CSRC/Media/images/favicons/browserconfig.xml"/> <meta name="theme-color" content="#000000"/> <meta name="google-site-verification" content="xbrnrVYDgLD-Bd64xHLCt4XsPXzUhQ-4lGMj4TdUUTA"/> <link rel="apple-touch-icon" sizes="180x180" href="/web/20231004155343im_/https://csrc.nist.gov/images/icons/apple-touch-icon.png"/> <link rel="icon" type="image/png" href="/web/20231004155343im_/https://csrc.nist.gov/images/icons/favicon-32x32.png" sizes="32x32"/> <link rel="icon" type="image/png" href="/web/20231004155343im_/https://csrc.nist.gov/images/icons/favicon-16x16.png" sizes="16x16"/> <link rel="manifest" href="/web/20231004155343/https://csrc.nist.gov/images/icons/manifest.json"/> <link rel="mask-icon" href="/web/20231004155343im_/https://csrc.nist.gov/images/icons/safari-pinned-tab.svg" color="#000000"/> <link href="/web/20231004155343im_/https://csrc.nist.gov/CSRC/Media/images/favicons/favicon.ico" type="image/x-icon" rel="shortcut icon"/> <link href="/web/20231004155343im_/https://csrc.nist.gov/CSRC/Media/images/favicons/favicon.ico" type="image/x-icon" rel="icon"/> <link href="/web/20231004155343cs_/https://csrc.nist.gov/dist/app.css" rel="stylesheet"/> <!-- reCAPTCHA v3 --> <style> .grecaptcha-badge { visibility: hidden; } </style> <script async type="text/javascript" id="_fed_an_ua_tag" src="https://web.archive.org/web/20231004155343js_/https://dap.digitalgov.gov/Universal-Federated-Analytics-Min.js?agency=nist&subagency=csrc&pua=UA-66610693-15&yt=true&exts=xsd,xml,wav,mpg,mpeg,avi,rtf,webm,ogg,ogv,oga,map,otf,eot,svg,ttf,woff"></script> <style id="antiClickjackCss"> body > * { display: none !important; } #antiClickjack { display: block !important; } </style> <noscript> <style id="antiClickjackNoScript"> body > * { display: block !important; } #antiClickjack { display: none !important; } </style> </noscript> <script type="text/javascript" id="antiClickjackScript"> if (self === top) { // no clickjacking var antiClickjack = document.getElementById("antiClickjackCss"); antiClickjack.parentNode.removeChild(antiClickjack); } else { setTimeout(tryForward(), 5000); } function tryForward() { top.location = self.location; } </script> <!-- Google tag (gtag.js) --> <script async src="https://web.archive.org/web/20231004155343js_/https://www.googletagmanager.com/gtag/js?id=G-TSQ0PLGJZP"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-TSQ0PLGJZP'); </script> </head> <body> <div id="antiClickjack" style="display: none;"> <strong style="font-size: 1.6rem;">You are viewing this page in an unauthorized frame window.</strong> <p>This is a potential security issue, you are being redirected to <a href="https://web.archive.org/web/20231004155343/https://csrc.nist.gov/">https://csrc.nist.gov</a>.</p> </div> <section class="usa-banner" aria-label="Official government website"> <div class="usa-accordion container"> <header class="usa-banner__header"> <noscript> <p style="font-size: 0.85rem; font-weight: bold;">You have JavaScript disabled. This site requires JavaScript to be enabled for complete site functionality.</p> </noscript> <img class="usa-banner__header-flag" src="/web/20231004155343im_/https://csrc.nist.gov/images/usbanner/us_flag_small.png" alt="U.S. flag"> <span class="usa-banner__header-text">An official website of the United States government</span> <button id="gov-banner-button" class="usa-accordion__button usa-banner__button" data-toggle="collapse" data-target="#gov-banner" aria-expanded="true" aria-controls="gov-banner"> <span class="usa-banner__button-text">Here's how you know</span> </button> </header> <div class="usa-banner__content usa-accordion__content collapse in" role="tabpanel" id="gov-banner" aria-expanded="true"> <div class="row"> <div class="col-md-5 col-sm-12"> <div class="row"> <div class="col-sm-2 col-xs-3"> <img class="usa-banner__icon usa-media-block__img" src="/web/20231004155343im_/https://csrc.nist.gov/images/usbanner/icon-dot-gov.svg" alt="Dot gov"> </div> <div class="col-sm-10 col-xs-9"> <p> <strong>Official websites use .gov</strong> <br> A <strong>.gov</strong> website belongs to an official government organization in the United States. </p> </div> </div> </div> <div class="col-md-5 col-sm-12"> <div class="row"> <div class="col-sm-2 col-xs-3"> <img class="usa-banner__icon usa-media-block__img" src="/web/20231004155343im_/https://csrc.nist.gov/images/usbanner/icon-https.svg" alt="Https"> </div> <div class="col-sm-10 col-xs-9"> <p> <strong>Secure .gov websites use HTTPS</strong> <br> A <strong>lock</strong> (<img class="usa-banner__lock" src="/web/20231004155343im_/https://csrc.nist.gov/images/usbanner/lock.svg" alt="Dot gov">) or <strong>https://</strong> means you've safely connected to the .gov website. Share sensitive information only on official, secure websites. </p> </div> </div> </div> </div> </div> </div> </section> <nav id="navbar" class="navbar"> <div id="nist-menu-container" class="container"> <div class="row"> <!-- Brand --> <div class="col-xs-6 col-md-4 navbar-header"> <a class="navbar-brand" href="https://web.archive.org/web/20231004155343/https://www.nist.gov/" target="_blank" id="navbar-brand-image"> <img src="/web/20231004155343im_/https://csrc.nist.gov/CSRC/media/images/svg/nist-logo.svg" alt="National Institute of Standards and Technology" width="110" height="30"> </a> </div> <div class="col-xs-6 col-md-8 navbar-nist-logo"> <div class="form-inline hidden-sm hidden-xs"> <form name="site-search" id="site-search-form" action="/web/20231004155343/https://csrc.nist.gov/search" method="GET"> <label for="search-csrc-query" class="element-invisible">Search</label> <input autocomplete="off" class="form-control" id="search-csrc-query" name="keywords" type="text" size="15" maxlength="128" placeholder="Search CSRC"/> <input type="hidden" name="ipp" value="25"/> <input type="hidden" name="sortBy" value="relevance"/> <input type="hidden" name="showOnly" value="publications,projects,news,events,presentations,glossary,topics"/> <input type="hidden" name="topicsMatch" value="ANY"/> <input type="hidden" name="status" value="Final,Draft"/> <button type="submit" id="search-csrc-submit-btn" class="form-submit"> <span class="element-invisible">Search</span> <i class="fa fa-search"></i> </button> </form> </div> <span id="nvd-menu-button" class="pull-right"> <a href="#" id="nvd-menu-button-link"> <span class="fa fa-bars"></span> <span id="nvd-menu-full-text">CSRC MENU</span> </a> </span> </div> </div> </div> <div class="form-inline hidden-md hidden-lg"> <form name="site-search-mobile" id="site-search-form-mobile" action="/web/20231004155343/https://csrc.nist.gov/search" method="GET"> <label for="search-csrc-query-mobile" class="element-invisible">Search</label> <input autocomplete="off" class="form-control" id="search-csrc-query-mobile" name="keywords" type="text" size="15" maxlength="128" placeholder="Search CSRC"/> <button type="submit" id="search-csrc-submit-btn-mobile" class="form-submit"> <span class="element-invisible">Search</span> <i class="fa fa-search"></i> </button> </form> </div> <div class="main-menu-row container"> <!-- Collect the nav links, forms, and other content for toggling --> <div id="main-menu-drop" class="col-lg-12" style="display: none;"> <ul> <li><a href="/web/20231004155343/https://csrc.nist.gov/projects">Projects</a></li> <li> <a href="/web/20231004155343/https://csrc.nist.gov/publications"> Publications <span class="expander fa fa-plus" id="main-menu-pubs-expander" data-expander-name="publications" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="publications" id="main-menu-pubs-expanded"> <div class="row"> <div class="col-lg-4"> <p><a href="/web/20231004155343/https://csrc.nist.gov/publications/drafts-open-for-comment">Drafts for Public Comment</a></p> <p><a href="/web/20231004155343/https://csrc.nist.gov/publications/draft-pubs">All Public Drafts</a></p> <p><a href="/web/20231004155343/https://csrc.nist.gov/publications/final-pubs">Final Pubs</a></p> <p><a href="/web/20231004155343/https://csrc.nist.gov/publications/fips">FIPS <small>(standards)</small></a></p> </div> <div class="col-lg-4"> <p><a href="/web/20231004155343/https://csrc.nist.gov/publications/sp">Special Publications (SP<small>s</small>)</a></p> <p><a href="/web/20231004155343/https://csrc.nist.gov/publications/ir">IR <small>(interagency/internal reports)</small></a></p> <p><a href="/web/20231004155343/https://csrc.nist.gov/publications/cswp">CSWP <small>(cybersecurity white papers)</small></a></p> <p><a href="/web/20231004155343/https://csrc.nist.gov/publications/itl-bulletin">ITL Bulletins</a></p> </div> <div class="col-lg-4"> <p><a href="/web/20231004155343/https://csrc.nist.gov/publications/project-description">Project Descriptions</a></p> <p><a href="/web/20231004155343/https://csrc.nist.gov/publications/journal-article">Journal Articles</a></p> <p><a href="/web/20231004155343/https://csrc.nist.gov/publications/conference-paper">Conference Papers</a></p> <p><a href="/web/20231004155343/https://csrc.nist.gov/publications/book">Books</a></p> </div> </div> </div> </li> <li> <a href="/web/20231004155343/https://csrc.nist.gov/topics"> Topics <span class="expander fa fa-plus" id="main-menu-topics-expander" data-expander-name="topics" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="topics" id="main-menu-topics-expanded"> <div class="row"> <div class="col-lg-4"> <p><a href="/web/20231004155343/https://csrc.nist.gov/Topics/Security-and-Privacy">Security & Privacy</a></p> <p><a href="/web/20231004155343/https://csrc.nist.gov/Topics/Applications">Applications</a></p> </div> <div class="col-lg-4"> <p><a href="/web/20231004155343/https://csrc.nist.gov/Topics/Technologies">Technologies</a></p> <p><a href="/web/20231004155343/https://csrc.nist.gov/Topics/Sectors">Sectors</a></p> </div> <div class="col-lg-4"> <p><a href="/web/20231004155343/https://csrc.nist.gov/Topics/Laws-and-Regulations">Laws & Regulations</a></p> <p><a href="/web/20231004155343/https://csrc.nist.gov/Topics/Activities-and-Products">Activities & Products</a></p> </div> </div> </div> </li> <li><a href="/web/20231004155343/https://csrc.nist.gov/news">News & Updates</a></li> <li><a href="/web/20231004155343/https://csrc.nist.gov/events">Events</a></li> <li><a href="/web/20231004155343/https://csrc.nist.gov/glossary">Glossary</a></li> <li> <a href="/web/20231004155343/https://csrc.nist.gov/about"> About CSRC <span class="expander fa fa-plus" id="main-menu-about-expander" data-expander-name="about" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="about" id="main-menu-about-expanded"> <div class="row"> <div class="col-lg-6"> <p> <strong><a href="/web/20231004155343/https://csrc.nist.gov/Groups/Computer-Security-Division">Computer Security Division</a></strong><br/> <ul> <li><a href="/web/20231004155343/https://csrc.nist.gov/Groups/Computer-Security-Division/Cryptographic-Technology">Cryptographic Technology</a></li> <li><a href="/web/20231004155343/https://csrc.nist.gov/Groups/Computer-Security-Division/Secure-Systems-and-Applications">Secure Systems and Applications</a></li> <li><a href="/web/20231004155343/https://csrc.nist.gov/Groups/Computer-Security-Division/Security-Components-and-Mechanisms">Security Components and Mechanisms</a></li> <li><a href="/web/20231004155343/https://csrc.nist.gov/Groups/Computer-Security-Division/Security-Engineering-and-Risk-Management">Security Engineering and Risk Management</a></li> <li><a href="/web/20231004155343/https://csrc.nist.gov/Groups/Computer-Security-Division/Security-Testing-Validation-and-Measurement">Security Testing, Validation, and Measurement</a></li> </ul> </p> </div> <div class="col-lg-6"> <p> <strong><a href="/web/20231004155343/https://csrc.nist.gov/Groups/Applied-Cybersecurity-Division">Applied Cybersecurity Division</a></strong><br/> <ul> <li><a href="/web/20231004155343/https://csrc.nist.gov/Groups/Applied-Cybersecurity-Division/Cybersecurity-and-Privacy-Applications">Cybersecurity and Privacy Applications</a></li> <li><a href="/web/20231004155343/https://csrc.nist.gov/Groups/Applied-Cybersecurity-Division/National-Cybersecurity-Center-of-Excellence">National Cybersecurity Center of Excellence (NCCoE)</a></li> <li><a href="https://web.archive.org/web/20231004155343/https://www.nist.gov/nice/">National Initiative for Cybersecurity Education (NICE)</a></li> </ul> </p> <p> <a href="/web/20231004155343/https://csrc.nist.gov/contact"> Contact Us </a> </p> </div> </div> </div> </li> </ul> </div><!-- /#mobile-nav-container --> </div> </nav> <section id="itl-header" class="has-menu"> <div class="container"> <div class="row"> <div class="col-sm-12 col-md-8"> <div class="hidden-xs hidden-sm" id="itl-header-lg"> <a href="https://web.archive.org/web/20231004155343/https://www.nist.gov/itl" target="_blank" id="itl-header-link">Information Technology Laboratory</a> </div> <div class="hidden-xs hidden-sm" id="csrc-header-lg"> <a href="/web/20231004155343/https://csrc.nist.gov/" id="csrc-header-link-lg">Computer Security Resource Center</a> </div> </div> <div class="col-sm-12 col-md-4"> <div class="hidden-xs hidden-sm hidden-md"> <a id="logo-csrc-lg" href="/web/20231004155343/https://csrc.nist.gov/"><img id="img-logo-csrc-lg" src="/web/20231004155343im_/https://csrc.nist.gov/CSRC/Media/images/nist-logo-csrc-white.svg" alt="CSRC Logo" class="csrc-header-logo"></a> </div> <div class="hidden-lg"> <a id="logo-csrc-sm" href="/web/20231004155343/https://csrc.nist.gov/"><img id="img-logo-csrc-sm" src="/web/20231004155343im_/https://csrc.nist.gov/CSRC/Media/images/nist-logo-csrc-white.svg" alt="CSRC Logo" class="csrc-header-logo"></a> </div> </div> </div> </div> </section> <div id="body-section" class="container"> <div class="publications-content"> <div class="row"> <div class="col-lg-3 col-md-4 hidden-sm hidden-xs hidden-xxs"> <div id="publications-quicklinks-lg" class="bs-callout bs-callout-subnav hidden-sm hidden-xs hidden-xxs"> <h4>Current Publications <i class="fa fa-bolt"></i></h4> <ul> <li> <strong> NIST Series Pubs <i class="fa fa-info-circle" aria-hidden="true" data-placement="right" data-html="true" data-tooltip-toggle="tooltipWithFunction" data-title-container="nist-series-pubs-tooltip"></i> </strong> <ul> <li><a href="/web/20231004155343/https://csrc.nist.gov/publications/final-pubs" id="quick-link-final-lg">Final Pubs</a></li> <li><a href="/web/20231004155343/https://csrc.nist.gov/publications/drafts-open-for-comment" id="quick-links-comments-lg">Drafts Open for Comment</a></li> <li><a href="/web/20231004155343/https://csrc.nist.gov/publications/draft-pubs" id="quick-link-draft-lg">Drafts</a> (all)</li> <li> <strong> View By Series <i class="fa fa-info-circle" aria-hidden="true" data-placement="right" data-html="true" data-tooltip-toggle="tooltipWithFunction" data-title-container="nist-view-series-pubs-tooltip"></i> </strong> <ul> <li><a href="/web/20231004155343/https://csrc.nist.gov/publications/fips" id="quick-link-fips-lg">FIPS</a> (standards)</li> <li><a href="/web/20231004155343/https://csrc.nist.gov/publications/sp800" id="quick-link-sp-800-lg">SP 800</a> (guidance)</li> <li><a href="/web/20231004155343/https://csrc.nist.gov/publications/sp1800" id="quick-link-sp-1800-lg">SP 1800</a> (practice guides)</li> <li><a href="/web/20231004155343/https://csrc.nist.gov/publications/sp" id="quick-link-sp-lg">SP</a> (all subseries)</li> <li><a href="/web/20231004155343/https://csrc.nist.gov/publications/ir" id="quick-link-nistir-lg">IR</a> (interagency/internal reports)</li> <li><a href="/web/20231004155343/https://csrc.nist.gov/publications/cswp" id="quick-link-white-papers-lg">CSWP</a> (cybersecurity white papers)</li> <li><a href="/web/20231004155343/https://csrc.nist.gov/publications/itl-bulletin" id="quick-link-itl-bul-lg">ITL Bulletins</a></li> </ul> </li> </ul> </li> <li> <strong> Other Pubs <i class="fa fa-info-circle" aria-hidden="true" data-placement="right" data-html="true" data-tooltip-toggle="tooltipWithFunction" data-title-container="nist-other-pubs-tooltip"></i> </strong> <ul> <li><a href="/web/20231004155343/https://csrc.nist.gov/publications/project-description" id="quick-link-project-description-lg">Project Descriptions</a></li> <li><a href="/web/20231004155343/https://csrc.nist.gov/publications/journal-article" id="quick-link-journal-articles-lg">Journal Articles</a></li> <li><a href="/web/20231004155343/https://csrc.nist.gov/publications/conference-paper" id="quick-link-conference-papers-lg">Conference Papers</a></li> <li><a href="/web/20231004155343/https://csrc.nist.gov/publications/book" id="quick-link-books-lg">Books</a></li> <li><a href="/web/20231004155343/https://csrc.nist.gov/publications/other" id="quick-link-other-lg">Other</a></li> </ul> </li> </ul> <span style="display: none;" id="nist-series-pubs-tooltip"> <strong>Final:</strong> <em>Current list of all published NIST cybersecurity documents.</em> Does not include "Withdrawn" documents. Includes FIPS, Special Publications, NISTIRs, ITL Bulletins, and NIST Cybersecurity White Papers.<br/> <br/> <strong>Public Drafts:</strong> <em>Current list of all draft NIST cybersecurity documents--they are typically posted for public comment.</em> "Current" public drafts are the latest draft versions that have not yet been published as "Final." </span> <span style="display: none;" id="nist-view-series-pubs-tooltip"> <strong>FIPS:</strong> <em>Current Federal Information Processing Standard Publications (FIPS).</em> Includes current (Final and Draft) FIPS.<br/> <br/> <strong>SP 800 Series:</strong> <em>Current NIST Special Publication (SP) 800 series publications, which focus on Computer/Information Security.</em> Includes current (Final and Draft) SP 800 pubs.<br/> <br/> <strong>All SP Series:</strong> <em> Current NIST Special Publications (SP), including SP 800 (Computer/Information Security) and SP 1800 (Cybersecurity Practice Guides) pubs. Also includes SP 500 (Computer Systems Technology) pubs related to cybersecurity and privacy. </em> Includes current (Final and Draft) NIST Special Publications.<br/> <br/> <strong>NISTIRs:</strong> <em>Current list of NIST Interagency or Internal Reports (NISTIR) related to cybersecurity and privacy.</em> Includes current (Final and Draft) NISTIRs.<br/> <br/> <strong>ITL Bulletins:</strong> Current list of NIST Information Technology Laboratory (ITL) Bulletins. </span> <span style="display: none;" id="nist-other-pubs-tooltip"> <strong>White Papers:</strong> <em> Consists of NIST Cybersecurity White Papers; NCCoE Project Descriptions, Building Blocks and Use Cases; and other NIST-authored papers that are not part of a formal series. </em> Includes current (Final and Draft) papers.<br/> <br/> <strong>Journal Articles:</strong> NIST-authored articles published in external journals and in the NIST Journal of Research (JRES).<br/> <br/> <strong>Conference Papers:</strong> NIST-authored conference papers related to cybersecurity and privacy.<br/> <br/> <strong>Books:</strong> NIST-authored books, book sections, and encyclopedia entries related to cybersecurity and privacy. </span> </div> <form action="/web/20231004155343/https://csrc.nist.gov/publications/search" class="bs-callout bs-callout-success csrc-search-form hidden-sm hidden-xs hidden-xxs" data-csrc-form="true" data-default-query="sortBy-lg=Number+DESC&viewMode-lg=brief&ipp-lg=ALL&status-lg=Draft%2CFinal&series-lg=IR" data-form-ignore-default="sortBy" data-form-name="pubSearchDesktop" id="pubs-search-form-lg" method="get"> <div class="form-group"> <label for="keywords-lg">Search</label> <input name="keywords-lg" class="form-control" data-val="true" data-val-length="The field Search must be a string with a maximum length of 255." data-val-length-max="255" id="keywords-lg" name="Form.Keywords" type="text" value=""/> <em class="text-muted">Search publication record data<br/> (not a full text search)</em> </div> <div class="form-group"> <label for="sortBy-lg">Sort By</label> <div class="form-inline"> <select name="sortBy-lg" class="form-control" id="sortBy-lg" name="Form.SortBy"><option value="relevance">Relevance (best match)</option> <option value="releasedate DESC">Release Date (newest first)</option> <option value="releasedate ASC">Release Date (oldest first)</option> <option value="Series ASC">Series (A-Z)</option> <option value="Series DESC">Series (Z-A)</option> <option value="Number ASC">Number (lowest to highest)</option> <option selected="selected" value="Number DESC">Number (highest to lowest)</option> <option value="title asc">Title (A-Z)</option> <option value="title desc">Title (Z-A)</option> </select> </div> </div> <div class="form-group"> <label for="viewMode-lg">Results View</label> <select name="viewMode-lg" class="form-control" id="viewMode-lg" name="Form.ResultsViewMode"><option selected="selected" value="brief">Brief</option> <option value="summary">Summary</option> </select> </div> <div class="form-group form-inline"> <label for="ipp-lg" class="form-control-half">Items Per Page</label> <select name="ipp-lg" class="form-control" id="ipp-lg" name="Form.ItemsPerPage"><option value="50">50</option> <option value="75">75</option> <option value="100">100</option> <option selected="selected" value="all">All</option> </select> </div> <div class="form-group"> <label for="dateFrom-lg">Date</label> <div class="form-inline form-date-inline"> <div class="input-group date" data-date-picker="true"> <input name="dateFrom-lg" class="form-control" data-control-type="date" data-val="true" data-val-date="The field Date must be a date." data-validation="true" data-validation-compare-field="dateTo-lg" data-validation-message="From date must be less than To date" data-validation-type="less-than-date" id="dateFrom-lg" name="Form.DateFrom" placeholder=" / / " type="text" value=""/> <span class="input-group-addon"> <span class="fa fa-calendar"> </span> </span> </div> <div class="input-group date" data-date-picker="true"> <input name="dateTo-lg" class="form-control" data-control-type="date" data-val="true" data-val-date="The field DateTo must be a date." id="dateTo-lg" name="Form.DateTo" placeholder=" / / " type="text" value=""/> <span class="input-group-addon"> <span class="fa fa-calendar"> </span> </span> </div> </div> </div> <div class="form-group"> <label for="status-all-lg"> Status <i class="fa fa-info-circle" aria-hidden="true" data-placement="right" data-html="true" data-tooltip-toggle="tooltipWithFunction" data-title-container="publications-status-info"></i> </label> <div class="form-inline status-type" style="margin-left: 1rem;"> <label class="meta-label"> <input type="checkbox" id="status-final-lg" name="status-lg" value="Final" data-default-checked="True" checked="'checked'"/> Final<br/> </label> <label class="meta-label"> <input type="checkbox" id="status-draft-lg" name="status-lg" value="Draft" data-default-checked="True" checked="'checked'"/> Public Draft<br/> </label> <label class="meta-label"> <input type="checkbox" id="status-withdrawn-lg" name="status-lg" value="Withdrawn" data-default-checked="True"/> Withdrawn<br/> </label> </div> </div> <div class="form-group"> <label for="pub-search-series"> Series <button type="button" id="series-all-lg" class="btn btn-sm btn-success" data-check-all="series-lg">Check All</button> <button type="button" id="series-clear-lg" class="btn btn-sm btn-success" data-check-none="series-lg">Clear</button> </label> <div class="form-inline series-type" style="margin-left: 1rem;"> <label class="meta-label"> <input type="checkbox" id="series-b2b6ef80-0dec-4d48-ae2d-a37ab486a846-lg" name="series-lg" value="FIPS" data-default-checked="True"/> FIPS<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-749c7275-15f5-4eec-8cb9-3b6f1528756c-lg" name="series-lg" value="SP" data-default-checked="True"/> SP<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-344a35c7-520e-4845-88b0-6997147ffc76-lg" name="series-lg" value="IR" data-default-checked="True" checked="'checked'/"> IR<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-5f83968e-4758-479d-9aa4-1d42166b7deb-lg" name="series-lg" value="CSWP" data-default-checked="True"/> CSWP<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-b2004197-4249-454a-bdce-edc6186b5c60-lg" name="series-lg" value="TN" data-default-checked="True"/> TN<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-09acb409-e18b-4a05-ac84-631662bcccd9-lg" name="series-lg" value="VTS" data-default-checked="True"/> VTS<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-8022364e-73db-4498-b2eb-9317ce32fff2-lg" name="series-lg" value="AI" data-default-checked="True"/> AI<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-57afe5d0-383f-4fd6-b702-84233dcd5f13-lg" name="series-lg" value="GCR" data-default-checked="True"/> GCR<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-23801152-858e-4dbc-baad-eb51795cf0e2-lg" name="series-lg" value="Project Description" data-default-checked="True"/> Project Description<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-8c9f1828-ae8a-4f03-8d9f-9ff7192b508e-lg" name="series-lg" value="ITL Bulletin" data-default-checked="True"/> ITL Bulletin<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-debd6afb-aeaa-4790-a32b-c977c9654df0-lg" name="series-lg" value="Journal Article" data-default-checked="True"/> Journal Article<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-ed478237-d49d-41c6-91ed-5dd341bd50c8-lg" name="series-lg" value="Conference Paper" data-default-checked="True"/> Conference Paper<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-f2273ac7-d756-4cce-b006-a527778c84f0-lg" name="series-lg" value="Book" data-default-checked="True"/> Book<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-80e369a4-bea5-46f5-8082-91f19c3eeefa-lg" name="series-lg" value="Book Section" data-default-checked="True"/> Book Section<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-b1570e28-332c-4f29-a1e0-cd31c3930848-lg" name="series-lg" value="Other" data-default-checked="True"/> Other<br/> </label> </div> </div> <div class="form-group"> <label for="pub-search-topics-lg"> Topics </label> <input name="topics-lg" id="topics-lg" name="Form.Topics" type="hidden" value=""/> <div class="form-control topics-selection" id="pub-search-topics-lg" contenteditable="true" data-drop-target="pub-search-topics-drop-lg" data-field-name="topics-lg" aria-haspopup="true"> </div> <div class="topics-selection-dropdown desktop" id="pub-search-topics-drop-lg" style="display: none;" data-topics-selector=""><div class="col-sm-4"><strong>Security and Privacy</strong><br/> <ul><li><i class="fa fa-plus fa-fw" id="topics-expander-pstdl-24670-27481" data-expander-for="/topics/security-and-privacy/cryptography"></i> <a data-topic-id="27481" data-topic-text="cryptography">cryptography</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27647" data-topic-text="digital signatures">digital signatures</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27648" data-topic-text="encryption">encryption</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27649" data-topic-text="key management">key management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="30027" data-topic-text="lightweight cryptography">lightweight cryptography</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27650" data-topic-text="message authentication">message authentication</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27651" data-topic-text="post-quantum cryptography">post-quantum cryptography</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27652" data-topic-text="random number generation">random number generation</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27653" data-topic-text="secure hashing">secure hashing</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27482" data-topic-text="cybersecurity supply chain risk management">cybersecurity supply chain risk management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27483" data-topic-text="general security & privacy">general security & privacy</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstdl-24670-27484" data-expander-for="/topics/security-and-privacy/identity-and-access-management"></i> <a data-topic-id="27484" data-topic-text="identity & access management">identity & access management</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27663" data-topic-text="access authorization">access authorization</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27664" data-topic-text="access control">access control</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27665" data-topic-text="authentication">authentication</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27666" data-topic-text="Personal Identity Verification">Personal Identity Verification</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27667" data-topic-text="public key infrastructure">public key infrastructure</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstdl-24670-27485" data-expander-for="/topics/security-and-privacy/privacy"></i> <a data-topic-id="27485" data-topic-text="privacy">privacy</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27680" data-topic-text="personally identifiable information">personally identifiable information</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27681" data-topic-text="privacy engineering">privacy engineering</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstdl-24670-27486" data-expander-for="/topics/security-and-privacy/risk-management"></i> <a data-topic-id="27486" data-topic-text="risk management">risk management</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27682" data-topic-text="categorization">categorization</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27683" data-topic-text="continuous monitoring">continuous monitoring</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstdl-27486-27684" data-expander-for="/topics/security-and-privacy/risk-management/controls"></i> <a data-topic-id="27684" data-topic-text="controls">controls</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27767" data-topic-text="controls assessment">controls assessment</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27768" data-topic-text="privacy controls">privacy controls</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27769" data-topic-text="security controls">security controls</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27685" data-topic-text="risk assessment">risk assessment</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27686" data-topic-text="roots of trust">roots of trust</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27687" data-topic-text="system authorization">system authorization</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstdl-27486-27688" data-expander-for="/topics/security-and-privacy/risk-management/threats"></i> <a data-topic-id="27688" data-topic-text="threats">threats</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27770" data-topic-text="advanced persistent threats">advanced persistent threats</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27771" data-topic-text="botnets">botnets</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27772" data-topic-text="information sharing">information sharing</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27773" data-topic-text="intrusion detection & prevention">intrusion detection & prevention</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27774" data-topic-text="malware">malware</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27689" data-topic-text="vulnerability management">vulnerability management</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstdl-24670-27487" data-expander-for="/topics/security-and-privacy/security-and-behavior"></i> <a data-topic-id="27487" data-topic-text="security & behavior">security & behavior</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27709" data-topic-text="accessibility">accessibility</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27710" data-topic-text="behavior">behavior</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27711" data-topic-text="usability">usability</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstdl-24670-27488" data-expander-for="/topics/security-and-privacy/security-measurement"></i> <a data-topic-id="27488" data-topic-text="security measurement">security measurement</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27690" data-topic-text="analytics">analytics</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27691" data-topic-text="assurance">assurance</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27692" data-topic-text="modeling">modeling</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27693" data-topic-text="testing & validation">testing & validation</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstdl-24670-27489" data-expander-for="/topics/security-and-privacy/security-programs-and-operations"></i> <a data-topic-id="27489" data-topic-text="security programs & operations">security programs & operations</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27694" data-topic-text="acquisition">acquisition</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27695" data-topic-text="asset management">asset management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27696" data-topic-text="audit & accountability">audit & accountability</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27697" data-topic-text="awareness training & education">awareness training & education</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27698" data-topic-text="configuration management">configuration management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27699" data-topic-text="contingency planning">contingency planning</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27700" data-topic-text="incident response">incident response</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27701" data-topic-text="maintenance">maintenance</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27702" data-topic-text="media protection">media protection</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27703" data-topic-text="patch management">patch management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27704" data-topic-text="personnel security">personnel security</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27705" data-topic-text="physical & environmental protection">physical & environmental protection</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27706" data-topic-text="planning">planning</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27707" data-topic-text="program management">program management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27708" data-topic-text="security automation">security automation</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstdl-24670-27490" data-expander-for="/topics/security-and-privacy/systems-security-engineering"></i> <a data-topic-id="27490" data-topic-text="systems security engineering">systems security engineering</a><ul style="display: none;"><li><i class="fa fa-plus fa-fw" id="topics-expander-pstdl-27490-27713" data-expander-for="/topics/security-and-privacy/systems-security-engineering/trustworthiness"></i> <a data-topic-id="27713" data-topic-text="trustworthiness">trustworthiness</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27775" data-topic-text="reliability">reliability</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27776" data-topic-text="resilience">resilience</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27777" data-topic-text="safety">safety</a></li></ul> </li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="28469" data-topic-text="zero trust">zero trust</a></li></ul><strong>Technologies</strong><br/> <ul><li><i class="fa fa-fw"></i> <a data-topic-id="27491" data-topic-text="artificial intelligence">artificial intelligence</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27492" data-topic-text="big data">big data</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27493" data-topic-text="biometrics">biometrics</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27494" data-topic-text="blockchain">blockchain</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27495" data-topic-text="cloud & virtualization">cloud & virtualization</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27496" data-topic-text="combinatorial testing">combinatorial testing</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27497" data-topic-text="complexity">complexity</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstdl-24671-27499" data-expander-for="/topics/technologies/hardware"></i> <a data-topic-id="27499" data-topic-text="hardware">hardware</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27714" data-topic-text="circuits">circuits</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27715" data-topic-text="personal computers">personal computers</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27716" data-topic-text="sensors">sensors</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27498" data-topic-text="mobile">mobile</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstdl-24671-27500" data-expander-for="/topics/technologies/networks"></i> <a data-topic-id="27500" data-topic-text="networks">networks</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27717" data-topic-text="email">email</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27718" data-topic-text="firewalls">firewalls</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27719" data-topic-text="internet">internet</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27501" data-topic-text="quantum information science">quantum information science</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27502" data-topic-text="servers">servers</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27503" data-topic-text="smart cards">smart cards</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstdl-24671-27504" data-expander-for="/topics/technologies/software-firmware"></i> <a data-topic-id="27504" data-topic-text="software & firmware">software & firmware</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27720" data-topic-text="BIOS">BIOS</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27721" data-topic-text="databases">databases</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27722" data-topic-text="operating systems">operating systems</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27505" data-topic-text="storage">storage</a></li></ul></div><div class="col-sm-4"><strong>Applications</strong><br/> <ul><li><i class="fa fa-fw"></i> <a data-topic-id="27456" data-topic-text="communications & wireless">communications & wireless</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27457" data-topic-text="cyber-physical systems">cyber-physical systems</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27458" data-topic-text="cybersecurity education">cybersecurity education</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27459" data-topic-text="cybersecurity framework">cybersecurity framework</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27460" data-topic-text="cybersecurity workforce">cybersecurity workforce</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27461" data-topic-text="enterprise">enterprise</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27462" data-topic-text="forensics">forensics</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27463" data-topic-text="industrial control systems">industrial control systems</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27464" data-topic-text="Internet of Things">Internet of Things</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="29979" data-topic-text="mathematics">mathematics</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27920" data-topic-text="positioning navigation & timing">positioning navigation & timing</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27465" data-topic-text="small & medium business">small & medium business</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27466" data-topic-text="telework">telework</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27467" data-topic-text="voting">voting</a></li></ul><strong>Laws and Regulations</strong><br/> <ul><li><i class="fa fa-plus fa-fw" id="topics-expander-pstdl-24673-27468" data-expander-for="/topics/laws-and-regulations/executive-documents"></i> <a data-topic-id="27468" data-topic-text="executive documents">executive documents</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27668" data-topic-text="Comprehensive National Cybersecurity Initiative">Comprehensive National Cybersecurity Initiative</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27669" data-topic-text="Cybersecurity Strategy and Implementation Plan">Cybersecurity Strategy and Implementation Plan</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27670" data-topic-text="Cyberspace Policy Review">Cyberspace Policy Review</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27671" data-topic-text="Executive Order 13636">Executive Order 13636</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27672" data-topic-text="Executive Order 13702">Executive Order 13702</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27673" data-topic-text="Executive Order 13718">Executive Order 13718</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27674" data-topic-text="Executive Order 13800">Executive Order 13800</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27921" data-topic-text="Executive Order 13905">Executive Order 13905</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="28468" data-topic-text="Executive Order 14028">Executive Order 14028</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27675" data-topic-text="Federal Cybersecurity Research and Development Strategic Plan">Federal Cybersecurity Research and Development Strategic Plan</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27676" data-topic-text="Homeland Security Presidential Directive 7">Homeland Security Presidential Directive 7</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27677" data-topic-text="Homeland Security Presidential Directive 12">Homeland Security Presidential Directive 12</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27678" data-topic-text="OMB Circular A-11">OMB Circular A-11</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27679" data-topic-text="OMB Circular A-130">OMB Circular A-130</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstdl-24673-27469" data-expander-for="/topics/laws-and-regulations/laws"></i> <a data-topic-id="27469" data-topic-text="laws">laws</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="35985" data-topic-text="CHIPS and Science Act">CHIPS and Science Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27654" data-topic-text="Cyber Security R&D Act">Cyber Security R&D; Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27655" data-topic-text="Cybersecurity Enhancement Act">Cybersecurity Enhancement Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27656" data-topic-text="E-Government Act">E-Government Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27657" data-topic-text="Energy Independence and Security Act">Energy Independence and Security Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27658" data-topic-text="Federal Information Security Modernization Act">Federal Information Security Modernization Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27659" data-topic-text="First Responder Network Authority">First Responder Network Authority</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27660" data-topic-text="Health Insurance Portability and Accountability Act">Health Insurance Portability and Accountability Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27661" data-topic-text="Help America Vote Act">Help America Vote Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="28580" data-topic-text="Internet of Things Cybersecurity Improvement Act">Internet of Things Cybersecurity Improvement Act</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstdl-24673-27470" data-expander-for="/topics/laws-and-regulations/regulations"></i> <a data-topic-id="27470" data-topic-text="regulations">regulations</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27662" data-topic-text="Federal Acquisition Regulation">Federal Acquisition Regulation</a></li></ul> </li></ul></div><div class="col-sm-4"><strong>Activities and Products</strong><br/> <ul><li><i class="fa fa-fw"></i> <a data-topic-id="27452" data-topic-text="annual reports">annual reports</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27453" data-topic-text="conferences & workshops">conferences & workshops</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="30210" data-topic-text="groups">groups</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27454" data-topic-text="reference materials">reference materials</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27455" data-topic-text="standards development">standards development</a></li></ul><strong>Sectors</strong><br/> <ul><li><i class="fa fa-fw"></i> <a data-topic-id="27471" data-topic-text="aerospace">aerospace</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstdl-24675-27472" data-expander-for="/topics/sectors/energy"></i> <a data-topic-id="27472" data-topic-text="energy">energy</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27712" data-topic-text="smart grid">smart grid</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27473" data-topic-text="financial services">financial services</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27474" data-topic-text="healthcare">healthcare</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27475" data-topic-text="hospitality">hospitality</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27476" data-topic-text="manufacturing">manufacturing</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27477" data-topic-text="public safety">public safety</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27478" data-topic-text="retail">retail</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27479" data-topic-text="telecommunications">telecommunications</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27480" data-topic-text="transportation">transportation</a></li></ul></div></div> <div class="form-inline topics-type"> <label class="radio-label">Match ANY: <input name="topicsMatch-lg" checked="checked" id="topicsMatch-any-lg" name="Form.TopicsMatch" type="radio" value="ANY"/></label> <label class="radio-label">Match ALL: <input name="topicsMatch-lg" id="topicsMatch-all-lg" name="Form.TopicsMatch" type="radio" value="ALL"/></label> </div> </div> <div class="form-group"> <label for="pub-search-controls-lg"> Control Family (800-53) </label> <input name="controls-lg" id="controls-lg" name="Form.Controls" type="hidden" value=""/> <div class="form-control controls-selection" id="pub-search-controls-lg" contenteditable="true" data-drop-target="pub-search-controls-drop-lg" data-field-name="controls-lg" aria-haspopup="true"> </div> <div class="controls-selection-dropdown desktop" id="pub-search-controls-drop-lg" style="display: none;" data-controls-selector=""> <strong>Control Families</strong> <ul> <li><a data-control-id="2049a555-9a3e-4395-88bc-8304c6d9b157">AC - Access Control</a></li> <li><a data-control-id="bb24a9c9-944e-41fc-b6a9-7c4217e054df">AT - Awareness and Training</a></li> <li><a data-control-id="b491696a-7f6b-4b1e-9145-b02938d9c279">AU - Audit and Accountability</a></li> <li><a data-control-id="27484ffc-ac08-40b0-8862-4be4154560e4">CA - Assessment, Authorization and Monitoring</a></li> <li><a data-control-id="b8b9a292-32ad-4698-abad-45c70b40757d">CM - Configuration Management</a></li> <li><a data-control-id="5604c7e8-b158-48c6-a497-c5357a43e7c2">CP - Contingency Planning</a></li> <li><a data-control-id="2b79dd04-6118-44ee-b54d-854948a5b55f">IA - Identification and Authentication</a></li> <li><a data-control-id="b6c1c9c0-3cf8-46c9-b2ae-4cd608f88b11">IR - Incident Response</a></li> <li><a data-control-id="c8219b58-a95d-4882-8e74-0c19369aceb6">MA - Maintenance</a></li> <li><a data-control-id="84b5d6fa-8fbc-4d32-b559-47a626a510b3">MP - Media Protection</a></li> <li><a data-control-id="f3703fe4-b51d-4139-98eb-1656b00fc4ed">PE - Physical and Environmental Protection</a></li> <li><a data-control-id="137c4d9f-6541-4431-bb88-d0d003ce039f">PL - Planning</a></li> <li><a data-control-id="6401481d-3689-49bb-840c-73256cfb102e">PM - Program Management</a></li> <li><a data-control-id="408d8a82-1783-414d-a303-d79525c87f6a">PS - Personnel Security</a></li> <li><a data-control-id="9f34a4cb-3ba3-49e1-8c5c-5aa38c2151e7">PT - PII Processing and Transparency</a></li> <li><a data-control-id="1d0ff39c-a0ed-408e-8251-fbcd24dc74eb">RA - Risk Assessment</a></li> <li><a data-control-id="d1d6d136-ad89-4ab2-9207-6bec08ef6299">SA - System and Services Acquisition</a></li> <li><a data-control-id="2067a45e-da04-471b-95ad-d0882d74ccaf">SC - System and Communications Protection</a></li> <li><a data-control-id="1d78556b-00f2-47e7-992a-9d8fb08bda2a">SI - System and Information Integrity</a></li> <li><a data-control-id="6a7ab58f-e8ef-4264-aad0-29c656a03c59">SR - Supply Chain Risk Management</a></li> </ul> </div> <div class="form-inline controls-type"> <label class="radio-label">Match ANY: <input name="controlsMatch-lg" checked="checked" id="controlsMatch-any-lg" name="Form.ControlsMatch" type="radio" value="ANY"/></label> <label class="radio-label">Match ALL: <input name="controlsMatch-lg" id="controlsMatch-all-lg" name="Form.ControlsMatch" type="radio" value="ALL"/></label> </div> </div> <div style="display: none;" data-form-error-pane="true" class="text-danger"> <strong class="text-danger">Please fix the following:</strong> <ul data-form-error-list="true"> </ul> <div class="validation-summary-valid" data-valmsg-summary="true"><ul><li style="display:none"></li> </ul></div> </div> <div class="form-group"> <button type="submit" id="pubs-search-submit-lg" name="submit-btn" data-form-button="submit" class="btn">Search</button> <button type="reset" id="pubs-search-reset-lg" name="reset-btn" data-form-button="reset" class="btn">Reset</button> </div> <span style="display: none;" id="publications-status-info"> <p><strong>Final:</strong> Published documents.</p> <p><strong>Public Draft:</strong> Documents have been posted as Public Drafts, typically with a public comment period.</p> <p> <strong>Withdrawn:</strong> Documents that have been withdrawn, and are no longer current. This includes:<br/> - Final publications that have been withdrawn;<br/> - Public drafts that have been obsoleted by a subsequent draft or final publication;<br/> - Public drafts that have been retired—further development was discontinued. </p> </span> </form> </div> <div class="col-lg-9 col-md-8 col-sm-12 col-xs-12 col-xxs-12"> <h4>Search Results</h4> <form action="/web/20231004155343/https://csrc.nist.gov/publications/search" class="bs-callout bs-callout-success csrc-search-form hidden-lg hidden-md mobile-form" data-csrc-form="true" data-default-query="sortBy-lg=Number+DESC&viewMode-lg=brief&ipp-lg=ALL&status-lg=Draft%2CFinal&series-lg=IR" data-form-ignore-default="sortBy" data-form-name="pubSearchMobile" id="pubs-search-form-sm" method="get"> <div class="form-group"> <label for="keywords-sm">Search</label> <input name="keywords-sm" class="form-control" data-val="true" data-val-length="The field Search must be a string with a maximum length of 255." data-val-length-max="255" id="keywords-sm" name="Form.Keywords" type="text" value=""/> <em class="text-muted">Search publication record data<br/> (not a full text search)</em> </div> <div class="form-group"> <label for="sortBy-sm">Sort By</label> <div class="form-inline"> <select name="sortBy-sm" class="form-control" id="sortBy-sm" name="Form.SortBy"><option value="relevance">Relevance (best match)</option> <option value="releasedate DESC">Release Date (newest first)</option> <option value="releasedate ASC">Release Date (oldest first)</option> <option value="Series ASC">Series (A-Z)</option> <option value="Series DESC">Series (Z-A)</option> <option value="Number ASC">Number (lowest to highest)</option> <option selected="selected" value="Number DESC">Number (highest to lowest)</option> <option value="title asc">Title (A-Z)</option> <option value="title desc">Title (Z-A)</option> </select> </div> </div> <div class="form-group"> <label for="viewMode-sm">Results View</label> <select name="viewMode-sm" class="form-control" id="viewMode-sm" name="Form.ResultsViewMode"><option selected="selected" value="brief">Brief</option> <option value="summary">Summary</option> </select> </div> <div class="form-group form-inline"> <label for="ipp-sm" class="form-control-half">Items Per Page</label> <select name="ipp-sm" class="form-control" id="ipp-sm" name="Form.ItemsPerPage"><option value="50">50</option> <option value="75">75</option> <option value="100">100</option> <option selected="selected" value="all">All</option> </select> </div> <div class="form-group"> <p class="text-center"> <a href="#" data-form-show-name="advancedSearch" id="advanced-search-link"> Advanced Search <i class="fa fa-caret-down" aria-hidden="true" data-form-show-expanded="true" style="display: none;"></i> <i class="fa fa-caret-up" aria-hidden="true" data-form-show-expanded="false"></i> </a> </p> </div> <div style="display: none;" data-form-show-trigger="advancedSearch" data-form-show="false"> <div class="form-group"> <label for="dateFrom-sm">Date</label> <div class="form-inline form-date-inline"> <div class="input-group date" data-date-picker="true"> <input name="dateFrom-sm" class="form-control" data-control-type="date" data-val="true" data-val-date="The field Date must be a date." data-validation="true" data-validation-compare-field="dateTo-sm" data-validation-message="From date must be less than To date" data-validation-type="less-than-date" id="dateFrom-sm" name="Form.DateFrom" placeholder=" / / " type="text" value=""/> <span class="input-group-addon"> <span class="fa fa-calendar"> </span> </span> </div> <div class="input-group date" data-date-picker="true"> <input name="dateTo-sm" class="form-control" data-control-type="date" data-val="true" data-val-date="The field DateTo must be a date." id="dateTo-sm" name="Form.DateTo" placeholder=" / / " type="text" value=""/> <span class="input-group-addon"> <span class="fa fa-calendar"> </span> </span> </div> </div> </div> <div class="form-group"> <label for="status-all-sm"> Status <i class="fa fa-info-circle" aria-hidden="true" data-placement="right" data-html="true" data-tooltip-toggle="tooltipWithFunction" data-title-container="publications-status-info-sm"></i> </label> <div class="form-inline status-type" style="margin-left: 1rem;"> <label class="meta-label"> <input type="checkbox" id="status-final-sm" name="status-sm" value="Final" data-default-checked="True" checked="'checked'"/> Final<br/> </label> <label class="meta-label"> <input type="checkbox" id="status-draft-sm" name="status-sm" value="Draft" data-default-checked="True" checked="'checked'"/> Public Draft<br/> </label> <label class="meta-label"> <input type="checkbox" id="status-withdrawn-sm" name="status-sm" value="Withdrawn" data-default-checked="True"/> Withdrawn<br/> </label> </div> </div> <div class="form-group"> <label for="pub-search-series"> Series <button type="button" id="series-all-sm" class="btn btn-sm btn-success" data-check-all="series-sm">Check All</button> <button type="button" id="series-clear-sm" class="btn btn-sm btn-success" data-check-none="series-sm">Clear</button> </label> <div class="form-inline series-type" style="margin-left: 1rem;"> <label class="meta-label"> <input type="checkbox" id="series-b2b6ef80-0dec-4d48-ae2d-a37ab486a846-sm" name="series-sm" value="FIPS" data-default-checked="True"/> FIPS<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-749c7275-15f5-4eec-8cb9-3b6f1528756c-sm" name="series-sm" value="SP" data-default-checked="True"/> SP<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-344a35c7-520e-4845-88b0-6997147ffc76-sm" name="series-sm" value="IR" data-default-checked="True" checked="'checked'/"> IR<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-5f83968e-4758-479d-9aa4-1d42166b7deb-sm" name="series-sm" value="CSWP" data-default-checked="True"/> CSWP<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-b2004197-4249-454a-bdce-edc6186b5c60-sm" name="series-sm" value="TN" data-default-checked="True"/> TN<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-09acb409-e18b-4a05-ac84-631662bcccd9-sm" name="series-sm" value="VTS" data-default-checked="True"/> VTS<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-8022364e-73db-4498-b2eb-9317ce32fff2-sm" name="series-sm" value="AI" data-default-checked="True"/> AI<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-57afe5d0-383f-4fd6-b702-84233dcd5f13-sm" name="series-sm" value="GCR" data-default-checked="True"/> GCR<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-23801152-858e-4dbc-baad-eb51795cf0e2-sm" name="series-sm" value="Project Description" data-default-checked="True"/> Project Description<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-8c9f1828-ae8a-4f03-8d9f-9ff7192b508e-sm" name="series-sm" value="ITL Bulletin" data-default-checked="True"/> ITL Bulletin<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-debd6afb-aeaa-4790-a32b-c977c9654df0-sm" name="series-sm" value="Journal Article" data-default-checked="True"/> Journal Article<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-ed478237-d49d-41c6-91ed-5dd341bd50c8-sm" name="series-sm" value="Conference Paper" data-default-checked="True"/> Conference Paper<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-f2273ac7-d756-4cce-b006-a527778c84f0-sm" name="series-sm" value="Book" data-default-checked="True"/> Book<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-80e369a4-bea5-46f5-8082-91f19c3eeefa-sm" name="series-sm" value="Book Section" data-default-checked="True"/> Book Section<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-b1570e28-332c-4f29-a1e0-cd31c3930848-sm" name="series-sm" value="Other" data-default-checked="True"/> Other<br/> </label> </div> </div> <div class="form-group"> <label for="pub-search-topics-sm"> Topics </label> <input name="topics-sm" id="topics-sm" name="Form.Topics" type="hidden" value=""/> <div class="form-control topics-selection" id="pub-search-topics-sm" contenteditable="true" data-drop-target="pub-search-topics-drop-sm" data-field-name="topics-sm" aria-haspopup="true" aria-expanded="false"> </div> <div class="topics-selection-dropdown desktop" id="pub-search-topics-drop-sm" style="display: none;" data-topics-selector=""><div class="col-sm-4"><strong>Security and Privacy</strong><br/> <ul><li><i class="fa fa-plus fa-fw" id="topics-expander-pstds-24670-27481" data-expander-for="/topics/security-and-privacy/cryptography"></i> <a data-topic-id="27481" data-topic-text="cryptography">cryptography</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27647" data-topic-text="digital signatures">digital signatures</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27648" data-topic-text="encryption">encryption</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27649" data-topic-text="key management">key management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="30027" data-topic-text="lightweight cryptography">lightweight cryptography</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27650" data-topic-text="message authentication">message authentication</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27651" data-topic-text="post-quantum cryptography">post-quantum cryptography</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27652" data-topic-text="random number generation">random number generation</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27653" data-topic-text="secure hashing">secure hashing</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27482" data-topic-text="cybersecurity supply chain risk management">cybersecurity supply chain risk management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27483" data-topic-text="general security & privacy">general security & privacy</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstds-24670-27484" data-expander-for="/topics/security-and-privacy/identity-and-access-management"></i> <a data-topic-id="27484" data-topic-text="identity & access management">identity & access management</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27663" data-topic-text="access authorization">access authorization</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27664" data-topic-text="access control">access control</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27665" data-topic-text="authentication">authentication</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27666" data-topic-text="Personal Identity Verification">Personal Identity Verification</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27667" data-topic-text="public key infrastructure">public key infrastructure</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstds-24670-27485" data-expander-for="/topics/security-and-privacy/privacy"></i> <a data-topic-id="27485" data-topic-text="privacy">privacy</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27680" data-topic-text="personally identifiable information">personally identifiable information</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27681" data-topic-text="privacy engineering">privacy engineering</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstds-24670-27486" data-expander-for="/topics/security-and-privacy/risk-management"></i> <a data-topic-id="27486" data-topic-text="risk management">risk management</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27682" data-topic-text="categorization">categorization</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27683" data-topic-text="continuous monitoring">continuous monitoring</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstds-27486-27684" data-expander-for="/topics/security-and-privacy/risk-management/controls"></i> <a data-topic-id="27684" data-topic-text="controls">controls</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27767" data-topic-text="controls assessment">controls assessment</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27768" data-topic-text="privacy controls">privacy controls</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27769" data-topic-text="security controls">security controls</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27685" data-topic-text="risk assessment">risk assessment</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27686" data-topic-text="roots of trust">roots of trust</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27687" data-topic-text="system authorization">system authorization</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstds-27486-27688" data-expander-for="/topics/security-and-privacy/risk-management/threats"></i> <a data-topic-id="27688" data-topic-text="threats">threats</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27770" data-topic-text="advanced persistent threats">advanced persistent threats</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27771" data-topic-text="botnets">botnets</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27772" data-topic-text="information sharing">information sharing</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27773" data-topic-text="intrusion detection & prevention">intrusion detection & prevention</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27774" data-topic-text="malware">malware</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27689" data-topic-text="vulnerability management">vulnerability management</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstds-24670-27487" data-expander-for="/topics/security-and-privacy/security-and-behavior"></i> <a data-topic-id="27487" data-topic-text="security & behavior">security & behavior</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27709" data-topic-text="accessibility">accessibility</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27710" data-topic-text="behavior">behavior</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27711" data-topic-text="usability">usability</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstds-24670-27488" data-expander-for="/topics/security-and-privacy/security-measurement"></i> <a data-topic-id="27488" data-topic-text="security measurement">security measurement</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27690" data-topic-text="analytics">analytics</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27691" data-topic-text="assurance">assurance</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27692" data-topic-text="modeling">modeling</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27693" data-topic-text="testing & validation">testing & validation</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstds-24670-27489" data-expander-for="/topics/security-and-privacy/security-programs-and-operations"></i> <a data-topic-id="27489" data-topic-text="security programs & operations">security programs & operations</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27694" data-topic-text="acquisition">acquisition</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27695" data-topic-text="asset management">asset management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27696" data-topic-text="audit & accountability">audit & accountability</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27697" data-topic-text="awareness training & education">awareness training & education</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27698" data-topic-text="configuration management">configuration management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27699" data-topic-text="contingency planning">contingency planning</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27700" data-topic-text="incident response">incident response</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27701" data-topic-text="maintenance">maintenance</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27702" data-topic-text="media protection">media protection</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27703" data-topic-text="patch management">patch management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27704" data-topic-text="personnel security">personnel security</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27705" data-topic-text="physical & environmental protection">physical & environmental protection</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27706" data-topic-text="planning">planning</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27707" data-topic-text="program management">program management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27708" data-topic-text="security automation">security automation</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstds-24670-27490" data-expander-for="/topics/security-and-privacy/systems-security-engineering"></i> <a data-topic-id="27490" data-topic-text="systems security engineering">systems security engineering</a><ul style="display: none;"><li><i class="fa fa-plus fa-fw" id="topics-expander-pstds-27490-27713" data-expander-for="/topics/security-and-privacy/systems-security-engineering/trustworthiness"></i> <a data-topic-id="27713" data-topic-text="trustworthiness">trustworthiness</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27775" data-topic-text="reliability">reliability</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27776" data-topic-text="resilience">resilience</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27777" data-topic-text="safety">safety</a></li></ul> </li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="28469" data-topic-text="zero trust">zero trust</a></li></ul><strong>Technologies</strong><br/> <ul><li><i class="fa fa-fw"></i> <a data-topic-id="27491" data-topic-text="artificial intelligence">artificial intelligence</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27492" data-topic-text="big data">big data</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27493" data-topic-text="biometrics">biometrics</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27494" data-topic-text="blockchain">blockchain</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27495" data-topic-text="cloud & virtualization">cloud & virtualization</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27496" data-topic-text="combinatorial testing">combinatorial testing</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27497" data-topic-text="complexity">complexity</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstds-24671-27499" data-expander-for="/topics/technologies/hardware"></i> <a data-topic-id="27499" data-topic-text="hardware">hardware</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27714" data-topic-text="circuits">circuits</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27715" data-topic-text="personal computers">personal computers</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27716" data-topic-text="sensors">sensors</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27498" data-topic-text="mobile">mobile</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstds-24671-27500" data-expander-for="/topics/technologies/networks"></i> <a data-topic-id="27500" data-topic-text="networks">networks</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27717" data-topic-text="email">email</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27718" data-topic-text="firewalls">firewalls</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27719" data-topic-text="internet">internet</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27501" data-topic-text="quantum information science">quantum information science</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27502" data-topic-text="servers">servers</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27503" data-topic-text="smart cards">smart cards</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstds-24671-27504" data-expander-for="/topics/technologies/software-firmware"></i> <a data-topic-id="27504" data-topic-text="software & firmware">software & firmware</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27720" data-topic-text="BIOS">BIOS</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27721" data-topic-text="databases">databases</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27722" data-topic-text="operating systems">operating systems</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27505" data-topic-text="storage">storage</a></li></ul></div><div class="col-sm-4"><strong>Applications</strong><br/> <ul><li><i class="fa fa-fw"></i> <a data-topic-id="27456" data-topic-text="communications & wireless">communications & wireless</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27457" data-topic-text="cyber-physical systems">cyber-physical systems</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27458" data-topic-text="cybersecurity education">cybersecurity education</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27459" data-topic-text="cybersecurity framework">cybersecurity framework</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27460" data-topic-text="cybersecurity workforce">cybersecurity workforce</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27461" data-topic-text="enterprise">enterprise</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27462" data-topic-text="forensics">forensics</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27463" data-topic-text="industrial control systems">industrial control systems</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27464" data-topic-text="Internet of Things">Internet of Things</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="29979" data-topic-text="mathematics">mathematics</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27920" data-topic-text="positioning navigation & timing">positioning navigation & timing</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27465" data-topic-text="small & medium business">small & medium business</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27466" data-topic-text="telework">telework</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27467" data-topic-text="voting">voting</a></li></ul><strong>Laws and Regulations</strong><br/> <ul><li><i class="fa fa-plus fa-fw" id="topics-expander-pstds-24673-27468" data-expander-for="/topics/laws-and-regulations/executive-documents"></i> <a data-topic-id="27468" data-topic-text="executive documents">executive documents</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27668" data-topic-text="Comprehensive National Cybersecurity Initiative">Comprehensive National Cybersecurity Initiative</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27669" data-topic-text="Cybersecurity Strategy and Implementation Plan">Cybersecurity Strategy and Implementation Plan</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27670" data-topic-text="Cyberspace Policy Review">Cyberspace Policy Review</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27671" data-topic-text="Executive Order 13636">Executive Order 13636</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27672" data-topic-text="Executive Order 13702">Executive Order 13702</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27673" data-topic-text="Executive Order 13718">Executive Order 13718</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27674" data-topic-text="Executive Order 13800">Executive Order 13800</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27921" data-topic-text="Executive Order 13905">Executive Order 13905</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="28468" data-topic-text="Executive Order 14028">Executive Order 14028</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27675" data-topic-text="Federal Cybersecurity Research and Development Strategic Plan">Federal Cybersecurity Research and Development Strategic Plan</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27676" data-topic-text="Homeland Security Presidential Directive 7">Homeland Security Presidential Directive 7</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27677" data-topic-text="Homeland Security Presidential Directive 12">Homeland Security Presidential Directive 12</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27678" data-topic-text="OMB Circular A-11">OMB Circular A-11</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27679" data-topic-text="OMB Circular A-130">OMB Circular A-130</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstds-24673-27469" data-expander-for="/topics/laws-and-regulations/laws"></i> <a data-topic-id="27469" data-topic-text="laws">laws</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="35985" data-topic-text="CHIPS and Science Act">CHIPS and Science Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27654" data-topic-text="Cyber Security R&D Act">Cyber Security R&D; Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27655" data-topic-text="Cybersecurity Enhancement Act">Cybersecurity Enhancement Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27656" data-topic-text="E-Government Act">E-Government Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27657" data-topic-text="Energy Independence and Security Act">Energy Independence and Security Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27658" data-topic-text="Federal Information Security Modernization Act">Federal Information Security Modernization Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27659" data-topic-text="First Responder Network Authority">First Responder Network Authority</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27660" data-topic-text="Health Insurance Portability and Accountability Act">Health Insurance Portability and Accountability Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27661" data-topic-text="Help America Vote Act">Help America Vote Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="28580" data-topic-text="Internet of Things Cybersecurity Improvement Act">Internet of Things Cybersecurity Improvement Act</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstds-24673-27470" data-expander-for="/topics/laws-and-regulations/regulations"></i> <a data-topic-id="27470" data-topic-text="regulations">regulations</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27662" data-topic-text="Federal Acquisition Regulation">Federal Acquisition Regulation</a></li></ul> </li></ul></div><div class="col-sm-4"><strong>Activities and Products</strong><br/> <ul><li><i class="fa fa-fw"></i> <a data-topic-id="27452" data-topic-text="annual reports">annual reports</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27453" data-topic-text="conferences & workshops">conferences & workshops</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="30210" data-topic-text="groups">groups</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27454" data-topic-text="reference materials">reference materials</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27455" data-topic-text="standards development">standards development</a></li></ul><strong>Sectors</strong><br/> <ul><li><i class="fa fa-fw"></i> <a data-topic-id="27471" data-topic-text="aerospace">aerospace</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-pstds-24675-27472" data-expander-for="/topics/sectors/energy"></i> <a data-topic-id="27472" data-topic-text="energy">energy</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27712" data-topic-text="smart grid">smart grid</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27473" data-topic-text="financial services">financial services</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27474" data-topic-text="healthcare">healthcare</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27475" data-topic-text="hospitality">hospitality</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27476" data-topic-text="manufacturing">manufacturing</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27477" data-topic-text="public safety">public safety</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27478" data-topic-text="retail">retail</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27479" data-topic-text="telecommunications">telecommunications</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27480" data-topic-text="transportation">transportation</a></li></ul></div></div> <div class="form-inline topics-type"> <label class="radio-label">Match ANY: <input name="topicsMatch-sm" checked="checked" id="topicsMatch-any-sm" name="Form.TopicsMatch" type="radio" value="ANY"/></label> <label class="radio-label">Match ALL: <input name="topicsMatch-sm" id="topicsMatch-all-sm" name="Form.TopicsMatch" type="radio" value="ALL"/></label> </div> </div> <div class="form-group"> <label for="pub-search-controls-sm"> Control Family (800-53) </label> <input name="controls-sm" id="controls-sm" name="Form.Controls" type="hidden" value=""/> <div class="form-control controls-selection" id="pub-search-controls-sm" contenteditable="true" data-drop-target="pub-search-controls-drop-sm" data-field-name="controls-sm" aria-haspopup="true" aria-expanded="false"> </div> <div class="controls-selection-dropdown desktop" id="pub-search-controls-drop-sm" style="display: none;" data-controls-selector=""> <strong>Control Families</strong> <ul> <li><a data-control-id="2049a555-9a3e-4395-88bc-8304c6d9b157">AC - Access Control</a></li> <li><a data-control-id="bb24a9c9-944e-41fc-b6a9-7c4217e054df">AT - Awareness and Training</a></li> <li><a data-control-id="b491696a-7f6b-4b1e-9145-b02938d9c279">AU - Audit and Accountability</a></li> <li><a data-control-id="27484ffc-ac08-40b0-8862-4be4154560e4">CA - Assessment, Authorization and Monitoring</a></li> <li><a data-control-id="b8b9a292-32ad-4698-abad-45c70b40757d">CM - Configuration Management</a></li> <li><a data-control-id="5604c7e8-b158-48c6-a497-c5357a43e7c2">CP - Contingency Planning</a></li> <li><a data-control-id="2b79dd04-6118-44ee-b54d-854948a5b55f">IA - Identification and Authentication</a></li> <li><a data-control-id="b6c1c9c0-3cf8-46c9-b2ae-4cd608f88b11">IR - Incident Response</a></li> <li><a data-control-id="c8219b58-a95d-4882-8e74-0c19369aceb6">MA - Maintenance</a></li> <li><a data-control-id="84b5d6fa-8fbc-4d32-b559-47a626a510b3">MP - Media Protection</a></li> <li><a data-control-id="f3703fe4-b51d-4139-98eb-1656b00fc4ed">PE - Physical and Environmental Protection</a></li> <li><a data-control-id="137c4d9f-6541-4431-bb88-d0d003ce039f">PL - Planning</a></li> <li><a data-control-id="6401481d-3689-49bb-840c-73256cfb102e">PM - Program Management</a></li> <li><a data-control-id="408d8a82-1783-414d-a303-d79525c87f6a">PS - Personnel Security</a></li> <li><a data-control-id="9f34a4cb-3ba3-49e1-8c5c-5aa38c2151e7">PT - PII Processing and Transparency</a></li> <li><a data-control-id="1d0ff39c-a0ed-408e-8251-fbcd24dc74eb">RA - Risk Assessment</a></li> <li><a data-control-id="d1d6d136-ad89-4ab2-9207-6bec08ef6299">SA - System and Services Acquisition</a></li> <li><a data-control-id="2067a45e-da04-471b-95ad-d0882d74ccaf">SC - System and Communications Protection</a></li> <li><a data-control-id="1d78556b-00f2-47e7-992a-9d8fb08bda2a">SI - System and Information Integrity</a></li> <li><a data-control-id="6a7ab58f-e8ef-4264-aad0-29c656a03c59">SR - Supply Chain Risk Management</a></li> </ul> </div> <div class="form-inline controls-type"> <label class="radio-label">Match ANY: <input name="controlsMatch-sm" checked="checked" id="controlsMatch-any-sm" name="Form.ControlsMatch" type="radio" value="ANY"/></label> <label class="radio-label">Match ALL: <input name="controlsMatch-sm" id="controlsMatch-all-sm" name="Form.ControlsMatch" type="radio" value="ALL"/></label> </div> </div> </div> <div style="display: none;" data-form-error-pane="true" class="text-danger"> <strong class="text-danger">Please fix the following:</strong> <ul data-form-error-list="true"> </ul> <div class="validation-summary-valid" data-valmsg-summary="true"><ul><li style="display:none"></li> </ul></div> </div> <div class="form-group"> <button type="submit" id="pubs-search-submit-sm" name="submit-btn" data-form-button="submit" class="btn">Search</button> <button type="reset" id="pubs-search-reset-sm" name="reset-btn" data-form-button="reset" class="btn">Reset</button> </div> <span style="display: none;" id="publications-status-info-sm"> <p><strong>Final:</strong> Published documents.</p> <p><strong>Public Draft:</strong> Documents have been posted as Public Drafts, typically with a public comment period.</p> <p> <strong>Withdrawn:</strong> Documents that have been withdrawn, and are no longer current. This includes:<br/> - Final publications that have been withdrawn;<br/> - Public drafts that have been obsoleted by a subsequent draft or final publication;<br/> - Public drafts that have been retired—further development was discontinued. </p> </span> </form> <div id="search-criteria-container" data-target-form="pubSearchDesktop"></div> <div class="row top-pagination-area"> <div class="col-md-6 col-sm-12"> <span id="showing-results-text" data-total-pages="1" data-first-record="1" data-last-record="297" data-current-page="1" data-items-per-page="0" data-total-results="297">Showing <strong id="showing-results-total">297</strong> matching records.</span> </div> <div class="col-md-6 col-sm-12"> <span class="pull-right hidden-sm hidden-xs hidden-xxs"> <span class="pagination-links" id="top-pagination-container" data-total-pages="0" data-min-page="1" data-max-page="0" data-current-page="1" data-show-first="False" data-show-last="True"></span> </span> <p class="text-center hidden-md hidden-lg"> <span class="pagination-links" id="mobile-top-pagination-container" data-total-pages="0" data-min-page="1" data-max-page="0" data-current-page="1" data-show-first="False" data-show-last="True"></span> </p> </div> </div> <table class="table table-striped table-condensed publications-table table-bordered" id="publications-results-table" data-total-records="297" data-page="1" data-first-record="1" data-last-record="297" data-ipp="0"> <thead> <tr> <th nowrap class="hidden-sm hidden-xs hidden-xxs">Series</th> <th nowrap class="hidden-sm hidden-xs hidden-xxs">Number</th> <th nowrap> <span class="hidden-sm hidden-xs hidden-xxs">Title</span> <span class="hidden-md hidden-lg">Publications</span> </th> <th nowrap class="hidden-sm hidden-xs hidden-xxs">Status</th> <th nowrap class="hidden-sm hidden-xs hidden-xxs">Release Date</th> </tr> </thead> <tbody> <tr id="result-1"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-1">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-1">8481</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8481/ipd" id="pub-title-link-1">Cybersecurity for Research: Findings and Possible Paths Forward</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-1">IR 8481 (Initial Public Draft)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8481/ipd" class="mobile-pub-title" id="pub-title-link-sm-1">Cybersecurity for Research: Findings and Possible Paths Forward</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-1">8/31/2023</strong> <br/> Status: <span id="pub-status-sm-1">Draft</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-1"> Draft </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-1"> 8/31/2023 </td> </tr> <tr id="result-2"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-2">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-2">8477</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8477/ipd" id="pub-title-link-2">Mapping Relationships Between Documentary Standards, Regulations, Frameworks, and Guidelines: Developing Cybersecurity and Privacy Concept Mappings</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-2">IR 8477 (Initial Public Draft)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8477/ipd" class="mobile-pub-title" id="pub-title-link-sm-2">Mapping Relationships Between Documentary Standards, Regulations, Frameworks, and Guidelines: Developing Cybersecurity and Privacy Concept Mappings</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-2">8/17/2023</strong> <br/> Status: <span id="pub-status-sm-2">Draft</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-2"> Draft </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-2"> 8/17/2023 </td> </tr> <tr id="result-3"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-3">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-3">8476</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8476/final" id="pub-title-link-3">3rd High-Performance Computing Security Workshop: Joint NIST-NSF Workshop Report </a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-3">IR 8476 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8476/final" class="mobile-pub-title" id="pub-title-link-sm-3">3rd High-Performance Computing Security Workshop: Joint NIST-NSF Workshop Report </a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-3">9/26/2023</strong> <br/> Status: <span id="pub-status-sm-3">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-3"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-3"> 9/26/2023 </td> </tr> <tr id="result-4"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-4">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-4">8473</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8473/ipd" id="pub-title-link-4">Cybersecurity Framework Profile for Electric Vehicle Extreme Fast Charging Infrastructure</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-4">IR 8473 (Initial Public Draft)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8473/ipd" class="mobile-pub-title" id="pub-title-link-sm-4">Cybersecurity Framework Profile for Electric Vehicle Extreme Fast Charging Infrastructure</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-4">7/14/2023</strong> <br/> Status: <span id="pub-status-sm-4">Draft</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-4"> Draft </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-4"> 7/14/2023 </td> </tr> <tr id="result-5"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-5">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-5">8472</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8472/ipd" id="pub-title-link-5">Non-Fungible Token Security</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-5">IR 8472 (Initial Public Draft)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8472/ipd" class="mobile-pub-title" id="pub-title-link-sm-5">Non-Fungible Token Security</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-5">8/31/2023</strong> <br/> Status: <span id="pub-status-sm-5">Draft</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-5"> Draft </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-5"> 8/31/2023 </td> </tr> <tr id="result-6"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-6">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-6">8467</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8467/ipd" id="pub-title-link-6">Cybersecurity Framework Profile for Genomic Data</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-6">IR 8467 (Initial Public Draft)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8467/ipd" class="mobile-pub-title" id="pub-title-link-sm-6">Cybersecurity Framework Profile for Genomic Data</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-6">6/15/2023</strong> <br/> Status: <span id="pub-status-sm-6">Draft</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-6"> Draft </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-6"> 6/15/2023 </td> </tr> <tr id="result-7"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-7">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-7">8460</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8460/ipd" id="pub-title-link-7">State Machine Replication and Consensus with Byzantine Adversaries</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-7">IR 8460 (Initial Public Draft)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8460/ipd" class="mobile-pub-title" id="pub-title-link-sm-7">State Machine Replication and Consensus with Byzantine Adversaries</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-7">4/26/2023</strong> <br/> Status: <span id="pub-status-sm-7">Draft</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-7"> Draft </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-7"> 4/26/2023 </td> </tr> <tr id="result-8"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-8">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-8">8459</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8459/ipd" id="pub-title-link-8">Report on the Block Cipher Modes of Operation in the NIST SP 800-38 Series</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-8">IR 8459 (Initial Public Draft)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8459/ipd" class="mobile-pub-title" id="pub-title-link-sm-8">Report on the Block Cipher Modes of Operation in the NIST SP 800-38 Series</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-8">3/21/2023</strong> <br/> Status: <span id="pub-status-sm-8">Draft</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-8"> Draft </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-8"> 3/21/2023 </td> </tr> <tr id="result-9"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-9">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-9">8454</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8454/final" id="pub-title-link-9">Status Report on the Final Round of the NIST Lightweight Cryptography Standardization Process</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-9">IR 8454 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8454/final" class="mobile-pub-title" id="pub-title-link-sm-9">Status Report on the Final Round of the NIST Lightweight Cryptography Standardization Process</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-9">6/16/2023</strong> <br/> Status: <span id="pub-status-sm-9">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-9"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-9"> 6/16/2023 </td> </tr> <tr id="result-10"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-10">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-10">8450</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8450/final" id="pub-title-link-10">Overview and Considerations of Access Control Based on Attribute Encryption</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-10">IR 8450 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8450/final" class="mobile-pub-title" id="pub-title-link-sm-10">Overview and Considerations of Access Control Based on Attribute Encryption</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-10">9/06/2023</strong> <br/> Status: <span id="pub-status-sm-10">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-10"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-10"> 9/06/2023 </td> </tr> <tr id="result-11"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-11">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-11">8441</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8441/final" id="pub-title-link-11">Cybersecurity Framework Profile for Hybrid Satellite Networks (HSN)</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-11">IR 8441 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8441/final" class="mobile-pub-title" id="pub-title-link-sm-11">Cybersecurity Framework Profile for Hybrid Satellite Networks (HSN)</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-11">9/25/2023</strong> <br/> Status: <span id="pub-status-sm-11">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-11"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-11"> 9/25/2023 </td> </tr> <tr id="result-12"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-12">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-12">8432</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8432/ipd" id="pub-title-link-12">Cybersecurity of Genomic Data</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-12">IR 8432 (Initial Public Draft)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8432/ipd" class="mobile-pub-title" id="pub-title-link-sm-12">Cybersecurity of Genomic Data</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-12">3/03/2023</strong> <br/> Status: <span id="pub-status-sm-12">Draft</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-12"> Draft </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-12"> 3/03/2023 </td> </tr> <tr id="result-13"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-13">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-13">8431</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8431/final" id="pub-title-link-13">Workshop Summary Report for “Building on the NIST Foundations: Next Steps in IoT Cybersecurity”</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-13">IR 8431 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8431/final" class="mobile-pub-title" id="pub-title-link-sm-13">Workshop Summary Report for “Building on the NIST Foundations: Next Steps in IoT Cybersecurity”</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-13">9/20/2022</strong> <br/> Status: <span id="pub-status-sm-13">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-13"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-13"> 9/20/2022 </td> </tr> <tr id="result-14"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-14">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-14">8427</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8427/final" id="pub-title-link-14">Discussion on the Full Entropy Assumption of the SP 800-90 Series</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-14">IR 8427 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8427/final" class="mobile-pub-title" id="pub-title-link-sm-14">Discussion on the Full Entropy Assumption of the SP 800-90 Series</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-14">4/14/2023</strong> <br/> Status: <span id="pub-status-sm-14">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-14"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-14"> 4/14/2023 </td> </tr> <tr id="result-15"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-15">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-15">8425</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8425/final" id="pub-title-link-15">Profile of the IoT Core Baseline for Consumer IoT Products</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-15">IR 8425 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8425/final" class="mobile-pub-title" id="pub-title-link-sm-15">Profile of the IoT Core Baseline for Consumer IoT Products</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-15">9/20/2022</strong> <br/> Status: <span id="pub-status-sm-15">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-15"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-15"> 9/20/2022 </td> </tr> <tr id="result-16"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-16">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-16">8419</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8419/final" id="pub-title-link-16">Blockchain and Related Technologies to Support Manufacturing Supply Chain Traceability: Needs and Industry Perspectives</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-16">IR 8419 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8419/final" class="mobile-pub-title" id="pub-title-link-sm-16">Blockchain and Related Technologies to Support Manufacturing Supply Chain Traceability: Needs and Industry Perspectives</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-16">4/07/2022</strong> <br/> Status: <span id="pub-status-sm-16">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-16"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-16"> 4/07/2022 </td> </tr> <tr id="result-17"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-17">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-17">8413</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8413/upd1/final" id="pub-title-link-17">Status Report on the Third Round of the NIST Post-Quantum Cryptography Standardization Process</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-17">IR 8413 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8413/upd1/final" class="mobile-pub-title" id="pub-title-link-sm-17">Status Report on the Third Round of the NIST Post-Quantum Cryptography Standardization Process</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-17">9/29/2022</strong> <br/> Status: <span id="pub-status-sm-17">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-17"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-17"> 9/29/2022 </td> </tr> <tr id="result-18"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-18">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-18">8409</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8409/final" id="pub-title-link-18">Measuring the Common Vulnerability Scoring System Base Score Equation</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-18">IR 8409 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8409/final" class="mobile-pub-title" id="pub-title-link-sm-18">Measuring the Common Vulnerability Scoring System Base Score Equation</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-18">11/15/2022</strong> <br/> Status: <span id="pub-status-sm-18">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-18"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-18"> 11/15/2022 </td> </tr> <tr id="result-19"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-19">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-19">8408</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8408/final" id="pub-title-link-19">Understanding Stablecoin Technology and Related Security Considerations</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-19">IR 8408 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8408/final" class="mobile-pub-title" id="pub-title-link-sm-19">Understanding Stablecoin Technology and Related Security Considerations</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-19">9/05/2023</strong> <br/> Status: <span id="pub-status-sm-19">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-19"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-19"> 9/05/2023 </td> </tr> <tr id="result-20"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-20">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-20">8406</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8406/final" id="pub-title-link-20">Cybersecurity Framework Profile for Liquefied Natural Gas</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-20">IR 8406 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8406/final" class="mobile-pub-title" id="pub-title-link-sm-20">Cybersecurity Framework Profile for Liquefied Natural Gas</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-20">6/08/2023</strong> <br/> Status: <span id="pub-status-sm-20">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-20"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-20"> 6/08/2023 </td> </tr> <tr id="result-21"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-21">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-21">8403</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8403/final" id="pub-title-link-21">Blockchain for Access Control Systems</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-21">IR 8403 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8403/final" class="mobile-pub-title" id="pub-title-link-sm-21">Blockchain for Access Control Systems</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-21">5/26/2022</strong> <br/> Status: <span id="pub-status-sm-21">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-21"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-21"> 5/26/2022 </td> </tr> <tr id="result-22"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-22">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-22">8401</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8401/final" id="pub-title-link-22">Satellite Ground Segment: Applying the Cybersecurity Framework to Satellite Command and Control</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-22">IR 8401 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8401/final" class="mobile-pub-title" id="pub-title-link-sm-22">Satellite Ground Segment: Applying the Cybersecurity Framework to Satellite Command and Control</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-22">12/30/2022</strong> <br/> Status: <span id="pub-status-sm-22">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-22"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-22"> 12/30/2022 </td> </tr> <tr id="result-23"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-23">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-23">8397</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8397/final" id="pub-title-link-23">Guidelines on Minimum Standards for Developer Verification of Software</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-23">IR 8397 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8397/final" class="mobile-pub-title" id="pub-title-link-sm-23">Guidelines on Minimum Standards for Developer Verification of Software</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-23">10/06/2021</strong> <br/> Status: <span id="pub-status-sm-23">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-23"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-23"> 10/06/2021 </td> </tr> <tr id="result-24"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-24">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-24">8379</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8379/final" id="pub-title-link-24">Summary Report for the Virtual Workshop Addressing Public Comment on NIST Cybersecurity for IoT Guidance</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-24">IR 8379 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8379/final" class="mobile-pub-title" id="pub-title-link-sm-24">Summary Report for the Virtual Workshop Addressing Public Comment on NIST Cybersecurity for IoT Guidance</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-24">9/09/2021</strong> <br/> Status: <span id="pub-status-sm-24">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-24"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-24"> 9/09/2021 </td> </tr> <tr id="result-25"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-25">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-25">8374</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8374/final" id="pub-title-link-25">Ransomware Risk Management: A Cybersecurity Framework Profile</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-25">IR 8374 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8374/final" class="mobile-pub-title" id="pub-title-link-sm-25">Ransomware Risk Management: A Cybersecurity Framework Profile</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-25">2/23/2022</strong> <br/> Status: <span id="pub-status-sm-25">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-25"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-25"> 2/23/2022 </td> </tr> <tr id="result-26"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-26">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-26">8369</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8369/final" id="pub-title-link-26">Status Report on the Second Round of the NIST Lightweight Cryptography Standardization Process</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-26">IR 8369 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8369/final" class="mobile-pub-title" id="pub-title-link-sm-26">Status Report on the Second Round of the NIST Lightweight Cryptography Standardization Process</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-26">7/21/2021</strong> <br/> Status: <span id="pub-status-sm-26">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-26"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-26"> 7/21/2021 </td> </tr> <tr id="result-27"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-27">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-27">8360</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8360/final" id="pub-title-link-27">Machine Learning for Access Control Policy Verification</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-27">IR 8360 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8360/final" class="mobile-pub-title" id="pub-title-link-sm-27">Machine Learning for Access Control Policy Verification</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-27">9/16/2021</strong> <br/> Status: <span id="pub-status-sm-27">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-27"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-27"> 9/16/2021 </td> </tr> <tr id="result-28"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-28">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-28">8355</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8355/final" id="pub-title-link-28">NICE Framework Competency Areas: Preparing a Job-Ready Cybersecurity Workforce</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-28">IR 8355 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8355/final" class="mobile-pub-title" id="pub-title-link-sm-28">NICE Framework Competency Areas: Preparing a Job-Ready Cybersecurity Workforce</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-28">6/21/2023</strong> <br/> Status: <span id="pub-status-sm-28">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-28"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-28"> 6/21/2023 </td> </tr> <tr id="result-29"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-29">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-29">8349</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8349/ipd" id="pub-title-link-29">Methodology for Characterizing Network Behavior of Internet of Things Devices</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-29">IR 8349 (Initial Public Draft)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8349/ipd" class="mobile-pub-title" id="pub-title-link-sm-29">Methodology for Characterizing Network Behavior of Internet of Things Devices</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-29">1/11/2022</strong> <br/> Status: <span id="pub-status-sm-29">Draft</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-29"> Draft </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-29"> 1/11/2022 </td> </tr> <tr id="result-30"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-30">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-30">8347</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8347/final" id="pub-title-link-30">NIST Test Personal Identity Verification (PIV) Cards Version 2</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-30">IR 8347 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8347/final" class="mobile-pub-title" id="pub-title-link-sm-30">NIST Test Personal Identity Verification (PIV) Cards Version 2</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-30">4/02/2021</strong> <br/> Status: <span id="pub-status-sm-30">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-30"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-30"> 4/02/2021 </td> </tr> <tr id="result-31"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-31">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-31">8344</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8344/ipd" id="pub-title-link-31">Ontology for Authentication</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-31">IR 8344 (Initial Public Draft)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8344/ipd" class="mobile-pub-title" id="pub-title-link-sm-31">Ontology for Authentication</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-31">2/08/2021</strong> <br/> Status: <span id="pub-status-sm-31">Draft</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-31"> Draft </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-31"> 2/08/2021 </td> </tr> <tr id="result-32"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-32">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-32">8336</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8336/ipd" id="pub-title-link-32">Background on Identity Federation Technologies for the Public Safety Community</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-32">IR 8336 (Initial Public Draft)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8336/ipd" class="mobile-pub-title" id="pub-title-link-sm-32">Background on Identity Federation Technologies for the Public Safety Community</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-32">6/09/2021</strong> <br/> Status: <span id="pub-status-sm-32">Draft</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-32"> Draft </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-32"> 6/09/2021 </td> </tr> <tr id="result-33"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-33">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-33">8335</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8335/ipd" id="pub-title-link-33">Identity as a Service for Public Safety Organizations</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-33">IR 8335 (Initial Public Draft)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8335/ipd" class="mobile-pub-title" id="pub-title-link-sm-33">Identity as a Service for Public Safety Organizations</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-33">6/16/2021</strong> <br/> Status: <span id="pub-status-sm-33">Draft</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-33"> Draft </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-33"> 6/16/2021 </td> </tr> <tr id="result-34"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-34">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-34">8334</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8334/ipd" id="pub-title-link-34">Using Mobile Device Biometrics for Authenticating First Responders</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-34">IR 8334 (Initial Public Draft)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8334/ipd" class="mobile-pub-title" id="pub-title-link-sm-34">Using Mobile Device Biometrics for Authenticating First Responders</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-34">6/02/2021</strong> <br/> Status: <span id="pub-status-sm-34">Draft</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-34"> Draft </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-34"> 6/02/2021 </td> </tr> <tr id="result-35"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-35">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-35">8333</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8333/final" id="pub-title-link-35">Workshop Summary Report for “Cybersecurity Risks in Consumer Home Internet of Things (IoT) Products” Virtual Workshop</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-35">IR 8333 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8333/final" class="mobile-pub-title" id="pub-title-link-sm-35">Workshop Summary Report for “Cybersecurity Risks in Consumer Home Internet of Things (IoT) Products” Virtual Workshop</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-35">3/29/2021</strong> <br/> Status: <span id="pub-status-sm-35">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-35"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-35"> 3/29/2021 </td> </tr> <tr id="result-36"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-36">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-36">8323 Rev. 1</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8323/r1/final" id="pub-title-link-36">Foundational PNT Profile: Applying the Cybersecurity Framework for the Responsible Use of Positioning, Navigation, and Timing (PNT) Services</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-36">IR 8323 Rev. 1 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8323/r1/final" class="mobile-pub-title" id="pub-title-link-sm-36">Foundational PNT Profile: Applying the Cybersecurity Framework for the Responsible Use of Positioning, Navigation, and Timing (PNT) Services</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-36">1/31/2023</strong> <br/> Status: <span id="pub-status-sm-36">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-36"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-36"> 1/31/2023 </td> </tr> <tr id="result-37"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-37">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-37">8323</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8323/final" id="pub-title-link-37">Foundational PNT Profile: Applying the Cybersecurity Framework for the Responsible Use of Positioning, Navigation, and Timing (PNT) Services</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-37">IR 8323 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8323/final" class="mobile-pub-title" id="pub-title-link-sm-37">Foundational PNT Profile: Applying the Cybersecurity Framework for the Responsible Use of Positioning, Navigation, and Timing (PNT) Services</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-37">2/11/2021</strong> <br/> Status: <span id="pub-status-sm-37">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-37"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-37"> 2/11/2021 </td> </tr> <tr id="result-38"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-38">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-38">8322</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8322/final" id="pub-title-link-38">Workshop Summary Report for “Building the Federal Profile For IoT Device Cybersecurity” Virtual Workshop</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-38">IR 8322 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8322/final" class="mobile-pub-title" id="pub-title-link-sm-38">Workshop Summary Report for “Building the Federal Profile For IoT Device Cybersecurity” Virtual Workshop</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-38">1/07/2021</strong> <br/> Status: <span id="pub-status-sm-38">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-38"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-38"> 1/07/2021 </td> </tr> <tr id="result-39"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-39">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-39">8320D</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8320/d/ipd" id="pub-title-link-39">Hardware-Enabled Security: Hardware-Based Confidential Computing</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-39">IR 8320D (Initial Public Draft)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8320/d/ipd" class="mobile-pub-title" id="pub-title-link-sm-39">Hardware-Enabled Security: Hardware-Based Confidential Computing</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-39">2/23/2023</strong> <br/> Status: <span id="pub-status-sm-39">Draft</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-39"> Draft </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-39"> 2/23/2023 </td> </tr> <tr id="result-40"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-40">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-40">8320C</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8320/c/ipd" id="pub-title-link-40">Hardware-Enabled Security: Machine Identity Management and Protection</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-40">IR 8320C (Initial Public Draft)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8320/c/ipd" class="mobile-pub-title" id="pub-title-link-sm-40">Hardware-Enabled Security: Machine Identity Management and Protection</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-40">4/20/2022</strong> <br/> Status: <span id="pub-status-sm-40">Draft</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-40"> Draft </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-40"> 4/20/2022 </td> </tr> <tr id="result-41"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-41">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-41">8320B</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8320/b/final" id="pub-title-link-41">Hardware-Enabled Security: Policy-Based Governance in Trusted Container Platforms</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-41">IR 8320B (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8320/b/final" class="mobile-pub-title" id="pub-title-link-sm-41">Hardware-Enabled Security: Policy-Based Governance in Trusted Container Platforms</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-41">4/20/2022</strong> <br/> Status: <span id="pub-status-sm-41">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-41"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-41"> 4/20/2022 </td> </tr> <tr id="result-42"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-42">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-42">8320A</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8320/a/final" id="pub-title-link-42">Hardware-Enabled Security: Container Platform Security Prototype</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-42">IR 8320A (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8320/a/final" class="mobile-pub-title" id="pub-title-link-sm-42">Hardware-Enabled Security: Container Platform Security Prototype</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-42">6/17/2021</strong> <br/> Status: <span id="pub-status-sm-42">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-42"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-42"> 6/17/2021 </td> </tr> <tr id="result-43"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-43">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-43">8320</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8320/final" id="pub-title-link-43">Hardware-Enabled Security: Enabling a Layered Approach to Platform Security for Cloud and Edge Computing Use Cases</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-43">IR 8320 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8320/final" class="mobile-pub-title" id="pub-title-link-sm-43">Hardware-Enabled Security: Enabling a Layered Approach to Platform Security for Cloud and Edge Computing Use Cases</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-43">5/04/2022</strong> <br/> Status: <span id="pub-status-sm-43">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-43"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-43"> 5/04/2022 </td> </tr> <tr id="result-44"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-44">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-44">8319</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8319/final" id="pub-title-link-44">Review of the Advanced Encryption Standard</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-44">IR 8319 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8319/final" class="mobile-pub-title" id="pub-title-link-sm-44">Review of the Advanced Encryption Standard</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-44">7/23/2021</strong> <br/> Status: <span id="pub-status-sm-44">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-44"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-44"> 7/23/2021 </td> </tr> <tr id="result-45"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-45">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-45">8310</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8310/ipd" id="pub-title-link-45">Cybersecurity Framework Election Infrastructure Profile</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-45">IR 8310 (Initial Public Draft)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8310/ipd" class="mobile-pub-title" id="pub-title-link-sm-45">Cybersecurity Framework Election Infrastructure Profile</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-45">3/29/2021</strong> <br/> Status: <span id="pub-status-sm-45">Draft</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-45"> Draft </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-45"> 3/29/2021 </td> </tr> <tr id="result-46"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-46">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-46">8309</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8309/final" id="pub-title-link-46">Status Report on the Second Round of the NIST Post-Quantum Cryptography Standardization Process</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-46">IR 8309 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8309/final" class="mobile-pub-title" id="pub-title-link-sm-46">Status Report on the Second Round of the NIST Post-Quantum Cryptography Standardization Process</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-46">7/22/2020</strong> <br/> Status: <span id="pub-status-sm-46">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-46"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-46"> 7/22/2020 </td> </tr> <tr id="result-47"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-47">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-47">8301</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8301/final" id="pub-title-link-47">Blockchain Networks: Token Design and Management Overview</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-47">IR 8301 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8301/final" class="mobile-pub-title" id="pub-title-link-sm-47">Blockchain Networks: Token Design and Management Overview</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-47">2/09/2021</strong> <br/> Status: <span id="pub-status-sm-47">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-47"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-47"> 2/09/2021 </td> </tr> <tr id="result-48"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-48">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-48">8294</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8294/final" id="pub-title-link-48">Symposium on Federally Funded Research on Cybersecurity of Electric Vehicle Supply Equipment (EVSE)</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-48">IR 8294 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8294/final" class="mobile-pub-title" id="pub-title-link-sm-48">Symposium on Federally Funded Research on Cybersecurity of Electric Vehicle Supply Equipment (EVSE)</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-48">4/29/2020</strong> <br/> Status: <span id="pub-status-sm-48">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-48"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-48"> 4/29/2020 </td> </tr> <tr id="result-49"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-49">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-49">8287</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8287/final" id="pub-title-link-49">A Roadmap for Successful Regional Alliances and Multistakeholder Partnerships to Build the Cybersecurity Workforce</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-49">IR 8287 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8287/final" class="mobile-pub-title" id="pub-title-link-sm-49">A Roadmap for Successful Regional Alliances and Multistakeholder Partnerships to Build the Cybersecurity Workforce</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-49">2/20/2020</strong> <br/> Status: <span id="pub-status-sm-49">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-49"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-49"> 2/20/2020 </td> </tr> <tr id="result-50"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-50">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-50">8286D</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8286/d/final" id="pub-title-link-50">Using Business Impact Analysis to Inform Risk Prioritization and Response</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-50">IR 8286D (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8286/d/final" class="mobile-pub-title" id="pub-title-link-sm-50">Using Business Impact Analysis to Inform Risk Prioritization and Response</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-50">11/17/2022</strong> <br/> Status: <span id="pub-status-sm-50">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-50"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-50"> 11/17/2022 </td> </tr> <tr id="result-51"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-51">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-51">8286C</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8286/c/final" id="pub-title-link-51">Staging Cybersecurity Risks for Enterprise Risk Management and Governance Oversight</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-51">IR 8286C (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8286/c/final" class="mobile-pub-title" id="pub-title-link-sm-51">Staging Cybersecurity Risks for Enterprise Risk Management and Governance Oversight</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-51">9/14/2022</strong> <br/> Status: <span id="pub-status-sm-51">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-51"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-51"> 9/14/2022 </td> </tr> <tr id="result-52"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-52">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-52">8286B</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8286/b/final" id="pub-title-link-52">Prioritizing Cybersecurity Risk for Enterprise Risk Management</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-52">IR 8286B (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8286/b/final" class="mobile-pub-title" id="pub-title-link-sm-52">Prioritizing Cybersecurity Risk for Enterprise Risk Management</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-52">2/10/2022</strong> <br/> Status: <span id="pub-status-sm-52">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-52"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-52"> 2/10/2022 </td> </tr> <tr id="result-53"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-53">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-53">8286A</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8286/a/final" id="pub-title-link-53">Identifying and Estimating Cybersecurity Risk for Enterprise Risk Management</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-53">IR 8286A (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8286/a/final" class="mobile-pub-title" id="pub-title-link-sm-53">Identifying and Estimating Cybersecurity Risk for Enterprise Risk Management</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-53">11/12/2021</strong> <br/> Status: <span id="pub-status-sm-53">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-53"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-53"> 11/12/2021 </td> </tr> <tr id="result-54"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-54">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-54">8286</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8286/final" id="pub-title-link-54">Integrating Cybersecurity and Enterprise Risk Management (ERM)</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-54">IR 8286 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8286/final" class="mobile-pub-title" id="pub-title-link-sm-54">Integrating Cybersecurity and Enterprise Risk Management (ERM)</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-54">10/13/2020</strong> <br/> Status: <span id="pub-status-sm-54">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-54"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-54"> 10/13/2020 </td> </tr> <tr id="result-55"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-55">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-55">8278A Rev. 1</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8278/a/r1/ipd" id="pub-title-link-55">National Online Informative References (OLIR) Program: Submission Guidance for OLIR Developers</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-55">IR 8278A Rev. 1 (Initial Public Draft)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8278/a/r1/ipd" class="mobile-pub-title" id="pub-title-link-sm-55">National Online Informative References (OLIR) Program: Submission Guidance for OLIR Developers</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-55">12/08/2022</strong> <br/> Status: <span id="pub-status-sm-55">Draft</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-55"> Draft </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-55"> 12/08/2022 </td> </tr> <tr id="result-56"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-56">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-56">8278 Rev. 1</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8278/r1/ipd" id="pub-title-link-56">National Online Informative References (OLIR) Program: Overview, Benefits, and Use</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-56">IR 8278 Rev. 1 (Initial Public Draft)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8278/r1/ipd" class="mobile-pub-title" id="pub-title-link-sm-56">National Online Informative References (OLIR) Program: Overview, Benefits, and Use</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-56">12/08/2022</strong> <br/> Status: <span id="pub-status-sm-56">Draft</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-56"> Draft </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-56"> 12/08/2022 </td> </tr> <tr id="result-57"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-57">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-57">8278A</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8278/a/final" id="pub-title-link-57">National Online Informative References (OLIR) Program: Submission Guidance for OLIR Developers</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-57">IR 8278A (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8278/a/final" class="mobile-pub-title" id="pub-title-link-sm-57">National Online Informative References (OLIR) Program: Submission Guidance for OLIR Developers</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-57">11/20/2020</strong> <br/> Status: <span id="pub-status-sm-57">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-57"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-57"> 11/20/2020 </td> </tr> <tr id="result-58"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-58">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-58">8278</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8278/final" id="pub-title-link-58">National Online Informative References (OLIR) Program: Program Overview and OLIR Uses</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-58">IR 8278 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8278/final" class="mobile-pub-title" id="pub-title-link-sm-58">National Online Informative References (OLIR) Program: Program Overview and OLIR Uses</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-58">11/20/2020</strong> <br/> Status: <span id="pub-status-sm-58">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-58"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-58"> 11/20/2020 </td> </tr> <tr id="result-59"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-59">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-59">8276</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8276/final" id="pub-title-link-59">Key Practices in Cyber Supply Chain Risk Management: Observations from Industry</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-59">IR 8276 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8276/final" class="mobile-pub-title" id="pub-title-link-sm-59">Key Practices in Cyber Supply Chain Risk Management: Observations from Industry</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-59">2/11/2021</strong> <br/> Status: <span id="pub-status-sm-59">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-59"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-59"> 2/11/2021 </td> </tr> <tr id="result-60"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-60">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-60">8270</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8270/final" id="pub-title-link-60">Introduction to Cybersecurity for Commercial Satellite Operations</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-60">IR 8270 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8270/final" class="mobile-pub-title" id="pub-title-link-sm-60">Introduction to Cybersecurity for Commercial Satellite Operations</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-60">7/25/2023</strong> <br/> Status: <span id="pub-status-sm-60">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-60"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-60"> 7/25/2023 </td> </tr> <tr id="result-61"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-61">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-61">8268</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8268/final" id="pub-title-link-61">Status Report on the First Round of the NIST Lightweight Cryptography Standardization Process</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-61">IR 8268 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8268/final" class="mobile-pub-title" id="pub-title-link-sm-61">Status Report on the First Round of the NIST Lightweight Cryptography Standardization Process</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-61">10/07/2019</strong> <br/> Status: <span id="pub-status-sm-61">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-61"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-61"> 10/07/2019 </td> </tr> <tr id="result-62"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-62">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-62">8267</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8267/ipd" id="pub-title-link-62">Security Review of Consumer Home Internet of Things (IoT) Products</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-62">IR 8267 (Initial Public Draft)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8267/ipd" class="mobile-pub-title" id="pub-title-link-sm-62">Security Review of Consumer Home Internet of Things (IoT) Products</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-62">10/01/2019</strong> <br/> Status: <span id="pub-status-sm-62">Draft</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-62"> Draft </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-62"> 10/01/2019 </td> </tr> <tr id="result-63"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-63">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-63">8259C</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8259/c/ipd" id="pub-title-link-63">Creating a Profile Using the IoT Core Baseline and Non-Technical Baseline</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-63">IR 8259C (Initial Public Draft)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8259/c/ipd" class="mobile-pub-title" id="pub-title-link-sm-63">Creating a Profile Using the IoT Core Baseline and Non-Technical Baseline</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-63">12/15/2020</strong> <br/> Status: <span id="pub-status-sm-63">Draft</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-63"> Draft </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-63"> 12/15/2020 </td> </tr> <tr id="result-64"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-64">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-64">8259B</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8259/b/final" id="pub-title-link-64">IoT Non-Technical Supporting Capability Core Baseline</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-64">IR 8259B (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8259/b/final" class="mobile-pub-title" id="pub-title-link-sm-64">IoT Non-Technical Supporting Capability Core Baseline</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-64">8/25/2021</strong> <br/> Status: <span id="pub-status-sm-64">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-64"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-64"> 8/25/2021 </td> </tr> <tr id="result-65"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-65">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-65">8259A</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8259/a/final" id="pub-title-link-65">IoT Device Cybersecurity Capability Core Baseline</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-65">IR 8259A (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8259/a/final" class="mobile-pub-title" id="pub-title-link-sm-65">IoT Device Cybersecurity Capability Core Baseline</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-65">5/29/2020</strong> <br/> Status: <span id="pub-status-sm-65">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-65"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-65"> 5/29/2020 </td> </tr> <tr id="result-66"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-66">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-66">8259</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8259/final" id="pub-title-link-66">Foundational Cybersecurity Activities for IoT Device Manufacturers</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-66">IR 8259 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8259/final" class="mobile-pub-title" id="pub-title-link-sm-66">Foundational Cybersecurity Activities for IoT Device Manufacturers</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-66">5/29/2020</strong> <br/> Status: <span id="pub-status-sm-66">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-66"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-66"> 5/29/2020 </td> </tr> <tr id="result-67"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-67">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-67">8246</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8246/final" id="pub-title-link-67">Collaborative Vulnerability Metadata Acceptance Process (CVMAP) for CVE Numbering Authorities (CNAs) and Authorized Data Publishers</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-67">IR 8246 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8246/final" class="mobile-pub-title" id="pub-title-link-sm-67">Collaborative Vulnerability Metadata Acceptance Process (CVMAP) for CVE Numbering Authorities (CNAs) and Authorized Data Publishers</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-67">12/15/2020</strong> <br/> Status: <span id="pub-status-sm-67">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-67"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-67"> 12/15/2020 </td> </tr> <tr id="result-68"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-68">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-68">8241</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8241/final" id="pub-title-link-68">Organizational Views of NIST Cryptographic Standards and Testing and Validation Programs</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-68">IR 8241 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8241/final" class="mobile-pub-title" id="pub-title-link-sm-68">Organizational Views of NIST Cryptographic Standards and Testing and Validation Programs</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-68">12/17/2018</strong> <br/> Status: <span id="pub-status-sm-68">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-68"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-68"> 12/17/2018 </td> </tr> <tr id="result-69"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-69">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-69">8240</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8240/final" id="pub-title-link-69">Status Report on the First Round of the NIST Post-Quantum Cryptography Standardization Process</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-69">IR 8240 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8240/final" class="mobile-pub-title" id="pub-title-link-sm-69">Status Report on the First Round of the NIST Post-Quantum Cryptography Standardization Process</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-69">1/31/2019</strong> <br/> Status: <span id="pub-status-sm-69">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-69"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-69"> 1/31/2019 </td> </tr> <tr id="result-70"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-70">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-70">8235</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8235/final" id="pub-title-link-70">Security Guidance for First Responder Mobile and Wearable Devices</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-70">IR 8235 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8235/final" class="mobile-pub-title" id="pub-title-link-sm-70">Security Guidance for First Responder Mobile and Wearable Devices</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-70">7/20/2022</strong> <br/> Status: <span id="pub-status-sm-70">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-70"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-70"> 7/20/2022 </td> </tr> <tr id="result-71"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-71">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-71">8228</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8228/final" id="pub-title-link-71">Considerations for Managing Internet of Things (IoT) Cybersecurity and Privacy Risks</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-71">IR 8228 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8228/final" class="mobile-pub-title" id="pub-title-link-sm-71">Considerations for Managing Internet of Things (IoT) Cybersecurity and Privacy Risks</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-71">6/25/2019</strong> <br/> Status: <span id="pub-status-sm-71">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-71"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-71"> 6/25/2019 </td> </tr> <tr id="result-72"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-72">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-72">8227</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8227/final" id="pub-title-link-72">Manufacturing Profile Implementation Methodology for a Robotic Workcell</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-72">IR 8227 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8227/final" class="mobile-pub-title" id="pub-title-link-sm-72">Manufacturing Profile Implementation Methodology for a Robotic Workcell</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-72">5/22/2019</strong> <br/> Status: <span id="pub-status-sm-72">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-72"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-72"> 5/22/2019 </td> </tr> <tr id="result-73"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-73">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-73">8221</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8221/final" id="pub-title-link-73">A Methodology for Enabling Forensic Analysis Using Hypervisor Vulnerabilities Data</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-73">IR 8221 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8221/final" class="mobile-pub-title" id="pub-title-link-sm-73">A Methodology for Enabling Forensic Analysis Using Hypervisor Vulnerabilities Data</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-73">6/05/2019</strong> <br/> Status: <span id="pub-status-sm-73">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-73"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-73"> 6/05/2019 </td> </tr> <tr id="result-74"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-74">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-74">8219</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8219/final" id="pub-title-link-74">Securing Manufacturing Industrial Control Systems: Behavioral Anomaly Detection</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-74">IR 8219 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8219/final" class="mobile-pub-title" id="pub-title-link-sm-74">Securing Manufacturing Industrial Control Systems: Behavioral Anomaly Detection</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-74">7/16/2020</strong> <br/> Status: <span id="pub-status-sm-74">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-74"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-74"> 7/16/2020 </td> </tr> <tr id="result-75"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-75">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-75">8214C</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8214/c/ipd" id="pub-title-link-75">NIST First Call for Multi-Party Threshold Schemes</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-75">IR 8214C (Initial Public Draft)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8214/c/ipd" class="mobile-pub-title" id="pub-title-link-sm-75">NIST First Call for Multi-Party Threshold Schemes</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-75">1/25/2023</strong> <br/> Status: <span id="pub-status-sm-75">Draft</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-75"> Draft </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-75"> 1/25/2023 </td> </tr> <tr id="result-76"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-76">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-76">8214B</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8214/b/ipd" id="pub-title-link-76">Notes on Threshold EdDSA/Schnorr Signatures</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-76">IR 8214B (Initial Public Draft)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8214/b/ipd" class="mobile-pub-title" id="pub-title-link-sm-76">Notes on Threshold EdDSA/Schnorr Signatures</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-76">8/12/2022</strong> <br/> Status: <span id="pub-status-sm-76">Draft</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-76"> Draft </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-76"> 8/12/2022 </td> </tr> <tr id="result-77"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-77">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-77">8214A</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8214/a/final" id="pub-title-link-77">NIST Roadmap Toward Criteria for Threshold Schemes for Cryptographic Primitives</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-77">IR 8214A (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8214/a/final" class="mobile-pub-title" id="pub-title-link-sm-77">NIST Roadmap Toward Criteria for Threshold Schemes for Cryptographic Primitives</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-77">7/07/2020</strong> <br/> Status: <span id="pub-status-sm-77">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-77"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-77"> 7/07/2020 </td> </tr> <tr id="result-78"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-78">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-78">8214</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8214/final" id="pub-title-link-78">Threshold Schemes for Cryptographic Primitives: Challenges and Opportunities in Standardization and Validation of Threshold Cryptography</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-78">IR 8214 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8214/final" class="mobile-pub-title" id="pub-title-link-sm-78">Threshold Schemes for Cryptographic Primitives: Challenges and Opportunities in Standardization and Validation of Threshold Cryptography</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-78">3/01/2019</strong> <br/> Status: <span id="pub-status-sm-78">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-78"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-78"> 3/01/2019 </td> </tr> <tr id="result-79"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-79">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-79">8213</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8213/ipd" id="pub-title-link-79">A Reference for Randomness Beacons: Format and Protocol Version 2</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-79">IR 8213 (Initial Public Draft)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8213/ipd" class="mobile-pub-title" id="pub-title-link-sm-79">A Reference for Randomness Beacons: Format and Protocol Version 2</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-79">5/06/2019</strong> <br/> Status: <span id="pub-status-sm-79">Draft</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-79"> Draft </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-79"> 5/06/2019 </td> </tr> <tr id="result-80"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-80">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-80">8212</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8212/final" id="pub-title-link-80">ISCMA: An Information Security Continuous Monitoring Program Assessment</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-80">IR 8212 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8212/final" class="mobile-pub-title" id="pub-title-link-sm-80">ISCMA: An Information Security Continuous Monitoring Program Assessment</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-80">3/31/2021</strong> <br/> Status: <span id="pub-status-sm-80">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-80"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-80"> 3/31/2021 </td> </tr> <tr id="result-81"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-81">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-81">8202</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8202/final" id="pub-title-link-81">Blockchain Technology Overview</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-81">IR 8202 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8202/final" class="mobile-pub-title" id="pub-title-link-sm-81">Blockchain Technology Overview</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-81">10/03/2018</strong> <br/> Status: <span id="pub-status-sm-81">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-81"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-81"> 10/03/2018 </td> </tr> <tr id="result-82"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-82">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-82">8201</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8201/final" id="pub-title-link-82">Internet of Things (IoT) Cybersecurity Colloquium: A NIST Workshop Proceedings</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-82">IR 8201 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8201/final" class="mobile-pub-title" id="pub-title-link-sm-82">Internet of Things (IoT) Cybersecurity Colloquium: A NIST Workshop Proceedings</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-82">12/22/2017</strong> <br/> Status: <span id="pub-status-sm-82">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-82"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-82"> 12/22/2017 </td> </tr> <tr id="result-83"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-83">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-83">8200</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8200/final" id="pub-title-link-83">Interagency Report on the Status of International Cybersecurity Standardization for the Internet of Things (IoT)</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-83">IR 8200 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8200/final" class="mobile-pub-title" id="pub-title-link-sm-83">Interagency Report on the Status of International Cybersecurity Standardization for the Internet of Things (IoT)</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-83">11/29/2018</strong> <br/> Status: <span id="pub-status-sm-83">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-83"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-83"> 11/29/2018 </td> </tr> <tr id="result-84"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-84">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-84">8196</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8196/final" id="pub-title-link-84">Security Analysis of First Responder Mobile and Wearable Devices</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-84">IR 8196 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8196/final" class="mobile-pub-title" id="pub-title-link-sm-84">Security Analysis of First Responder Mobile and Wearable Devices</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-84">5/11/2020</strong> <br/> Status: <span id="pub-status-sm-84">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-84"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-84"> 5/11/2020 </td> </tr> <tr id="result-85"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-85">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-85">8194</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8194/final" id="pub-title-link-85">Exploratory Lens Model of Decision-Making in a Potential Phishing Attack Scenario</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-85">IR 8194 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8194/final" class="mobile-pub-title" id="pub-title-link-sm-85">Exploratory Lens Model of Decision-Making in a Potential Phishing Attack Scenario</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-85">10/10/2017</strong> <br/> Status: <span id="pub-status-sm-85">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-85"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-85"> 10/10/2017 </td> </tr> <tr id="result-86"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-86">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-86">8193</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8193/ipd" id="pub-title-link-86">National Initiative for Cybersecurity Education (NICE) Framework Work Role Capability Indicators: Indicators for Performing Work Roles</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-86">IR 8193 (Initial Public Draft)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8193/ipd" class="mobile-pub-title" id="pub-title-link-sm-86">National Initiative for Cybersecurity Education (NICE) Framework Work Role Capability Indicators: Indicators for Performing Work Roles</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-86">11/08/2017</strong> <br/> Status: <span id="pub-status-sm-86">Draft</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-86"> Draft </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-86"> 11/08/2017 </td> </tr> <tr id="result-87"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-87">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-87">8192</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8192/final" id="pub-title-link-87">Enhancing Resilience of the Internet and Communications Ecosystem: A NIST Workshop Proceedings</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-87">IR 8192 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8192/final" class="mobile-pub-title" id="pub-title-link-sm-87">Enhancing Resilience of the Internet and Communications Ecosystem: A NIST Workshop Proceedings</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-87">9/18/2017</strong> <br/> Status: <span id="pub-status-sm-87">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-87"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-87"> 9/18/2017 </td> </tr> <tr id="result-88"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-88">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-88">8188</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8188/final" id="pub-title-link-88">Key Performance Indicators for Process Control System Cybersecurity Performance Analysis</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-88">IR 8188 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8188/final" class="mobile-pub-title" id="pub-title-link-sm-88">Key Performance Indicators for Process Control System Cybersecurity Performance Analysis</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-88">8/03/2017</strong> <br/> Status: <span id="pub-status-sm-88">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-88"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-88"> 8/03/2017 </td> </tr> <tr id="result-89"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-89">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-89">8183A Vol. 3</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8183/a/v3/final" id="pub-title-link-89">Cybersecurity Framework Manufacturing Profile Low Impact Level Example Implementations Guide: Volume 3 – Discrete-based Manufacturing System Use Case</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-89">IR 8183A Vol. 3 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8183/a/v3/final" class="mobile-pub-title" id="pub-title-link-sm-89">Cybersecurity Framework Manufacturing Profile Low Impact Level Example Implementations Guide: Volume 3 – Discrete-based Manufacturing System Use Case</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-89">9/30/2019</strong> <br/> Status: <span id="pub-status-sm-89">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-89"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-89"> 9/30/2019 </td> </tr> <tr id="result-90"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-90">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-90">8183A Vol. 2</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8183/a/v2/final" id="pub-title-link-90">Cybersecurity Framework Manufacturing Profile Low Impact Level Example Implementations Guide: Volume 2 – Process-based Manufacturing System Use Case</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-90">IR 8183A Vol. 2 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8183/a/v2/final" class="mobile-pub-title" id="pub-title-link-sm-90">Cybersecurity Framework Manufacturing Profile Low Impact Level Example Implementations Guide: Volume 2 – Process-based Manufacturing System Use Case</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-90">9/30/2019</strong> <br/> Status: <span id="pub-status-sm-90">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-90"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-90"> 9/30/2019 </td> </tr> <tr id="result-91"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-91">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-91">8183A Vol. 1</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8183/a/v1/final" id="pub-title-link-91">Cybersecurity Framework Manufacturing Profile Low Impact Level Example Implementations Guide: Volume 1 – General Implementation Guidance</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-91">IR 8183A Vol. 1 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8183/a/v1/final" class="mobile-pub-title" id="pub-title-link-sm-91">Cybersecurity Framework Manufacturing Profile Low Impact Level Example Implementations Guide: Volume 1 – General Implementation Guidance</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-91">9/30/2019</strong> <br/> Status: <span id="pub-status-sm-91">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-91"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-91"> 9/30/2019 </td> </tr> <tr id="result-92"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-92">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-92">8183 Rev. 1</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8183/r1/final" id="pub-title-link-92">Cybersecurity Framework Version 1.1 Manufacturing Profile</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-92">IR 8183 Rev. 1 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8183/r1/final" class="mobile-pub-title" id="pub-title-link-sm-92">Cybersecurity Framework Version 1.1 Manufacturing Profile</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-92">10/07/2020</strong> <br/> Status: <span id="pub-status-sm-92">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-92"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-92"> 10/07/2020 </td> </tr> <tr id="result-93"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-93">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-93">8183</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8183/upd1/final" id="pub-title-link-93">Cybersecurity Framework Manufacturing Profile</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-93">IR 8183 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8183/upd1/final" class="mobile-pub-title" id="pub-title-link-sm-93">Cybersecurity Framework Manufacturing Profile</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-93">5/20/2019</strong> <br/> Status: <span id="pub-status-sm-93">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-93"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-93"> 5/20/2019 </td> </tr> <tr id="result-94"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-94">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-94">8179</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8179/final" id="pub-title-link-94">Criticality Analysis Process Model: Prioritizing Systems and Components</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-94">IR 8179 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8179/final" class="mobile-pub-title" id="pub-title-link-sm-94">Criticality Analysis Process Model: Prioritizing Systems and Components</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-94">4/09/2018</strong> <br/> Status: <span id="pub-status-sm-94">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-94"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-94"> 4/09/2018 </td> </tr> <tr id="result-95"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-95">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-95">8177</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8177/final" id="pub-title-link-95">Metrics and Key Performance Indicators for Robotic Cybersecurity Performance Analysis</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-95">IR 8177 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8177/final" class="mobile-pub-title" id="pub-title-link-sm-95">Metrics and Key Performance Indicators for Robotic Cybersecurity Performance Analysis</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-95">5/21/2019</strong> <br/> Status: <span id="pub-status-sm-95">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-95"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-95"> 5/21/2019 </td> </tr> <tr id="result-96"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-96">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-96">8176</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8176/final" id="pub-title-link-96">Security Assurance Requirements for Linux Application Container Deployments</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-96">IR 8176 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8176/final" class="mobile-pub-title" id="pub-title-link-sm-96">Security Assurance Requirements for Linux Application Container Deployments</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-96">10/11/2017</strong> <br/> Status: <span id="pub-status-sm-96">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-96"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-96"> 10/11/2017 </td> </tr> <tr id="result-97"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-97">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-97">8170</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8170/upd1/final" id="pub-title-link-97">Approaches for Federal Agencies to Use the Cybersecurity Framework</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-97">IR 8170 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8170/upd1/final" class="mobile-pub-title" id="pub-title-link-sm-97">Approaches for Federal Agencies to Use the Cybersecurity Framework</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-97">8/17/2021</strong> <br/> Status: <span id="pub-status-sm-97">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-97"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-97"> 8/17/2021 </td> </tr> <tr id="result-98"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-98">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-98">8165</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8165/final" id="pub-title-link-98">Impact of Code Complexity on Software Analysis</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-98">IR 8165 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8165/final" class="mobile-pub-title" id="pub-title-link-sm-98">Impact of Code Complexity on Software Analysis</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-98">2/09/2017</strong> <br/> Status: <span id="pub-status-sm-98">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-98"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-98"> 2/09/2017 </td> </tr> <tr id="result-99"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-99">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-99">8151</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8151/final" id="pub-title-link-99">Dramatically Reducing Software Vulnerabilities: Report to the White House Office of Science and Technology Policy</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-99">IR 8151 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8151/final" class="mobile-pub-title" id="pub-title-link-sm-99">Dramatically Reducing Software Vulnerabilities: Report to the White House Office of Science and Technology Policy</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-99">11/30/2016</strong> <br/> Status: <span id="pub-status-sm-99">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-99"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-99"> 11/30/2016 </td> </tr> <tr id="result-100"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-100">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-100">8149</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8149/final" id="pub-title-link-100">Developing Trust Frameworks to Support Identity Federations</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-100">IR 8149 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8149/final" class="mobile-pub-title" id="pub-title-link-sm-100">Developing Trust Frameworks to Support Identity Federations</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-100">1/12/2018</strong> <br/> Status: <span id="pub-status-sm-100">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-100"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-100"> 1/12/2018 </td> </tr> <tr id="result-101"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-101">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-101">8144</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8144/ipd" id="pub-title-link-101">Assessing Threats to Mobile Devices & Infrastructure: the Mobile Threat Catalogue</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-101">IR 8144 (Initial Public Draft)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8144/ipd" class="mobile-pub-title" id="pub-title-link-sm-101">Assessing Threats to Mobile Devices & Infrastructure: the Mobile Threat Catalogue</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-101">9/12/2016</strong> <br/> Status: <span id="pub-status-sm-101">Draft</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-101"> Draft </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-101"> 9/12/2016 </td> </tr> <tr id="result-102"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-102">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-102">8139</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8139/ipd" id="pub-title-link-102">Identifying Uniformity with Entropy and Divergence</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-102">IR 8139 (Initial Public Draft)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8139/ipd" class="mobile-pub-title" id="pub-title-link-sm-102">Identifying Uniformity with Entropy and Divergence</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-102">2/02/2017</strong> <br/> Status: <span id="pub-status-sm-102">Draft</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-102"> Draft </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-102"> 2/02/2017 </td> </tr> <tr id="result-103"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-103">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-103">8136</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8136/final" id="pub-title-link-103">An Overview of Mobile Application Vetting Services for Public Safety</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-103">IR 8136 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8136/final" class="mobile-pub-title" id="pub-title-link-sm-103">An Overview of Mobile Application Vetting Services for Public Safety</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-103">1/27/2017</strong> <br/> Status: <span id="pub-status-sm-103">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-103"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-103"> 1/27/2017 </td> </tr> <tr id="result-104"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-104">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-104">8135</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8135/final" id="pub-title-link-104">Identifying and Categorizing Data Types for Public Safety Mobile Applications: Workshop Report</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-104">IR 8135 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8135/final" class="mobile-pub-title" id="pub-title-link-sm-104">Identifying and Categorizing Data Types for Public Safety Mobile Applications: Workshop Report</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-104">6/01/2016</strong> <br/> Status: <span id="pub-status-sm-104">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-104"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-104"> 6/01/2016 </td> </tr> <tr id="result-105"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-105">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-105">8114</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8114/final" id="pub-title-link-105">Report on Lightweight Cryptography</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-105">IR 8114 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8114/final" class="mobile-pub-title" id="pub-title-link-sm-105">Report on Lightweight Cryptography</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-105">3/28/2017</strong> <br/> Status: <span id="pub-status-sm-105">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-105"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-105"> 3/28/2017 </td> </tr> <tr id="result-106"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-106">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-106">8112</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8112/final" id="pub-title-link-106">Attribute Metadata: A Proposed Schema for Evaluating Federated Attributes</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-106">IR 8112 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8112/final" class="mobile-pub-title" id="pub-title-link-sm-106">Attribute Metadata: A Proposed Schema for Evaluating Federated Attributes</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-106">1/12/2018</strong> <br/> Status: <span id="pub-status-sm-106">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-106"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-106"> 1/12/2018 </td> </tr> <tr id="result-107"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-107">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-107">8105</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8105/final" id="pub-title-link-107">Report on Post-Quantum Cryptography</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-107">IR 8105 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8105/final" class="mobile-pub-title" id="pub-title-link-sm-107">Report on Post-Quantum Cryptography</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-107">4/28/2016</strong> <br/> Status: <span id="pub-status-sm-107">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-107"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-107"> 4/28/2016 </td> </tr> <tr id="result-108"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-108">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-108">8103</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8103/final" id="pub-title-link-108">Advanced Identity Workshop on Applying Measurement Science in the Identity Ecosystem: Summary and Next Steps</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-108">IR 8103 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8103/final" class="mobile-pub-title" id="pub-title-link-sm-108">Advanced Identity Workshop on Applying Measurement Science in the Identity Ecosystem: Summary and Next Steps</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-108">9/19/2016</strong> <br/> Status: <span id="pub-status-sm-108">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-108"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-108"> 9/19/2016 </td> </tr> <tr id="result-109"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-109">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-109">8089</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8089/final" id="pub-title-link-109">An Industrial Control System Cybersecurity Performance Testbed</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-109">IR 8089 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8089/final" class="mobile-pub-title" id="pub-title-link-sm-109">An Industrial Control System Cybersecurity Performance Testbed</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-109">12/10/2015</strong> <br/> Status: <span id="pub-status-sm-109">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-109"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-109"> 12/10/2015 </td> </tr> <tr id="result-110"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-110">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-110">8085</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8085/ipd" id="pub-title-link-110">Forming Common Platform Enumeration (CPE) Names from Software Identification (SWID) Tags</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-110">IR 8085 (Initial Public Draft)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8085/ipd" class="mobile-pub-title" id="pub-title-link-sm-110">Forming Common Platform Enumeration (CPE) Names from Software Identification (SWID) Tags</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-110">12/17/2015</strong> <br/> Status: <span id="pub-status-sm-110">Draft</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-110"> Draft </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-110"> 12/17/2015 </td> </tr> <tr id="result-111"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-111">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-111">8080</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8080/final" id="pub-title-link-111">Usability and Security Considerations for Public Safety Mobile Authentication</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-111">IR 8080 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8080/final" class="mobile-pub-title" id="pub-title-link-sm-111">Usability and Security Considerations for Public Safety Mobile Authentication</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-111">7/27/2016</strong> <br/> Status: <span id="pub-status-sm-111">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-111"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-111"> 7/27/2016 </td> </tr> <tr id="result-112"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-112">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-112">8074 Vol. 2</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8074/v2/final" id="pub-title-link-112">Supplemental Information for the Interagency Report on Strategic U.S. Government Engagement in International Standardization to Achieve U.S. Objectives for Cybersecurity</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-112">IR 8074 Vol. 2 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8074/v2/final" class="mobile-pub-title" id="pub-title-link-sm-112">Supplemental Information for the Interagency Report on Strategic U.S. Government Engagement in International Standardization to Achieve U.S. Objectives for Cybersecurity</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-112">12/23/2015</strong> <br/> Status: <span id="pub-status-sm-112">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-112"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-112"> 12/23/2015 </td> </tr> <tr id="result-113"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-113">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-113">8074 Vol. 1</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8074/v1/final" id="pub-title-link-113">Interagency Report on Strategic U.S. Government Engagement in International Standardization to Achieve U.S. Objectives for Cybersecurity</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-113">IR 8074 Vol. 1 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8074/v1/final" class="mobile-pub-title" id="pub-title-link-sm-113">Interagency Report on Strategic U.S. Government Engagement in International Standardization to Achieve U.S. Objectives for Cybersecurity</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-113">12/23/2015</strong> <br/> Status: <span id="pub-status-sm-113">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-113"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-113"> 12/23/2015 </td> </tr> <tr id="result-114"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-114">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-114">8062</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8062/final" id="pub-title-link-114">An Introduction to Privacy Engineering and Risk Management in Federal Systems</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-114">IR 8062 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8062/final" class="mobile-pub-title" id="pub-title-link-sm-114">An Introduction to Privacy Engineering and Risk Management in Federal Systems</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-114">1/04/2017</strong> <br/> Status: <span id="pub-status-sm-114">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-114"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-114"> 1/04/2017 </td> </tr> <tr id="result-115"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-115">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-115">8060</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8060/final" id="pub-title-link-115">Guidelines for the Creation of Interoperable Software Identification (SWID) Tags</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-115">IR 8060 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8060/final" class="mobile-pub-title" id="pub-title-link-sm-115">Guidelines for the Creation of Interoperable Software Identification (SWID) Tags</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-115">4/22/2016</strong> <br/> Status: <span id="pub-status-sm-115">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-115"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-115"> 4/22/2016 </td> </tr> <tr id="result-116"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-116">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-116">8058</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8058/ipd" id="pub-title-link-116">Security Content Automation Protocol (SCAP) Version 1.2 Content Style Guide: Best Practices for Creating and Maintaining SCAP 1.2 Content</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-116">IR 8058 (Initial Public Draft)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8058/ipd" class="mobile-pub-title" id="pub-title-link-sm-116">Security Content Automation Protocol (SCAP) Version 1.2 Content Style Guide: Best Practices for Creating and Maintaining SCAP 1.2 Content</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-116">5/01/2015</strong> <br/> Status: <span id="pub-status-sm-116">Draft</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-116"> Draft </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-116"> 5/01/2015 </td> </tr> <tr id="result-117"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-117">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-117">8055</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8055/final" id="pub-title-link-117">Derived Personal Identity Verification (PIV) Credentials (DPC) Proof of Concept Research</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-117">IR 8055 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8055/final" class="mobile-pub-title" id="pub-title-link-sm-117">Derived Personal Identity Verification (PIV) Credentials (DPC) Proof of Concept Research</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-117">1/20/2016</strong> <br/> Status: <span id="pub-status-sm-117">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-117"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-117"> 1/20/2016 </td> </tr> <tr id="result-118"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-118">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-118">8054</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8054/upd1/final" id="pub-title-link-118">NSTIC Pilots: Catalyzing the Identity Ecosystem</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-118">IR 8054 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8054/upd1/final" class="mobile-pub-title" id="pub-title-link-sm-118">NSTIC Pilots: Catalyzing the Identity Ecosystem</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-118">3/15/2016</strong> <br/> Status: <span id="pub-status-sm-118">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-118"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-118"> 3/15/2016 </td> </tr> <tr id="result-119"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-119">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-119">8053</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8053/final" id="pub-title-link-119">De-Identification of Personal Information</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-119">IR 8053 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8053/final" class="mobile-pub-title" id="pub-title-link-sm-119">De-Identification of Personal Information</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-119">10/22/2015</strong> <br/> Status: <span id="pub-status-sm-119">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-119"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-119"> 10/22/2015 </td> </tr> <tr id="result-120"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-120">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-120">8041</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8041/final" id="pub-title-link-120">Proceedings of the Cybersecurity for Direct Digital Manufacturing (DDM) Symposium</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-120">IR 8041 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8041/final" class="mobile-pub-title" id="pub-title-link-sm-120">Proceedings of the Cybersecurity for Direct Digital Manufacturing (DDM) Symposium</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-120">4/10/2015</strong> <br/> Status: <span id="pub-status-sm-120">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-120"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-120"> 4/10/2015 </td> </tr> <tr id="result-121"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-121">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-121">8040</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8040/final" id="pub-title-link-121">Measuring the Usability and Security of Permuted Passwords on Mobile Platforms</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-121">IR 8040 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8040/final" class="mobile-pub-title" id="pub-title-link-sm-121">Measuring the Usability and Security of Permuted Passwords on Mobile Platforms</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-121">4/25/2016</strong> <br/> Status: <span id="pub-status-sm-121">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-121"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-121"> 4/25/2016 </td> </tr> <tr id="result-122"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-122">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-122">8023</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8023/final" id="pub-title-link-122">Risk Management for Replication Devices</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-122">IR 8023 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8023/final" class="mobile-pub-title" id="pub-title-link-sm-122">Risk Management for Replication Devices</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-122">2/23/2015</strong> <br/> Status: <span id="pub-status-sm-122">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-122"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-122"> 2/23/2015 </td> </tr> <tr id="result-123"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-123">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-123">8018</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8018/final" id="pub-title-link-123">Public Safety Mobile Application Security Requirements Workshop Summary</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-123">IR 8018 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8018/final" class="mobile-pub-title" id="pub-title-link-sm-123">Public Safety Mobile Application Security Requirements Workshop Summary</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-123">1/22/2015</strong> <br/> Status: <span id="pub-status-sm-123">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-123"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-123"> 1/22/2015 </td> </tr> <tr id="result-124"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-124">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-124">8014</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8014/final" id="pub-title-link-124">Considerations for Identity Management in Public Safety Mobile Networks</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-124">IR 8014 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8014/final" class="mobile-pub-title" id="pub-title-link-sm-124">Considerations for Identity Management in Public Safety Mobile Networks</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-124">3/30/2015</strong> <br/> Status: <span id="pub-status-sm-124">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-124"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-124"> 3/30/2015 </td> </tr> <tr id="result-125"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-125">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-125">8011 Vol. 4</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8011/v4/final" id="pub-title-link-125">Automation Support for Security Control Assessments: Software Vulnerability Management</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-125">IR 8011 Vol. 4 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8011/v4/final" class="mobile-pub-title" id="pub-title-link-sm-125">Automation Support for Security Control Assessments: Software Vulnerability Management</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-125">4/28/2020</strong> <br/> Status: <span id="pub-status-sm-125">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-125"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-125"> 4/28/2020 </td> </tr> <tr id="result-126"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-126">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-126">8011 Vol. 3</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8011/v3/final" id="pub-title-link-126">Automation Support for Security Control Assessments: Software Asset Management</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-126">IR 8011 Vol. 3 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8011/v3/final" class="mobile-pub-title" id="pub-title-link-sm-126">Automation Support for Security Control Assessments: Software Asset Management</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-126">12/06/2018</strong> <br/> Status: <span id="pub-status-sm-126">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-126"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-126"> 12/06/2018 </td> </tr> <tr id="result-127"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-127">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-127">8011 Vol. 2</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8011/v2/final" id="pub-title-link-127">Automation Support for Security Control Assessments: Volume 2: Hardware Asset Management</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-127">IR 8011 Vol. 2 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8011/v2/final" class="mobile-pub-title" id="pub-title-link-sm-127">Automation Support for Security Control Assessments: Volume 2: Hardware Asset Management</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-127">6/06/2017</strong> <br/> Status: <span id="pub-status-sm-127">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-127"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-127"> 6/06/2017 </td> </tr> <tr id="result-128"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-128">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-128">8011 Vol. 1</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8011/v1/final" id="pub-title-link-128">Automation Support for Security Control Assessments: Volume 1: Overview</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-128">IR 8011 Vol. 1 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8011/v1/final" class="mobile-pub-title" id="pub-title-link-sm-128">Automation Support for Security Control Assessments: Volume 1: Overview</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-128">6/06/2017</strong> <br/> Status: <span id="pub-status-sm-128">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-128"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-128"> 6/06/2017 </td> </tr> <tr id="result-129"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-129">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-129">8006</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8006/final" id="pub-title-link-129">NIST Cloud Computing Forensic Science Challenges</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-129">IR 8006 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/8006/final" class="mobile-pub-title" id="pub-title-link-sm-129">NIST Cloud Computing Forensic Science Challenges</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-129">8/25/2020</strong> <br/> Status: <span id="pub-status-sm-129">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-129"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-129"> 8/25/2020 </td> </tr> <tr id="result-130"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-130">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-130">7991</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7991/final" id="pub-title-link-130">United States Federal Employees' Password Management Behaviors – A Department of Commerce Case Study</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-130">IR 7991 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7991/final" class="mobile-pub-title" id="pub-title-link-sm-130">United States Federal Employees' Password Management Behaviors – A Department of Commerce Case Study</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-130">4/08/2014</strong> <br/> Status: <span id="pub-status-sm-130">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-130"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-130"> 4/08/2014 </td> </tr> <tr id="result-131"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-131">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-131">7987 Rev. 1</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7987/r1/final" id="pub-title-link-131">Policy Machine: Features, Architecture, and Specification</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-131">IR 7987 Rev. 1 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7987/r1/final" class="mobile-pub-title" id="pub-title-link-sm-131">Policy Machine: Features, Architecture, and Specification</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-131">10/27/2015</strong> <br/> Status: <span id="pub-status-sm-131">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-131"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-131"> 10/27/2015 </td> </tr> <tr id="result-132"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-132">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-132">7983</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7983/final" id="pub-title-link-132">Report: Authentication Diary Study</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-132">IR 7983 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7983/final" class="mobile-pub-title" id="pub-title-link-sm-132">Report: Authentication Diary Study</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-132">2/04/2014</strong> <br/> Status: <span id="pub-status-sm-132">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-132"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-132"> 2/04/2014 </td> </tr> <tr id="result-133"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-133">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-133">7977</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7977/final" id="pub-title-link-133">NIST Cryptographic Standards and Guidelines Development Process</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-133">IR 7977 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7977/final" class="mobile-pub-title" id="pub-title-link-sm-133">NIST Cryptographic Standards and Guidelines Development Process</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-133">3/31/2016</strong> <br/> Status: <span id="pub-status-sm-133">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-133"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-133"> 3/31/2016 </td> </tr> <tr id="result-134"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-134">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-134">7970</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7970/final" id="pub-title-link-134">Taxonomic Rules for Password Policies: Translating the Informal to the Formal Language</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-134">IR 7970 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7970/final" class="mobile-pub-title" id="pub-title-link-sm-134">Taxonomic Rules for Password Policies: Translating the Informal to the Formal Language</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-134">12/09/2013</strong> <br/> Status: <span id="pub-status-sm-134">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-134"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-134"> 12/09/2013 </td> </tr> <tr id="result-135"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-135">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-135">7966</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7966/final" id="pub-title-link-135">Security of Interactive and Automated Access Management Using Secure Shell (SSH)</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-135">IR 7966 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7966/final" class="mobile-pub-title" id="pub-title-link-sm-135">Security of Interactive and Automated Access Management Using Secure Shell (SSH)</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-135">10/15/2015</strong> <br/> Status: <span id="pub-status-sm-135">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-135"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-135"> 10/15/2015 </td> </tr> <tr id="result-136"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-136">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-136">7957</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7957/final" id="pub-title-link-136">Conformance Test Architecture and Test Suite for ANSI/NIST-ITL 1-2011 NIEM XML Encoded Transactions</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-136">IR 7957 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7957/final" class="mobile-pub-title" id="pub-title-link-sm-136">Conformance Test Architecture and Test Suite for ANSI/NIST-ITL 1-2011 NIEM XML Encoded Transactions</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-136">9/18/2013</strong> <br/> Status: <span id="pub-status-sm-136">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-136"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-136"> 9/18/2013 </td> </tr> <tr id="result-137"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-137">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-137">7956</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7956/final" id="pub-title-link-137">Cryptographic Key Management Issues & Challenges in Cloud Services</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-137">IR 7956 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7956/final" class="mobile-pub-title" id="pub-title-link-sm-137">Cryptographic Key Management Issues & Challenges in Cloud Services</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-137">9/18/2013</strong> <br/> Status: <span id="pub-status-sm-137">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-137"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-137"> 9/18/2013 </td> </tr> <tr id="result-138"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-138">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-138">7946</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7946/final" id="pub-title-link-138">CVSS Implementation Guidance</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-138">IR 7946 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7946/final" class="mobile-pub-title" id="pub-title-link-sm-138">CVSS Implementation Guidance</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-138">4/28/2014</strong> <br/> Status: <span id="pub-status-sm-138">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-138"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-138"> 4/28/2014 </td> </tr> <tr id="result-139"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-139">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-139">7933</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7933/final" id="pub-title-link-139">Requirements and Conformance Test Assertions for ANSI/NIST-ITL 1-2011 Record Type 18 - DNA Record</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-139">IR 7933 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7933/final" class="mobile-pub-title" id="pub-title-link-sm-139">Requirements and Conformance Test Assertions for ANSI/NIST-ITL 1-2011 Record Type 18 - DNA Record</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-139">6/21/2013</strong> <br/> Status: <span id="pub-status-sm-139">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-139"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-139"> 6/21/2013 </td> </tr> <tr id="result-140"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-140">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-140">7916</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7916/final" id="pub-title-link-140">Proceedings of the Cybersecurity in Cyber-Physical Systems Workshop, April 23-24, 2012</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-140">IR 7916 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7916/final" class="mobile-pub-title" id="pub-title-link-sm-140">Proceedings of the Cybersecurity in Cyber-Physical Systems Workshop, April 23-24, 2012</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-140">2/15/2013</strong> <br/> Status: <span id="pub-status-sm-140">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-140"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-140"> 2/15/2013 </td> </tr> <tr id="result-141"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-141">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-141">7904</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7904/final" id="pub-title-link-141">Trusted Geolocation in the Cloud: Proof of Concept Implementation</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-141">IR 7904 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7904/final" class="mobile-pub-title" id="pub-title-link-sm-141">Trusted Geolocation in the Cloud: Proof of Concept Implementation</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-141">12/10/2015</strong> <br/> Status: <span id="pub-status-sm-141">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-141"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-141"> 12/10/2015 </td> </tr> <tr id="result-142"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-142">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-142">7896</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7896/final" id="pub-title-link-142">Third-Round Report of the SHA-3 Cryptographic Hash Algorithm Competition</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-142">IR 7896 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7896/final" class="mobile-pub-title" id="pub-title-link-sm-142">Third-Round Report of the SHA-3 Cryptographic Hash Algorithm Competition</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-142">11/15/2012</strong> <br/> Status: <span id="pub-status-sm-142">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-142"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-142"> 11/15/2012 </td> </tr> <tr id="result-143"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-143">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-143">7878</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7878/final" id="pub-title-link-143">Combinatorial Coverage Measurement</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-143">IR 7878 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7878/final" class="mobile-pub-title" id="pub-title-link-sm-143">Combinatorial Coverage Measurement</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-143">10/26/2012</strong> <br/> Status: <span id="pub-status-sm-143">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-143"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-143"> 10/26/2012 </td> </tr> <tr id="result-144"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-144">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-144">7877</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7877/final" id="pub-title-link-144">BioCTS 2012: Advanced Conformance Test Architectures and Test Suites for Biometric Data Interchange Formats and Biometric Information Records</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-144">IR 7877 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7877/final" class="mobile-pub-title" id="pub-title-link-sm-144">BioCTS 2012: Advanced Conformance Test Architectures and Test Suites for Biometric Data Interchange Formats and Biometric Information Records</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-144">9/14/2012</strong> <br/> Status: <span id="pub-status-sm-144">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-144"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-144"> 9/14/2012 </td> </tr> <tr id="result-145"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-145">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-145">7874</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7874/final" id="pub-title-link-145">Guidelines for Access Control System Evaluation Metrics</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-145">IR 7874 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7874/final" class="mobile-pub-title" id="pub-title-link-sm-145">Guidelines for Access Control System Evaluation Metrics</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-145">9/14/2012</strong> <br/> Status: <span id="pub-status-sm-145">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-145"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-145"> 9/14/2012 </td> </tr> <tr id="result-146"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-146">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-146">7870</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7870/final" id="pub-title-link-146">NIST Test Personal Identity Verification (PIV) Cards</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-146">IR 7870 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7870/final" class="mobile-pub-title" id="pub-title-link-sm-146">NIST Test Personal Identity Verification (PIV) Cards</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-146">7/12/2012</strong> <br/> Status: <span id="pub-status-sm-146">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-146"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-146"> 7/12/2012 </td> </tr> <tr id="result-147"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-147">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-147">7867 E2012</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7867/e2012/final" id="pub-title-link-147">Usability of PIV Smartcards for Logical Access</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-147">IR 7867 E2012 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7867/e2012/final" class="mobile-pub-title" id="pub-title-link-sm-147">Usability of PIV Smartcards for Logical Access</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-147">8/01/2012</strong> <br/> Status: <span id="pub-status-sm-147">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-147"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-147"> 8/01/2012 </td> </tr> <tr id="result-148"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-148">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-148">7864</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7864/final" id="pub-title-link-148">The Common Misuse Scoring System (CMSS): Metrics for Software Feature Misuse Vulnerabilities</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-148">IR 7864 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7864/final" class="mobile-pub-title" id="pub-title-link-sm-148">The Common Misuse Scoring System (CMSS): Metrics for Software Feature Misuse Vulnerabilities</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-148">7/10/2012</strong> <br/> Status: <span id="pub-status-sm-148">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-148"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-148"> 7/10/2012 </td> </tr> <tr id="result-149"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-149">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-149">7863</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7863/final" id="pub-title-link-149">Cardholder Authentication for the PIV Digital Signature Key</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-149">IR 7863 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7863/final" class="mobile-pub-title" id="pub-title-link-sm-149">Cardholder Authentication for the PIV Digital Signature Key</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-149">6/18/2015</strong> <br/> Status: <span id="pub-status-sm-149">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-149"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-149"> 6/18/2015 </td> </tr> <tr id="result-150"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-150">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-150">7849</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7849/final" id="pub-title-link-150">A Methodology for Developing Authentication Assurance Level Taxonomy for Smart Card-based Identity Verification</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-150">IR 7849 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7849/final" class="mobile-pub-title" id="pub-title-link-sm-150">A Methodology for Developing Authentication Assurance Level Taxonomy for Smart Card-based Identity Verification</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-150">3/05/2014</strong> <br/> Status: <span id="pub-status-sm-150">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-150"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-150"> 3/05/2014 </td> </tr> <tr id="result-151"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-151">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-151">7848</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7848/ipd" id="pub-title-link-151">Specification for the Asset Summary Reporting Format 1.0</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-151">IR 7848 (Initial Public Draft)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7848/ipd" class="mobile-pub-title" id="pub-title-link-sm-151">Specification for the Asset Summary Reporting Format 1.0</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-151">5/07/2012</strong> <br/> Status: <span id="pub-status-sm-151">Draft</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-151"> Draft </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-151"> 5/07/2012 </td> </tr> <tr id="result-152"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-152">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-152">7823</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7823/final" id="pub-title-link-152">Advanced Metering Infrastructure Smart Meter Upgradeability Test Framework</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-152">IR 7823 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7823/final" class="mobile-pub-title" id="pub-title-link-sm-152">Advanced Metering Infrastructure Smart Meter Upgradeability Test Framework</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-152">3/02/2015</strong> <br/> Status: <span id="pub-status-sm-152">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-152"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-152"> 3/02/2015 </td> </tr> <tr id="result-153"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-153">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-153">7817</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7817/final" id="pub-title-link-153">A Credential Reliability and Revocation Model for Federated Identities</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-153">IR 7817 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7817/final" class="mobile-pub-title" id="pub-title-link-sm-153">A Credential Reliability and Revocation Model for Federated Identities</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-153">11/29/2012</strong> <br/> Status: <span id="pub-status-sm-153">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-153"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-153"> 11/29/2012 </td> </tr> <tr id="result-154"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-154">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-154">7816</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7816/final" id="pub-title-link-154">Computer Security Division 2011 Annual Report</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-154">IR 7816 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7816/final" class="mobile-pub-title" id="pub-title-link-sm-154">Computer Security Division 2011 Annual Report</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-154">5/08/2012</strong> <br/> Status: <span id="pub-status-sm-154">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-154"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-154"> 5/08/2012 </td> </tr> <tr id="result-155"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-155">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-155">7815</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7815/final" id="pub-title-link-155">Access Control for SAR Systems</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-155">IR 7815 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7815/final" class="mobile-pub-title" id="pub-title-link-sm-155">Access Control for SAR Systems</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-155">7/01/2011</strong> <br/> Status: <span id="pub-status-sm-155">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-155"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-155"> 7/01/2011 </td> </tr> <tr id="result-156"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-156">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-156">7806</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7806/final" id="pub-title-link-156">ANSI/NIST-ITL 1-2011 Requirements and Conformance Test Assertions</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-156">IR 7806 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7806/final" class="mobile-pub-title" id="pub-title-link-sm-156">ANSI/NIST-ITL 1-2011 Requirements and Conformance Test Assertions</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-156">9/16/2011</strong> <br/> Status: <span id="pub-status-sm-156">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-156"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-156"> 9/16/2011 </td> </tr> <tr id="result-157"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-157">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-157">7802</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7802/final" id="pub-title-link-157">Trust Model for Security Automation Data 1.0 (TMSAD)</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-157">IR 7802 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7802/final" class="mobile-pub-title" id="pub-title-link-sm-157">Trust Model for Security Automation Data 1.0 (TMSAD)</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-157">9/20/2011</strong> <br/> Status: <span id="pub-status-sm-157">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-157"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-157"> 9/20/2011 </td> </tr> <tr id="result-158"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-158">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-158">7791</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7791/final" id="pub-title-link-158">Conformance Test Architecture and Test Suite for ANSI/NIST-ITL 1-2007</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-158">IR 7791 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7791/final" class="mobile-pub-title" id="pub-title-link-sm-158">Conformance Test Architecture and Test Suite for ANSI/NIST-ITL 1-2007</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-158">6/22/2011</strong> <br/> Status: <span id="pub-status-sm-158">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-158"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-158"> 6/22/2011 </td> </tr> <tr id="result-159"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-159">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-159">7788</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7788/final" id="pub-title-link-159">Security Risk Analysis of Enterprise Networks Using Probabilistic Attack Graphs</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-159">IR 7788 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7788/final" class="mobile-pub-title" id="pub-title-link-sm-159">Security Risk Analysis of Enterprise Networks Using Probabilistic Attack Graphs</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-159">8/01/2011</strong> <br/> Status: <span id="pub-status-sm-159">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-159"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-159"> 8/01/2011 </td> </tr> <tr id="result-160"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-160">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-160">7773</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7773/final" id="pub-title-link-160">An Application of Combinatorial Methods to Conformance Testing for Document Object Model Events</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-160">IR 7773 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7773/final" class="mobile-pub-title" id="pub-title-link-sm-160">An Application of Combinatorial Methods to Conformance Testing for Document Object Model Events</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-160">11/01/2010</strong> <br/> Status: <span id="pub-status-sm-160">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-160"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-160"> 11/01/2010 </td> </tr> <tr id="result-161"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-161">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-161">7771</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7771/final" id="pub-title-link-161">Conformance Test Architecture for Biometric Data Interchange Formats - Version Beta 2.0</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-161">IR 7771 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7771/final" class="mobile-pub-title" id="pub-title-link-sm-161">Conformance Test Architecture for Biometric Data Interchange Formats - Version Beta 2.0</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-161">2/28/2011</strong> <br/> Status: <span id="pub-status-sm-161">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-161"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-161"> 2/28/2011 </td> </tr> <tr id="result-162"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-162">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-162">7770</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7770/final" id="pub-title-link-162">Security Considerations for Remote Electronic UOCAVA Voting</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-162">IR 7770 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7770/final" class="mobile-pub-title" id="pub-title-link-sm-162">Security Considerations for Remote Electronic UOCAVA Voting</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-162">2/21/2011</strong> <br/> Status: <span id="pub-status-sm-162">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-162"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-162"> 2/21/2011 </td> </tr> <tr id="result-163"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-163">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-163">7764</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7764/final" id="pub-title-link-163">Status Report on the Second Round of the SHA-3 Cryptographic Hash Algorithm Competition</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-163">IR 7764 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7764/final" class="mobile-pub-title" id="pub-title-link-sm-163">Status Report on the Second Round of the SHA-3 Cryptographic Hash Algorithm Competition</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-163">2/23/2011</strong> <br/> Status: <span id="pub-status-sm-163">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-163"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-163"> 2/23/2011 </td> </tr> <tr id="result-164"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-164">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-164">7751</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7751/final" id="pub-title-link-164">Computer Security Division 2010 Annual Report</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-164">IR 7751 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7751/final" class="mobile-pub-title" id="pub-title-link-sm-164">Computer Security Division 2010 Annual Report</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-164">5/31/2011</strong> <br/> Status: <span id="pub-status-sm-164">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-164"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-164"> 5/31/2011 </td> </tr> <tr id="result-165"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-165">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-165">7711</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7711/final" id="pub-title-link-165">Security Best Practices for the Electronic Transmission of Election Materials for UOCAVA Voters</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-165">IR 7711 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7711/final" class="mobile-pub-title" id="pub-title-link-sm-165">Security Best Practices for the Electronic Transmission of Election Materials for UOCAVA Voters</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-165">9/15/2011</strong> <br/> Status: <span id="pub-status-sm-165">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-165"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-165"> 9/15/2011 </td> </tr> <tr id="result-166"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-166">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-166">7698</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7698/final" id="pub-title-link-166">Common Platform Enumeration: Applicability Language Specification Version 2.3</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-166">IR 7698 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7698/final" class="mobile-pub-title" id="pub-title-link-sm-166">Common Platform Enumeration: Applicability Language Specification Version 2.3</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-166">8/19/2011</strong> <br/> Status: <span id="pub-status-sm-166">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-166"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-166"> 8/19/2011 </td> </tr> <tr id="result-167"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-167">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-167">7697</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7697/final" id="pub-title-link-167">Common Platform Enumeration: Dictionary Specification Version 2.3</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-167">IR 7697 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7697/final" class="mobile-pub-title" id="pub-title-link-sm-167">Common Platform Enumeration: Dictionary Specification Version 2.3</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-167">8/19/2011</strong> <br/> Status: <span id="pub-status-sm-167">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-167"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-167"> 8/19/2011 </td> </tr> <tr id="result-168"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-168">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-168">7696</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7696/final" id="pub-title-link-168">Common Platform Enumeration: Name Matching Specification Version 2.3</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-168">IR 7696 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7696/final" class="mobile-pub-title" id="pub-title-link-sm-168">Common Platform Enumeration: Name Matching Specification Version 2.3</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-168">8/19/2011</strong> <br/> Status: <span id="pub-status-sm-168">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-168"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-168"> 8/19/2011 </td> </tr> <tr id="result-169"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-169">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-169">7695</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7695/final" id="pub-title-link-169">Common Platform Enumeration: Naming Specification Version 2.3</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-169">IR 7695 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7695/final" class="mobile-pub-title" id="pub-title-link-sm-169">Common Platform Enumeration: Naming Specification Version 2.3</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-169">8/19/2011</strong> <br/> Status: <span id="pub-status-sm-169">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-169"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-169"> 8/19/2011 </td> </tr> <tr id="result-170"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-170">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-170">7694</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7694/final" id="pub-title-link-170">Specification for Asset Reporting Format 1.1</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-170">IR 7694 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7694/final" class="mobile-pub-title" id="pub-title-link-sm-170">Specification for Asset Reporting Format 1.1</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-170">6/21/2011</strong> <br/> Status: <span id="pub-status-sm-170">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-170"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-170"> 6/21/2011 </td> </tr> <tr id="result-171"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-171">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-171">7693</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7693/final" id="pub-title-link-171">Specification for Asset Identification 1.1</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-171">IR 7693 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7693/final" class="mobile-pub-title" id="pub-title-link-sm-171">Specification for Asset Identification 1.1</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-171">6/17/2011</strong> <br/> Status: <span id="pub-status-sm-171">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-171"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-171"> 6/17/2011 </td> </tr> <tr id="result-172"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-172">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-172">7692</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7692/final" id="pub-title-link-172">Specification for the Open Checklist Interactive Language (OCIL) Version 2.0</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-172">IR 7692 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7692/final" class="mobile-pub-title" id="pub-title-link-sm-172">Specification for the Open Checklist Interactive Language (OCIL) Version 2.0</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-172">4/07/2011</strong> <br/> Status: <span id="pub-status-sm-172">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-172"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-172"> 4/07/2011 </td> </tr> <tr id="result-173"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-173">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-173">7682</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7682/final" id="pub-title-link-173">Information System Security Best Practices for UOCAVA-Supporting Systems</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-173">IR 7682 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7682/final" class="mobile-pub-title" id="pub-title-link-sm-173">Information System Security Best Practices for UOCAVA-Supporting Systems</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-173">9/15/2011</strong> <br/> Status: <span id="pub-status-sm-173">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-173"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-173"> 9/15/2011 </td> </tr> <tr id="result-174"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-174">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-174">7676</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7676/final" id="pub-title-link-174">Maintaining and Using Key History on Personal Identity Verification (PIV) Cards</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-174">IR 7676 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7676/final" class="mobile-pub-title" id="pub-title-link-sm-174">Maintaining and Using Key History on Personal Identity Verification (PIV) Cards</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-174">6/18/2010</strong> <br/> Status: <span id="pub-status-sm-174">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-174"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-174"> 6/18/2010 </td> </tr> <tr id="result-175"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-175">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-175">7665</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7665/final" id="pub-title-link-175">Proceedings of the Privilege Management Workshop, September 1-3, 2009</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-175">IR 7665 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7665/final" class="mobile-pub-title" id="pub-title-link-sm-175">Proceedings of the Privilege Management Workshop, September 1-3, 2009</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-175">1/01/2010</strong> <br/> Status: <span id="pub-status-sm-175">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-175"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-175"> 1/01/2010 </td> </tr> <tr id="result-176"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-176">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-176">7658</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7658/final" id="pub-title-link-176">Guide to SIMfill Use and Development</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-176">IR 7658 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7658/final" class="mobile-pub-title" id="pub-title-link-sm-176">Guide to SIMfill Use and Development</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-176">2/24/2010</strong> <br/> Status: <span id="pub-status-sm-176">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-176"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-176"> 2/24/2010 </td> </tr> <tr id="result-177"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-177">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-177">7657</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7657/final" id="pub-title-link-177">A Report on the Privilege (Access) Management Workshop</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-177">IR 7657 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7657/final" class="mobile-pub-title" id="pub-title-link-sm-177">A Report on the Privilege (Access) Management Workshop</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-177">3/30/2010</strong> <br/> Status: <span id="pub-status-sm-177">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-177"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-177"> 3/30/2010 </td> </tr> <tr id="result-178"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-178">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-178">7653</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7653/final" id="pub-title-link-178">Computer Security Division 2009 Annual Report</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-178">IR 7653 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7653/final" class="mobile-pub-title" id="pub-title-link-sm-178">Computer Security Division 2009 Annual Report</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-178">3/23/2010</strong> <br/> Status: <span id="pub-status-sm-178">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-178"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-178"> 3/23/2010 </td> </tr> <tr id="result-179"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-179">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-179">7628 Rev. 1</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7628/r1/final" id="pub-title-link-179">Guidelines for Smart Grid Cybersecurity</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-179">IR 7628 Rev. 1 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7628/r1/final" class="mobile-pub-title" id="pub-title-link-sm-179">Guidelines for Smart Grid Cybersecurity</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-179">9/25/2014</strong> <br/> Status: <span id="pub-status-sm-179">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-179"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-179"> 9/25/2014 </td> </tr> <tr id="result-180"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-180">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-180">7622</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7622/final" id="pub-title-link-180">Notional Supply Chain Risk Management Practices for Federal Information Systems</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-180">IR 7622 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7622/final" class="mobile-pub-title" id="pub-title-link-sm-180">Notional Supply Chain Risk Management Practices for Federal Information Systems</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-180">10/16/2012</strong> <br/> Status: <span id="pub-status-sm-180">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-180"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-180"> 10/16/2012 </td> </tr> <tr id="result-181"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-181">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-181">7621 Rev. 1</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7621/r1/final" id="pub-title-link-181">Small Business Information Security: The Fundamentals</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-181">IR 7621 Rev. 1 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7621/r1/final" class="mobile-pub-title" id="pub-title-link-sm-181">Small Business Information Security: The Fundamentals</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-181">11/03/2016</strong> <br/> Status: <span id="pub-status-sm-181">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-181"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-181"> 11/03/2016 </td> </tr> <tr id="result-182"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-182">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-182">7620</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7620/final" id="pub-title-link-182">Status Report on the First Round of the SHA-3 Cryptographic Hash Algorithm Competition</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-182">IR 7620 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7620/final" class="mobile-pub-title" id="pub-title-link-sm-182">Status Report on the First Round of the SHA-3 Cryptographic Hash Algorithm Competition</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-182">9/23/2009</strong> <br/> Status: <span id="pub-status-sm-182">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-182"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-182"> 9/23/2009 </td> </tr> <tr id="result-183"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-183">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-183">7617</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7617/final" id="pub-title-link-183">Mobile Forensic Reference Materials: a Methodology and Reification</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-183">IR 7617 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7617/final" class="mobile-pub-title" id="pub-title-link-sm-183">Mobile Forensic Reference Materials: a Methodology and Reification</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-183">10/14/2009</strong> <br/> Status: <span id="pub-status-sm-183">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-183"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-183"> 10/14/2009 </td> </tr> <tr id="result-184"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-184">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-184">7611</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7611/final" id="pub-title-link-184">Use of ISO/IEC 24727</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-184">IR 7611 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7611/final" class="mobile-pub-title" id="pub-title-link-sm-184">Use of ISO/IEC 24727</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-184">8/14/2009</strong> <br/> Status: <span id="pub-status-sm-184">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-184"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-184"> 8/14/2009 </td> </tr> <tr id="result-185"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-185">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-185">7609</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7609/final" id="pub-title-link-185">Cryptographic Key Management Workshop Summary -- June 8-9, 2009</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-185">IR 7609 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7609/final" class="mobile-pub-title" id="pub-title-link-sm-185">Cryptographic Key Management Workshop Summary -- June 8-9, 2009</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-185">1/08/2010</strong> <br/> Status: <span id="pub-status-sm-185">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-185"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-185"> 1/08/2010 </td> </tr> <tr id="result-186"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-186">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-186">7601</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7601/final" id="pub-title-link-186">Framework for Emergency Response Officials (ERO): Authentication and Authorization Infrastructure</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-186">IR 7601 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7601/final" class="mobile-pub-title" id="pub-title-link-sm-186">Framework for Emergency Response Officials (ERO): Authentication and Authorization Infrastructure</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-186">8/31/2010</strong> <br/> Status: <span id="pub-status-sm-186">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-186"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-186"> 8/31/2010 </td> </tr> <tr id="result-187"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-187">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-187">7581</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7581/final" id="pub-title-link-187">System and Network Security Acronyms and Abbreviations</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-187">IR 7581 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7581/final" class="mobile-pub-title" id="pub-title-link-sm-187">System and Network Security Acronyms and Abbreviations</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-187">9/30/2009</strong> <br/> Status: <span id="pub-status-sm-187">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-187"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-187"> 9/30/2009 </td> </tr> <tr id="result-188"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-188">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-188">7564</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7564/final" id="pub-title-link-188">Directions in Security Metrics Research</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-188">IR 7564 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7564/final" class="mobile-pub-title" id="pub-title-link-sm-188">Directions in Security Metrics Research</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-188">4/30/2009</strong> <br/> Status: <span id="pub-status-sm-188">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-188"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-188"> 4/30/2009 </td> </tr> <tr id="result-189"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-189">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-189">7559</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7559/final" id="pub-title-link-189">Forensics Web Services (FWS)</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-189">IR 7559 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7559/final" class="mobile-pub-title" id="pub-title-link-sm-189">Forensics Web Services (FWS)</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-189">6/30/2010</strong> <br/> Status: <span id="pub-status-sm-189">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-189"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-189"> 6/30/2010 </td> </tr> <tr id="result-190"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-190">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-190">7551</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7551/final" id="pub-title-link-190">A Threat Analysis on UOCAVA Voting Systems</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-190">IR 7551 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7551/final" class="mobile-pub-title" id="pub-title-link-sm-190">A Threat Analysis on UOCAVA Voting Systems</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-190">12/19/2008</strong> <br/> Status: <span id="pub-status-sm-190">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-190"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-190"> 12/19/2008 </td> </tr> <tr id="result-191"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-191">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-191">7539</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7539/final" id="pub-title-link-191">Symmetric Key Injection onto Smart Cards</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-191">IR 7539 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7539/final" class="mobile-pub-title" id="pub-title-link-sm-191">Symmetric Key Injection onto Smart Cards</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-191">12/22/2008</strong> <br/> Status: <span id="pub-status-sm-191">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-191"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-191"> 12/22/2008 </td> </tr> <tr id="result-192"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-192">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-192">7536</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7536/final" id="pub-title-link-192">Computer Security Division 2008 Annual Report</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-192">IR 7536 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7536/final" class="mobile-pub-title" id="pub-title-link-sm-192">Computer Security Division 2008 Annual Report</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-192">3/16/2009</strong> <br/> Status: <span id="pub-status-sm-192">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-192"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-192"> 3/16/2009 </td> </tr> <tr id="result-193"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-193">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-193">7516</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7516/final" id="pub-title-link-193">Forensic Filtering of Cell Phone Protocols</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-193">IR 7516 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7516/final" class="mobile-pub-title" id="pub-title-link-sm-193">Forensic Filtering of Cell Phone Protocols</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-193">8/27/2008</strong> <br/> Status: <span id="pub-status-sm-193">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-193"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-193"> 8/27/2008 </td> </tr> <tr id="result-194"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-194">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-194">7511 Rev. 5</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7511/r5/final" id="pub-title-link-194">Security Content Automation Protocol (SCAP) Version 1.3 Validation Program Test Requirements</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-194">IR 7511 Rev. 5 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7511/r5/final" class="mobile-pub-title" id="pub-title-link-sm-194">Security Content Automation Protocol (SCAP) Version 1.3 Validation Program Test Requirements</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-194">4/20/2018</strong> <br/> Status: <span id="pub-status-sm-194">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-194"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-194"> 4/20/2018 </td> </tr> <tr id="result-195"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-195">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-195">7511 Rev. 4</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7511/r4/final" id="pub-title-link-195">Security Content Automation Protocol (SCAP) Version 1.2 Validation Program Test Requirements</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-195">IR 7511 Rev. 4 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7511/r4/final" class="mobile-pub-title" id="pub-title-link-sm-195">Security Content Automation Protocol (SCAP) Version 1.2 Validation Program Test Requirements</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-195">1/28/2016</strong> <br/> Status: <span id="pub-status-sm-195">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-195"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-195"> 1/28/2016 </td> </tr> <tr id="result-196"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-196">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-196">7502</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7502/final" id="pub-title-link-196">The Common Configuration Scoring System (CCSS): Metrics for Software Security Configuration Vulnerabilities</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-196">IR 7502 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7502/final" class="mobile-pub-title" id="pub-title-link-sm-196">The Common Configuration Scoring System (CCSS): Metrics for Software Security Configuration Vulnerabilities</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-196">12/27/2010</strong> <br/> Status: <span id="pub-status-sm-196">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-196"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-196"> 12/27/2010 </td> </tr> <tr id="result-197"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-197">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-197">7497</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7497/final" id="pub-title-link-197">Security Architecture Design Process for Health Information Exchanges (HIEs)</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-197">IR 7497 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7497/final" class="mobile-pub-title" id="pub-title-link-sm-197">Security Architecture Design Process for Health Information Exchanges (HIEs)</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-197">9/30/2010</strong> <br/> Status: <span id="pub-status-sm-197">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-197"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-197"> 9/30/2010 </td> </tr> <tr id="result-198"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-198">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-198">7452</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7452/final" id="pub-title-link-198">Secure Biometric Match-on-Card Feasibility Report</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-198">IR 7452 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7452/final" class="mobile-pub-title" id="pub-title-link-sm-198">Secure Biometric Match-on-Card Feasibility Report</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-198">11/30/2007</strong> <br/> Status: <span id="pub-status-sm-198">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-198"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-198"> 11/30/2007 </td> </tr> <tr id="result-199"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-199">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-199">7442</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7442/final" id="pub-title-link-199">Computer Security Division 2007 Annual Report</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-199">IR 7442 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7442/final" class="mobile-pub-title" id="pub-title-link-sm-199">Computer Security Division 2007 Annual Report</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-199">4/01/2008</strong> <br/> Status: <span id="pub-status-sm-199">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-199"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-199"> 4/01/2008 </td> </tr> <tr id="result-200"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-200">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-200">7435</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7435/final" id="pub-title-link-200">The Common Vulnerability Scoring System (CVSS) and its Applicability to Federal Agency Systems</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-200">IR 7435 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7435/final" class="mobile-pub-title" id="pub-title-link-sm-200">The Common Vulnerability Scoring System (CVSS) and its Applicability to Federal Agency Systems</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-200">8/30/2007</strong> <br/> Status: <span id="pub-status-sm-200">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-200"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-200"> 8/30/2007 </td> </tr> <tr id="result-201"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-201">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-201">7427</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7427/final" id="pub-title-link-201">6th Annual PKI R&D Workshop "Applications-Driven PKI" Proceedings</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-201">IR 7427 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7427/final" class="mobile-pub-title" id="pub-title-link-sm-201">6th Annual PKI R&D Workshop "Applications-Driven PKI" Proceedings</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-201">9/13/2007</strong> <br/> Status: <span id="pub-status-sm-201">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-201"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-201"> 9/13/2007 </td> </tr> <tr id="result-202"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-202">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-202">7399</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7399/final" id="pub-title-link-202">Computer Security Division 2006 Annual Report</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-202">IR 7399 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7399/final" class="mobile-pub-title" id="pub-title-link-sm-202">Computer Security Division 2006 Annual Report</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-202">3/21/2007</strong> <br/> Status: <span id="pub-status-sm-202">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-202"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-202"> 3/21/2007 </td> </tr> <tr id="result-203"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-203">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-203">7387</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7387/final" id="pub-title-link-203">Cell Phone Forensic Tools: an Overview and Analysis Update</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-203">IR 7387 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7387/final" class="mobile-pub-title" id="pub-title-link-sm-203">Cell Phone Forensic Tools: an Overview and Analysis Update</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-203">3/21/2007</strong> <br/> Status: <span id="pub-status-sm-203">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-203"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-203"> 3/21/2007 </td> </tr> <tr id="result-204"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-204">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-204">7359</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7359/final" id="pub-title-link-204">Information Security Guide for Government Executives</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-204">IR 7359 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7359/final" class="mobile-pub-title" id="pub-title-link-sm-204">Information Security Guide for Government Executives</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-204">1/01/2007</strong> <br/> Status: <span id="pub-status-sm-204">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-204"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-204"> 1/01/2007 </td> </tr> <tr id="result-205"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-205">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-205">7358</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7358/final" id="pub-title-link-205">Program Review for Information Security Management Assistance (PRISMA)</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-205">IR 7358 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7358/final" class="mobile-pub-title" id="pub-title-link-sm-205">Program Review for Information Security Management Assistance (PRISMA)</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-205">1/01/2007</strong> <br/> Status: <span id="pub-status-sm-205">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-205"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-205"> 1/01/2007 </td> </tr> <tr id="result-206"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-206">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-206">7337</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7337/final" id="pub-title-link-206">Personal Identity Verification Demonstration Summary</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-206">IR 7337 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7337/final" class="mobile-pub-title" id="pub-title-link-sm-206">Personal Identity Verification Demonstration Summary</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-206">8/31/2006</strong> <br/> Status: <span id="pub-status-sm-206">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-206"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-206"> 8/31/2006 </td> </tr> <tr id="result-207"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-207">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-207">7316</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7316/final" id="pub-title-link-207">Assessment of Access Control Systems</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-207">IR 7316 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7316/final" class="mobile-pub-title" id="pub-title-link-sm-207">Assessment of Access Control Systems</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-207">9/29/2006</strong> <br/> Status: <span id="pub-status-sm-207">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-207"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-207"> 9/29/2006 </td> </tr> <tr id="result-208"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-208">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-208">7313</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7313/final" id="pub-title-link-208">5th Annual PKI R&D Workshop "Making PKI Easy to Use" Proceedings</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-208">IR 7313 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7313/final" class="mobile-pub-title" id="pub-title-link-sm-208">5th Annual PKI R&D Workshop "Making PKI Easy to Use" Proceedings</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-208">7/18/2006</strong> <br/> Status: <span id="pub-status-sm-208">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-208"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-208"> 7/18/2006 </td> </tr> <tr id="result-209"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-209">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-209">7308</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7308/final" id="pub-title-link-209">An Algorithm for Generating Very Large Covering Arrays</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-209">IR 7308 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7308/final" class="mobile-pub-title" id="pub-title-link-sm-209">An Algorithm for Generating Very Large Covering Arrays</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-209">3/20/2006</strong> <br/> Status: <span id="pub-status-sm-209">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-209"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-209"> 3/20/2006 </td> </tr> <tr id="result-210"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-210">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-210">7298 Rev. 3</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7298/r3/final" id="pub-title-link-210">Glossary of Key Information Security Terms</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-210">IR 7298 Rev. 3 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7298/r3/final" class="mobile-pub-title" id="pub-title-link-sm-210">Glossary of Key Information Security Terms</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-210">7/03/2019</strong> <br/> Status: <span id="pub-status-sm-210">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-210"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-210"> 7/03/2019 </td> </tr> <tr id="result-211"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-211">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-211">7290</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7290/final" id="pub-title-link-211">Fingerprint Identification and Mobile Handheld Devices: An Overview and Implementation</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-211">IR 7290 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7290/final" class="mobile-pub-title" id="pub-title-link-sm-211">Fingerprint Identification and Mobile Handheld Devices: An Overview and Implementation</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-211">3/01/2006</strong> <br/> Status: <span id="pub-status-sm-211">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-211"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-211"> 3/01/2006 </td> </tr> <tr id="result-212"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-212">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-212">7285</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7285/final" id="pub-title-link-212">Computer Security Division 2005 Annual Report</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-212">IR 7285 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7285/final" class="mobile-pub-title" id="pub-title-link-sm-212">Computer Security Division 2005 Annual Report</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-212">2/01/2006</strong> <br/> Status: <span id="pub-status-sm-212">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-212"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-212"> 2/01/2006 </td> </tr> <tr id="result-213"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-213">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-213">7284</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7284/final" id="pub-title-link-213">Personal Identity Verification Card Management Report</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-213">IR 7284 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7284/final" class="mobile-pub-title" id="pub-title-link-sm-213">Personal Identity Verification Card Management Report</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-213">1/06/2006</strong> <br/> Status: <span id="pub-status-sm-213">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-213"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-213"> 1/06/2006 </td> </tr> <tr id="result-214"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-214">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-214">7275 Rev. 4</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7275/r4/upd1/final" id="pub-title-link-214">Specification for the Extensible Configuration Checklist Description Format (XCCDF) Version 1.2</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-214">IR 7275 Rev. 4 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7275/r4/upd1/final" class="mobile-pub-title" id="pub-title-link-sm-214">Specification for the Extensible Configuration Checklist Description Format (XCCDF) Version 1.2</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-214">3/01/2012</strong> <br/> Status: <span id="pub-status-sm-214">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-214"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-214"> 3/01/2012 </td> </tr> <tr id="result-215"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-215">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-215">7275 Rev. 3</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7275/r3/final" id="pub-title-link-215">Specification for the Extensible Configuration Checklist Description Format (XCCDF) Version 1.1.4</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-215">IR 7275 Rev. 3 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7275/r3/final" class="mobile-pub-title" id="pub-title-link-sm-215">Specification for the Extensible Configuration Checklist Description Format (XCCDF) Version 1.1.4</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-215">1/01/2008</strong> <br/> Status: <span id="pub-status-sm-215">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-215"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-215"> 1/01/2008 </td> </tr> <tr id="result-216"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-216">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-216">7275 Rev. 2</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7275/r2/final" id="pub-title-link-216">Specification for the Extensible Configuration Checklist Description Format (XCCDF) Version 1.1.3</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-216">IR 7275 Rev. 2 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7275/r2/final" class="mobile-pub-title" id="pub-title-link-sm-216">Specification for the Extensible Configuration Checklist Description Format (XCCDF) Version 1.1.3</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-216">4/30/2007</strong> <br/> Status: <span id="pub-status-sm-216">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-216"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-216"> 4/30/2007 </td> </tr> <tr id="result-217"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-217">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-217">7275</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7275/final" id="pub-title-link-217">Specification for the Extensible Configuration Checklist Description Format (XCCDF) Version 1.1</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-217">IR 7275 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7275/final" class="mobile-pub-title" id="pub-title-link-sm-217">Specification for the Extensible Configuration Checklist Description Format (XCCDF) Version 1.1</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-217">11/01/2006</strong> <br/> Status: <span id="pub-status-sm-217">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-217"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-217"> 11/01/2006 </td> </tr> <tr id="result-218"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-218">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-218">7250</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7250/final" id="pub-title-link-218">Cell Phone Forensic Tools: an Overview and Analysis</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-218">IR 7250 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7250/final" class="mobile-pub-title" id="pub-title-link-sm-218">Cell Phone Forensic Tools: an Overview and Analysis</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-218">10/19/2005</strong> <br/> Status: <span id="pub-status-sm-218">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-218"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-218"> 10/19/2005 </td> </tr> <tr id="result-219"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-219">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-219">7224</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7224/final" id="pub-title-link-219">4th Annual PKI R&D Workshop "Multiple Paths to Trust" Proceedings</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-219">IR 7224 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7224/final" class="mobile-pub-title" id="pub-title-link-sm-219">4th Annual PKI R&D Workshop "Multiple Paths to Trust" Proceedings</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-219">8/01/2005</strong> <br/> Status: <span id="pub-status-sm-219">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-219"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-219"> 8/01/2005 </td> </tr> <tr id="result-220"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-220">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-220">7219</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7219/final" id="pub-title-link-220">Computer Security Division 2004 Annual Report</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-220">IR 7219 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7219/final" class="mobile-pub-title" id="pub-title-link-sm-220">Computer Security Division 2004 Annual Report</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-220">8/01/2005</strong> <br/> Status: <span id="pub-status-sm-220">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-220"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-220"> 8/01/2005 </td> </tr> <tr id="result-221"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-221">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-221">7206</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7206/final" id="pub-title-link-221">Smart Cards and Mobile Device Authentication: an Overview and Implementation</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-221">IR 7206 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7206/final" class="mobile-pub-title" id="pub-title-link-sm-221">Smart Cards and Mobile Device Authentication: an Overview and Implementation</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-221">7/01/2005</strong> <br/> Status: <span id="pub-status-sm-221">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-221"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-221"> 7/01/2005 </td> </tr> <tr id="result-222"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-222">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-222">7200</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7200/final" id="pub-title-link-222">Proximity Beacons and Mobile Device Authentication: an Overview and Implementation</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-222">IR 7200 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7200/final" class="mobile-pub-title" id="pub-title-link-sm-222">Proximity Beacons and Mobile Device Authentication: an Overview and Implementation</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-222">6/01/2005</strong> <br/> Status: <span id="pub-status-sm-222">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-222"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-222"> 6/01/2005 </td> </tr> <tr id="result-223"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-223">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-223">7188</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7188/final" id="pub-title-link-223">Specification for the Extensible Configuration Checklist Description Format (XCCDF)</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-223">IR 7188 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7188/final" class="mobile-pub-title" id="pub-title-link-sm-223">Specification for the Extensible Configuration Checklist Description Format (XCCDF)</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-223">1/01/2005</strong> <br/> Status: <span id="pub-status-sm-223">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-223"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-223"> 1/01/2005 </td> </tr> <tr id="result-224"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-224">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-224">7122</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7122/final" id="pub-title-link-224">3rd Annual PKI Research Workshop Proceedings</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-224">IR 7122 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7122/final" class="mobile-pub-title" id="pub-title-link-sm-224">3rd Annual PKI Research Workshop Proceedings</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-224">9/08/2004</strong> <br/> Status: <span id="pub-status-sm-224">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-224"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-224"> 9/08/2004 </td> </tr> <tr id="result-225"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-225">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-225">7111</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7111/final" id="pub-title-link-225">Computer Security Division 2003 Annual Report</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-225">IR 7111 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7111/final" class="mobile-pub-title" id="pub-title-link-sm-225">Computer Security Division 2003 Annual Report</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-225">4/30/2004</strong> <br/> Status: <span id="pub-status-sm-225">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-225"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-225"> 4/30/2004 </td> </tr> <tr id="result-226"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-226">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-226">7100</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7100/final" id="pub-title-link-226">PDA Forensic Tools: an Overview and Analysis</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-226">IR 7100 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7100/final" class="mobile-pub-title" id="pub-title-link-sm-226">PDA Forensic Tools: an Overview and Analysis</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-226">8/01/2004</strong> <br/> Status: <span id="pub-status-sm-226">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-226"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-226"> 8/01/2004 </td> </tr> <tr id="result-227"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-227">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-227">7085</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7085/final" id="pub-title-link-227">2nd Annual PKI Research Workshop Proceedings</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-227">IR 7085 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7085/final" class="mobile-pub-title" id="pub-title-link-sm-227">2nd Annual PKI Research Workshop Proceedings</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-227">4/01/2004</strong> <br/> Status: <span id="pub-status-sm-227">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-227"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-227"> 4/01/2004 </td> </tr> <tr id="result-228"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-228">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-228">7059</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7059/final" id="pub-title-link-228">1st Annual PKI Research Workshop Proceedings</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-228">IR 7059 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7059/final" class="mobile-pub-title" id="pub-title-link-sm-228">1st Annual PKI Research Workshop Proceedings</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-228">11/12/2003</strong> <br/> Status: <span id="pub-status-sm-228">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-228"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-228"> 11/12/2003 </td> </tr> <tr id="result-229"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-229">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-229">7056</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7056/final" id="pub-title-link-229">Card Technology Developments and Gap Analysis Interagency Report</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-229">IR 7056 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7056/final" class="mobile-pub-title" id="pub-title-link-sm-229">Card Technology Developments and Gap Analysis Interagency Report</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-229">3/01/2004</strong> <br/> Status: <span id="pub-status-sm-229">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-229"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-229"> 3/01/2004 </td> </tr> <tr id="result-230"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-230">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-230">7046</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7046/final" id="pub-title-link-230">A Framework for Multi-mode Authentication: Overview and Implementation Guide</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-230">IR 7046 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7046/final" class="mobile-pub-title" id="pub-title-link-sm-230">A Framework for Multi-mode Authentication: Overview and Implementation Guide</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-230">8/01/2003</strong> <br/> Status: <span id="pub-status-sm-230">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-230"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-230"> 8/01/2003 </td> </tr> <tr id="result-231"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-231">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-231">7030</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7030/final" id="pub-title-link-231">Picture Password: A Visual Login Technique for Mobile Devices</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-231">IR 7030 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7030/final" class="mobile-pub-title" id="pub-title-link-sm-231">Picture Password: A Visual Login Technique for Mobile Devices</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-231">7/01/2003</strong> <br/> Status: <span id="pub-status-sm-231">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-231"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-231"> 7/01/2003 </td> </tr> <tr id="result-232"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-232">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-232">7007</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7007/final" id="pub-title-link-232">An Overview of Issues in Testing Intrusion Detection Systems</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-232">IR 7007 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/7007/final" class="mobile-pub-title" id="pub-title-link-sm-232">An Overview of Issues in Testing Intrusion Detection Systems</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-232">7/11/2003</strong> <br/> Status: <span id="pub-status-sm-232">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-232"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-232"> 7/11/2003 </td> </tr> <tr id="result-233"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-233">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-233">6985</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/6985/final" id="pub-title-link-233">COTS Security Protection Profile - Operating Systems (CSPP-OS) (Worked Example Applying Guidance of NISTIR-6462, CSPP) Version 1.0</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-233">IR 6985 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/6985/final" class="mobile-pub-title" id="pub-title-link-sm-233">COTS Security Protection Profile - Operating Systems (CSPP-OS) (Worked Example Applying Guidance of NISTIR-6462, CSPP) Version 1.0</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-233">4/01/2003</strong> <br/> Status: <span id="pub-status-sm-233">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-233"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-233"> 4/01/2003 </td> </tr> <tr id="result-234"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-234">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-234">6981</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/6981/final" id="pub-title-link-234">Policy Expression and Enforcement for Handheld Devices</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-234">IR 6981 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/6981/final" class="mobile-pub-title" id="pub-title-link-sm-234">Policy Expression and Enforcement for Handheld Devices</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-234">4/01/2003</strong> <br/> Status: <span id="pub-status-sm-234">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-234"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-234"> 4/01/2003 </td> </tr> <tr id="result-235"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-235">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-235">6977</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/6977/final" id="pub-title-link-235">Vulnerabilities in Quantum Key Distribution Protocols</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-235">IR 6977 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/6977/final" class="mobile-pub-title" id="pub-title-link-sm-235">Vulnerabilities in Quantum Key Distribution Protocols</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-235">5/01/2003</strong> <br/> Status: <span id="pub-status-sm-235">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-235"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-235"> 5/01/2003 </td> </tr> <tr id="result-236"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-236">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-236">6887 E2003</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/6887/e2003/final" id="pub-title-link-236">Government Smart Card Interoperability Specification, Version 2.1</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-236">IR 6887 E2003 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/6887/e2003/final" class="mobile-pub-title" id="pub-title-link-sm-236">Government Smart Card Interoperability Specification, Version 2.1</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-236">7/16/2003</strong> <br/> Status: <span id="pub-status-sm-236">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-236"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-236"> 7/16/2003 </td> </tr> <tr id="result-237"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-237">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-237">6859</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/6859/final" id="pub-title-link-237">IT Security for Industrial Control Systems</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-237">IR 6859 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/6859/final" class="mobile-pub-title" id="pub-title-link-sm-237">IT Security for Industrial Control Systems</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-237">2/28/2002</strong> <br/> Status: <span id="pub-status-sm-237">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-237"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-237"> 2/28/2002 </td> </tr> <tr id="result-238"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-238">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-238">6529A</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/6529/a/final" id="pub-title-link-238">Common Biometric Exchange Formats Framework (CBEFF)</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-238">IR 6529A (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/6529/a/final" class="mobile-pub-title" id="pub-title-link-sm-238">Common Biometric Exchange Formats Framework (CBEFF)</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-238">4/05/2004</strong> <br/> Status: <span id="pub-status-sm-238">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-238"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-238"> 4/05/2004 </td> </tr> <tr id="result-239"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-239">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-239">6483</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/6483/final" id="pub-title-link-239">Randomness Testing of the Advanced Encryption Standard Finalist Candidates</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-239">IR 6483 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/6483/final" class="mobile-pub-title" id="pub-title-link-sm-239">Randomness Testing of the Advanced Encryption Standard Finalist Candidates</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-239">4/01/2000</strong> <br/> Status: <span id="pub-status-sm-239">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-239"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-239"> 4/01/2000 </td> </tr> <tr id="result-240"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-240">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-240">6462</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/6462/final" id="pub-title-link-240">CSPP - Guidance for COTS Security Protection Profiles (Formerly: CS2 - Protection Profile Guidance for Near-Term COTS) Version 1.0</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-240">IR 6462 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/6462/final" class="mobile-pub-title" id="pub-title-link-sm-240">CSPP - Guidance for COTS Security Protection Profiles (Formerly: CS2 - Protection Profile Guidance for Near-Term COTS) Version 1.0</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-240">12/01/1999</strong> <br/> Status: <span id="pub-status-sm-240">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-240"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-240"> 12/01/1999 </td> </tr> <tr id="result-241"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-241">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-241">6416</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/6416/final" id="pub-title-link-241">Applying Mobile Agents to Intrusion Detection and Response</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-241">IR 6416 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/6416/final" class="mobile-pub-title" id="pub-title-link-sm-241">Applying Mobile Agents to Intrusion Detection and Response</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-241">10/01/1999</strong> <br/> Status: <span id="pub-status-sm-241">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-241"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-241"> 10/01/1999 </td> </tr> <tr id="result-242"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-242">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-242">6390</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/6390/final" id="pub-title-link-242">Randomness Testing of the Advanced Encryption Standard Candidate Algorithms</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-242">IR 6390 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/6390/final" class="mobile-pub-title" id="pub-title-link-sm-242">Randomness Testing of the Advanced Encryption Standard Candidate Algorithms</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-242">9/01/1999</strong> <br/> Status: <span id="pub-status-sm-242">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-242"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-242"> 9/01/1999 </td> </tr> <tr id="result-243"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-243">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-243">6192</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/6192/final" id="pub-title-link-243">A Revised Model for Role Based Access Control</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-243">IR 6192 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/6192/final" class="mobile-pub-title" id="pub-title-link-sm-243">A Revised Model for Role Based Access Control</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-243">7/09/1998</strong> <br/> Status: <span id="pub-status-sm-243">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-243"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-243"> 7/09/1998 </td> </tr> <tr id="result-244"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-244">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-244">6068</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/6068/final" id="pub-title-link-244">Report on the TMACH Experiment</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-244">IR 6068 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/6068/final" class="mobile-pub-title" id="pub-title-link-sm-244">Report on the TMACH Experiment</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-244">7/01/1997</strong> <br/> Status: <span id="pub-status-sm-244">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-244"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-244"> 7/01/1997 </td> </tr> <tr id="result-245"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-245">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-245">5820</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/5820/final" id="pub-title-link-245">Distributed Communication Methods and Role-Based Access Control for Use in Health Care Applications</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-245">IR 5820 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/5820/final" class="mobile-pub-title" id="pub-title-link-sm-245">Distributed Communication Methods and Role-Based Access Control for Use in Health Care Applications</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-245">4/01/1996</strong> <br/> Status: <span id="pub-status-sm-245">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-245"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-245"> 4/01/1996 </td> </tr> <tr id="result-246"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-246">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-246">5810</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/5810/final" id="pub-title-link-246">The TMACH Experiment Phase 1 - Preliminary Developmental Evaluation</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-246">IR 5810 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/5810/final" class="mobile-pub-title" id="pub-title-link-sm-246">The TMACH Experiment Phase 1 - Preliminary Developmental Evaluation</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-246">6/01/1996</strong> <br/> Status: <span id="pub-status-sm-246">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-246"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-246"> 6/01/1996 </td> </tr> <tr id="result-247"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-247">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-247">5788</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/5788/final" id="pub-title-link-247">Public Key Infrastructure Invitational Workshop September 28, 1995, MITRE Corporation, McLean, Virginia</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-247">IR 5788 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/5788/final" class="mobile-pub-title" id="pub-title-link-sm-247">Public Key Infrastructure Invitational Workshop September 28, 1995, MITRE Corporation, McLean, Virginia</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-247">11/01/1995</strong> <br/> Status: <span id="pub-status-sm-247">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-247"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-247"> 11/01/1995 </td> </tr> <tr id="result-248"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-248">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-248">5731</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/5731/final" id="pub-title-link-248">Validated Products List 1995 no. 4: Programming Languages, Database Language SQL, Graphics, POSIX, Computer Security, Product Data - IGES, OSI</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-248">IR 5731 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/5731/final" class="mobile-pub-title" id="pub-title-link-sm-248">Validated Products List 1995 no. 4: Programming Languages, Database Language SQL, Graphics, POSIX, Computer Security, Product Data - IGES, OSI</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-248">10/01/1995</strong> <br/> Status: <span id="pub-status-sm-248">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-248"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-248"> 10/01/1995 </td> </tr> <tr id="result-249"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-249">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-249">5590</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/5590/final" id="pub-title-link-249">Proceedings Report of the International Invitation Workshop on Developmental Assurance</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-249">IR 5590 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/5590/final" class="mobile-pub-title" id="pub-title-link-sm-249">Proceedings Report of the International Invitation Workshop on Developmental Assurance</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-249">6/01/1994</strong> <br/> Status: <span id="pub-status-sm-249">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-249"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-249"> 6/01/1994 </td> </tr> <tr id="result-250"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-250">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-250">5570</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/5570/final" id="pub-title-link-250">An Assessment of the DOD Goal Security Architecture (DGSA) for Non-Military Use</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-250">IR 5570 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/5570/final" class="mobile-pub-title" id="pub-title-link-sm-250">An Assessment of the DOD Goal Security Architecture (DGSA) for Non-Military Use</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-250">11/01/1994</strong> <br/> Status: <span id="pub-status-sm-250">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-250"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-250"> 11/01/1994 </td> </tr> <tr id="result-251"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-251">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-251">5540</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/5540/final" id="pub-title-link-251">Multi-Agency Certification and Accreditation (C&A) Process: A Worked Example</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-251">IR 5540 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/5540/final" class="mobile-pub-title" id="pub-title-link-sm-251">Multi-Agency Certification and Accreditation (C&A) Process: A Worked Example</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-251">12/01/1994</strong> <br/> Status: <span id="pub-status-sm-251">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-251"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-251"> 12/01/1994 </td> </tr> <tr id="result-252"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-252">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-252">5495</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/5495/final" id="pub-title-link-252">Computer Security Training & Awareness Course Compendium</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-252">IR 5495 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/5495/final" class="mobile-pub-title" id="pub-title-link-sm-252">Computer Security Training & Awareness Course Compendium</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-252">9/01/1994</strong> <br/> Status: <span id="pub-status-sm-252">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-252"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-252"> 9/01/1994 </td> </tr> <tr id="result-253"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-253">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-253">5472</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/5472/final" id="pub-title-link-253">A Head Start on Assurance: Proceedings of an Invitational Workshop on Information Technology (IT) Assurance and Trustworthiness, March 21-23, 1994</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-253">IR 5472 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/5472/final" class="mobile-pub-title" id="pub-title-link-sm-253">A Head Start on Assurance: Proceedings of an Invitational Workshop on Information Technology (IT) Assurance and Trustworthiness, March 21-23, 1994</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-253">8/01/1994</strong> <br/> Status: <span id="pub-status-sm-253">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-253"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-253"> 8/01/1994 </td> </tr> <tr id="result-254"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-254">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-254">5468</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/5468/final" id="pub-title-link-254">Report of the NIST Workshop on Key Escrow Encryption</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-254">IR 5468 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/5468/final" class="mobile-pub-title" id="pub-title-link-sm-254">Report of the NIST Workshop on Key Escrow Encryption</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-254">6/01/1994</strong> <br/> Status: <span id="pub-status-sm-254">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-254"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-254"> 6/01/1994 </td> </tr> <tr id="result-255"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-255">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-255">5424</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/5424/final" id="pub-title-link-255">A Study of Federal Agency Needs for Information Technology Security</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-255">IR 5424 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/5424/final" class="mobile-pub-title" id="pub-title-link-sm-255">A Study of Federal Agency Needs for Information Technology Security</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-255">5/01/1994</strong> <br/> Status: <span id="pub-status-sm-255">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-255"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-255"> 5/01/1994 </td> </tr> <tr id="result-256"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-256">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-256">5395</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/5395/final" id="pub-title-link-256">Preliminary Functional Specifications of a Prototype Electronic Research Notebook for NIST</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-256">IR 5395 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/5395/final" class="mobile-pub-title" id="pub-title-link-sm-256">Preliminary Functional Specifications of a Prototype Electronic Research Notebook for NIST</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-256">4/01/1994</strong> <br/> Status: <span id="pub-status-sm-256">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-256"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-256"> 4/01/1994 </td> </tr> <tr id="result-257"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-257">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-257">5386</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/5386/final" id="pub-title-link-257">Proceedings of the Workshop of the Federal Criteria for Information Technology Security</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-257">IR 5386 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/5386/final" class="mobile-pub-title" id="pub-title-link-sm-257">Proceedings of the Workshop of the Federal Criteria for Information Technology Security</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-257">3/01/1994</strong> <br/> Status: <span id="pub-status-sm-257">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-257"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-257"> 3/01/1994 </td> </tr> <tr id="result-258"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-258">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-258">5325</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/5325/final" id="pub-title-link-258">Conformance Assessment of Transport Layer Security Implementations</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-258">IR 5325 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/5325/final" class="mobile-pub-title" id="pub-title-link-sm-258">Conformance Assessment of Transport Layer Security Implementations</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-258">12/01/1993</strong> <br/> Status: <span id="pub-status-sm-258">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-258"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-258"> 12/01/1993 </td> </tr> <tr id="result-259"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-259">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-259">5308</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/5308/final" id="pub-title-link-259">General Procedures for Registering Computer Security Objects</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-259">IR 5308 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/5308/final" class="mobile-pub-title" id="pub-title-link-sm-259">General Procedures for Registering Computer Security Objects</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-259">12/01/1993</strong> <br/> Status: <span id="pub-status-sm-259">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-259"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-259"> 12/01/1993 </td> </tr> <tr id="result-260"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-260">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-260">5283</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/5283/final" id="pub-title-link-260">Security of SQL-Based Implementations of Product Data Exchange Using STEP</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-260">IR 5283 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/5283/final" class="mobile-pub-title" id="pub-title-link-sm-260">Security of SQL-Based Implementations of Product Data Exchange Using STEP</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-260">10/01/1993</strong> <br/> Status: <span id="pub-status-sm-260">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-260"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-260"> 10/01/1993 </td> </tr> <tr id="result-261"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-261">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-261">5247</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/5247/final" id="pub-title-link-261">Workshop on Security Procedures for the Interchange of Electronic Documents: Selected Papers and Results</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-261">IR 5247 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/5247/final" class="mobile-pub-title" id="pub-title-link-sm-261">Workshop on Security Procedures for the Interchange of Electronic Documents: Selected Papers and Results</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-261">8/01/1993</strong> <br/> Status: <span id="pub-status-sm-261">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-261"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-261"> 8/01/1993 </td> </tr> <tr id="result-262"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-262">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-262">5234</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/5234/final" id="pub-title-link-262">Report of the NIST Workshop on Digital Signature Certificate Management, December 10-11, 1992</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-262">IR 5234 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/5234/final" class="mobile-pub-title" id="pub-title-link-sm-262">Report of the NIST Workshop on Digital Signature Certificate Management, December 10-11, 1992</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-262">10/01/1993</strong> <br/> Status: <span id="pub-status-sm-262">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-262"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-262"> 10/01/1993 </td> </tr> <tr id="result-263"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-263">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-263">5232</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/5232/final" id="pub-title-link-263">Report of the NSF/NIST Workshop on NSFNET/NREN Security, July 6-7, 1992</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-263">IR 5232 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/5232/final" class="mobile-pub-title" id="pub-title-link-sm-263">Report of the NSF/NIST Workshop on NSFNET/NREN Security, July 6-7, 1992</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-263">5/01/1993</strong> <br/> Status: <span id="pub-status-sm-263">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-263"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-263"> 5/01/1993 </td> </tr> <tr id="result-264"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-264">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-264">5153</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/5153/final" id="pub-title-link-264">Minimum Security Requirements for Multi-User Operating Systems</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-264">IR 5153 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/5153/final" class="mobile-pub-title" id="pub-title-link-sm-264">Minimum Security Requirements for Multi-User Operating Systems</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-264">3/01/1993</strong> <br/> Status: <span id="pub-status-sm-264">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-264"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-264"> 3/01/1993 </td> </tr> <tr id="result-265"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-265">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-265">4983</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/4983/final" id="pub-title-link-265">A Study of OSI Key Management</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-265">IR 4983 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/4983/final" class="mobile-pub-title" id="pub-title-link-sm-265">A Study of OSI Key Management</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-265">11/01/1992</strong> <br/> Status: <span id="pub-status-sm-265">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-265"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-265"> 11/01/1992 </td> </tr> <tr id="result-266"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-266">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-266">4976</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/4976/final" id="pub-title-link-266">Assessing Federal and Commercial Information Security Needs</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-266">IR 4976 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/4976/final" class="mobile-pub-title" id="pub-title-link-sm-266">Assessing Federal and Commercial Information Security Needs</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-266">11/01/1992</strong> <br/> Status: <span id="pub-status-sm-266">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-266"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-266"> 11/01/1992 </td> </tr> <tr id="result-267"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-267">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-267">4939</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/4939/final" id="pub-title-link-267">Threat Assessment of Malicious Code and External Attacks</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-267">IR 4939 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/4939/final" class="mobile-pub-title" id="pub-title-link-sm-267">Threat Assessment of Malicious Code and External Attacks</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-267">10/01/1992</strong> <br/> Status: <span id="pub-status-sm-267">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-267"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-267"> 10/01/1992 </td> </tr> <tr id="result-268"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-268">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-268">4934</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/4934/final" id="pub-title-link-268">Protocol Implementation Conformance Statement (PICS) Proforma for the SDNS Security Protocol at Layer 4 (SP4)</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-268">IR 4934 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/4934/final" class="mobile-pub-title" id="pub-title-link-sm-268">Protocol Implementation Conformance Statement (PICS) Proforma for the SDNS Security Protocol at Layer 4 (SP4)</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-268">10/01/1992</strong> <br/> Status: <span id="pub-status-sm-268">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-268"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-268"> 10/01/1992 </td> </tr> <tr id="result-269"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-269">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-269">4933</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/4933/final" id="pub-title-link-269">Computer Security Bulletin Board System: User's Guide</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-269">IR 4933 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/4933/final" class="mobile-pub-title" id="pub-title-link-sm-269">Computer Security Bulletin Board System: User's Guide</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-269">9/01/1992</strong> <br/> Status: <span id="pub-status-sm-269">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-269"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-269"> 9/01/1992 </td> </tr> <tr id="result-270"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-270">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-270">4846</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/4846/final" id="pub-title-link-270">Computer Security Training & Awareness Course Compendium</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-270">IR 4846 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/4846/final" class="mobile-pub-title" id="pub-title-link-sm-270">Computer Security Training & Awareness Course Compendium</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-270">5/01/1992</strong> <br/> Status: <span id="pub-status-sm-270">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-270"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-270"> 5/01/1992 </td> </tr> <tr id="result-271"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-271">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-271">4816</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/4816/final" id="pub-title-link-271">PBX Administrator’s Security Standards</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-271">IR 4816 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/4816/final" class="mobile-pub-title" id="pub-title-link-sm-271">PBX Administrator’s Security Standards</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-271">4/01/1992</strong> <br/> Status: <span id="pub-status-sm-271">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-271"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-271"> 4/01/1992 </td> </tr> <tr id="result-272"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-272">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-272">4792</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/4792/final" id="pub-title-link-272">A Formal Description of the SDNS Security Protocol at Layer 4 (SP4)</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-272">IR 4792 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/4792/final" class="mobile-pub-title" id="pub-title-link-sm-272">A Formal Description of the SDNS Security Protocol at Layer 4 (SP4)</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-272">3/01/1992</strong> <br/> Status: <span id="pub-status-sm-272">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-272"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-272"> 3/01/1992 </td> </tr> <tr id="result-273"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-273">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-273">4781</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/4781/final" id="pub-title-link-273">Privacy Protection in the United States: A 1991 Survey of Laws and Regulations Affecting Privacy in the Public and Private Sector Including a List of All Relevant Officials</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-273">IR 4781 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/4781/final" class="mobile-pub-title" id="pub-title-link-sm-273">Privacy Protection in the United States: A 1991 Survey of Laws and Regulations Affecting Privacy in the Public and Private Sector Including a List of All Relevant Officials</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-273">2/01/1992</strong> <br/> Status: <span id="pub-status-sm-273">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-273"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-273"> 2/01/1992 </td> </tr> <tr id="result-274"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-274">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-274">4774</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/4774/final" id="pub-title-link-274">A Review of U.S. and European Security Evaluation Criteria</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-274">IR 4774 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/4774/final" class="mobile-pub-title" id="pub-title-link-sm-274">A Review of U.S. and European Security Evaluation Criteria</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-274">3/01/1992</strong> <br/> Status: <span id="pub-status-sm-274">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-274"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-274"> 3/01/1992 </td> </tr> <tr id="result-275"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-275">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-275">4749</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/4749/final" id="pub-title-link-275">Sample Statement of Work for Federal Computer Security Services: For use In-House or Contracting Out</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-275">IR 4749 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/4749/final" class="mobile-pub-title" id="pub-title-link-sm-275">Sample Statement of Work for Federal Computer Security Services: For use In-House or Contracting Out</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-275">12/01/1991</strong> <br/> Status: <span id="pub-status-sm-275">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-275"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-275"> 12/01/1991 </td> </tr> <tr id="result-276"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-276">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-276">4734</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/4734/final" id="pub-title-link-276">Foundations of a Security Policy for Use of the National Research and Educational Network</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-276">IR 4734 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/4734/final" class="mobile-pub-title" id="pub-title-link-sm-276">Foundations of a Security Policy for Use of the National Research and Educational Network</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-276">2/01/1992</strong> <br/> Status: <span id="pub-status-sm-276">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-276"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-276"> 2/01/1992 </td> </tr> <tr id="result-277"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-277">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-277">4659</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/4659/final" id="pub-title-link-277">Glossary of Computer Security Terminology</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-277">IR 4659 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/4659/final" class="mobile-pub-title" id="pub-title-link-sm-277">Glossary of Computer Security Terminology</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-277">9/01/1991</strong> <br/> Status: <span id="pub-status-sm-277">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-277"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-277"> 9/01/1991 </td> </tr> <tr id="result-278"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-278">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-278">4614</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/4614/final" id="pub-title-link-278">Standard Security Label for GOSIP: an Invitational Workshop</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-278">IR 4614 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/4614/final" class="mobile-pub-title" id="pub-title-link-sm-278">Standard Security Label for GOSIP: an Invitational Workshop</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-278">6/01/1991</strong> <br/> Status: <span id="pub-status-sm-278">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-278"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-278"> 6/01/1991 </td> </tr> <tr id="result-279"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-279">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-279">4545</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/4545/final" id="pub-title-link-279">Computer Security: Selected Articles</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-279">IR 4545 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/4545/final" class="mobile-pub-title" id="pub-title-link-sm-279">Computer Security: Selected Articles</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-279">4/01/1991</strong> <br/> Status: <span id="pub-status-sm-279">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-279"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-279"> 4/01/1991 </td> </tr> <tr id="result-280"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-280">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-280">4518</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/4518/final" id="pub-title-link-280">National Aeronautics and Space Administration's (NASA) Automated Information Security Handbook</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-280">IR 4518 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/4518/final" class="mobile-pub-title" id="pub-title-link-sm-280">National Aeronautics and Space Administration's (NASA) Automated Information Security Handbook</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-280">3/01/1991</strong> <br/> Status: <span id="pub-status-sm-280">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-280"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-280"> 3/01/1991 </td> </tr> <tr id="result-281"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-281">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-281">4453</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/4453/final" id="pub-title-link-281">SRI International: Improving the Security of Your UNIX System</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-281">IR 4453 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/4453/final" class="mobile-pub-title" id="pub-title-link-sm-281">SRI International: Improving the Security of Your UNIX System</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-281">11/01/1990</strong> <br/> Status: <span id="pub-status-sm-281">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-281"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-281"> 11/01/1990 </td> </tr> <tr id="result-282"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-282">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-282">4451</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/4451/final" id="pub-title-link-282">U.S. Department of Commerce: Methodology for Certifying Sensitive Computer Applications</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-282">IR 4451 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/4451/final" class="mobile-pub-title" id="pub-title-link-sm-282">U.S. Department of Commerce: Methodology for Certifying Sensitive Computer Applications</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-282">11/01/1990</strong> <br/> Status: <span id="pub-status-sm-282">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-282"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-282"> 11/01/1990 </td> </tr> <tr id="result-283"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-283">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-283">4409</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/4409/final" id="pub-title-link-283">1989 Computer Security and Privacy Plans (CSPP) Review Project: A First-Year Federal Response to the Computer Security Act of 1987 (Final Report)</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-283">IR 4409 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/4409/final" class="mobile-pub-title" id="pub-title-link-sm-283">1989 Computer Security and Privacy Plans (CSPP) Review Project: A First-Year Federal Response to the Computer Security Act of 1987 (Final Report)</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-283">9/01/1990</strong> <br/> Status: <span id="pub-status-sm-283">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-283"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-283"> 9/01/1990 </td> </tr> <tr id="result-284"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-284">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-284">4387</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/4387/final" id="pub-title-link-284">U.S. Department of Justice Simplified Risk Analysis Guidelines</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-284">IR 4387 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/4387/final" class="mobile-pub-title" id="pub-title-link-sm-284">U.S. Department of Justice Simplified Risk Analysis Guidelines</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-284">8/01/1990</strong> <br/> Status: <span id="pub-status-sm-284">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-284"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-284"> 8/01/1990 </td> </tr> <tr id="result-285"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-285">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-285">4378</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/4378/final" id="pub-title-link-285">Automated Information System Security Accreditation Guidelines</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-285">IR 4378 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/4378/final" class="mobile-pub-title" id="pub-title-link-sm-285">Automated Information System Security Accreditation Guidelines</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-285">8/01/1990</strong> <br/> Status: <span id="pub-status-sm-285">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-285"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-285"> 8/01/1990 </td> </tr> <tr id="result-286"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-286">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-286">4362</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/4362/final" id="pub-title-link-286">Security Labels for Open Systems: an Invitational Workshop</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-286">IR 4362 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/4362/final" class="mobile-pub-title" id="pub-title-link-sm-286">Security Labels for Open Systems: an Invitational Workshop</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-286">6/01/1990</strong> <br/> Status: <span id="pub-status-sm-286">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-286"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-286"> 6/01/1990 </td> </tr> <tr id="result-287"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-287">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-287">4359</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/4359/final" id="pub-title-link-287">Domestic Disaster Recovery Plan for PCs, OIS, and Small VS systems</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-287">IR 4359 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/4359/final" class="mobile-pub-title" id="pub-title-link-sm-287">Domestic Disaster Recovery Plan for PCs, OIS, and Small VS systems</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-287">8/01/1990</strong> <br/> Status: <span id="pub-status-sm-287">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-287"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-287"> 8/01/1990 </td> </tr> <tr id="result-288"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-288">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-288">4325</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/4325/final" id="pub-title-link-288">U.S. Department of Energy Risk Assessment Methodology</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-288">IR 4325 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/4325/final" class="mobile-pub-title" id="pub-title-link-sm-288">U.S. Department of Energy Risk Assessment Methodology</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-288">5/01/1990</strong> <br/> Status: <span id="pub-status-sm-288">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-288"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-288"> 5/01/1990 </td> </tr> <tr id="result-289"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-289">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-289">4267</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/4267/final" id="pub-title-link-289">A Conformance Test for FDDI Medium Access Control (MAC)</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-289">IR 4267 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/4267/final" class="mobile-pub-title" id="pub-title-link-sm-289">A Conformance Test for FDDI Medium Access Control (MAC)</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-289">7/01/1990</strong> <br/> Status: <span id="pub-status-sm-289">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-289"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-289"> 7/01/1990 </td> </tr> <tr id="result-290"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-290">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-290">4262</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/4262/final" id="pub-title-link-290">Secure Data Network Systems (SDNS) Key Management Documents</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-290">IR 4262 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/4262/final" class="mobile-pub-title" id="pub-title-link-sm-290">Secure Data Network Systems (SDNS) Key Management Documents</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-290">2/01/1990</strong> <br/> Status: <span id="pub-status-sm-290">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-290"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-290"> 2/01/1990 </td> </tr> <tr id="result-291"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-291">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-291">4259</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/4259/final" id="pub-title-link-291">Secure Data Network Systems (SDNS) Access Control Documents</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-291">IR 4259 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/4259/final" class="mobile-pub-title" id="pub-title-link-sm-291">Secure Data Network Systems (SDNS) Access Control Documents</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-291">2/01/1990</strong> <br/> Status: <span id="pub-status-sm-291">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-291"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-291"> 2/01/1990 </td> </tr> <tr id="result-292"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-292">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-292">4250</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/4250/final" id="pub-title-link-292">Secure Data Network Systems (SDNS) Network, Transport, and Message Security Protocols</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-292">IR 4250 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/4250/final" class="mobile-pub-title" id="pub-title-link-sm-292">Secure Data Network Systems (SDNS) Network, Transport, and Message Security Protocols</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-292">2/01/1990</strong> <br/> Status: <span id="pub-status-sm-292">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-292"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-292"> 2/01/1990 </td> </tr> <tr id="result-293"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-293">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-293">4228</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/4228/final" id="pub-title-link-293">Prototyping SP4: a Secure Data Network System Transport Protocol Interoperability Demonstration Project</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-293">IR 4228 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/4228/final" class="mobile-pub-title" id="pub-title-link-sm-293">Prototyping SP4: a Secure Data Network System Transport Protocol Interoperability Demonstration Project</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-293">1/01/1990</strong> <br/> Status: <span id="pub-status-sm-293">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-293"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-293"> 1/01/1990 </td> </tr> <tr id="result-294"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-294">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-294">1291</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/1291/final" id="pub-title-link-294">Report of the Workshop on Cryptography in Support of Computer Security</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-294">IR 1291 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/1291/final" class="mobile-pub-title" id="pub-title-link-sm-294">Report of the Workshop on Cryptography in Support of Computer Security</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-294">9/01/1977</strong> <br/> Status: <span id="pub-status-sm-294">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-294"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-294"> 9/01/1977 </td> </tr> <tr id="result-295"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-295">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-295">1189</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/1189/final" id="pub-title-link-295">Report of the Workshop on Estimation of Significant Advances in Computer Technology</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-295">IR 1189 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/1189/final" class="mobile-pub-title" id="pub-title-link-sm-295">Report of the Workshop on Estimation of Significant Advances in Computer Technology</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-295">12/01/1976</strong> <br/> Status: <span id="pub-status-sm-295">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-295"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-295"> 12/01/1976 </td> </tr> <tr id="result-296"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-296">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-296">985</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/985/final" id="pub-title-link-296">A Computer Model to Determine Low Cost Techniques to Comply with the Privacy Act of 1974</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-296">IR 985 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/985/final" class="mobile-pub-title" id="pub-title-link-sm-296">A Computer Model to Determine Low Cost Techniques to Comply with the Privacy Act of 1974</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-296">2/01/1976</strong> <br/> Status: <span id="pub-status-sm-296">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-296"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-296"> 2/01/1976 </td> </tr> <tr id="result-297"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-297">IR</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-297">909</td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/909/final" id="pub-title-link-297">Index of Automated System Design Requirements as Derived from the OMB Privacy Act Implementation Guidelines</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-297">IR 909 (Final)</span><br/> <a href="/web/20231004155343/https://csrc.nist.gov/pubs/ir/909/final" class="mobile-pub-title" id="pub-title-link-sm-297">Index of Automated System Design Requirements as Derived from the OMB Privacy Act Implementation Guidelines</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-297">10/01/1975</strong> <br/> Status: <span id="pub-status-sm-297">Final</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-297"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-297"> 10/01/1975 </td> </tr> </tbody> </table> <div class="row bottom-pagination-area"> <p class="text-center"> <span class="pagination-links" id="bottom-pagination-container" data-total-pages="0" data-min-page="1" data-max-page="0" data-current-page="1" data-show-first="False" data-show-last="True"></span> </p> </div> <div> <span class="pull-right"> <a href="/web/20231004155343/https://csrc.nist.gov/publications/search" id="view-all-pubs-link">View All Publications</a> </span> </div> <div id="publications-quicklinks-sm" class="bs-callout bs-callout-subnav hidden-md hidden-lg"> <h4>Current Publications <i class="fa fa-bolt"></i></h4> <ul> <li> <strong> NIST Series Pubs <i class="fa fa-info-circle" aria-hidden="true" data-placement="right" data-html="true" data-tooltip-toggle="tooltipWithFunction" data-title-container="nist-series-pubs-tooltip-lg"></i> </strong> <ul> <li><a href="/web/20231004155343/https://csrc.nist.gov/publications/final-pubs" id="quick-link-final-sm">Final Pubs</a></li> <li><a href="/web/20231004155343/https://csrc.nist.gov/publications/drafts-open-for-comment" id="quick-links-comments-sm">Drafts Open for Comment</a></li> <li><a href="/web/20231004155343/https://csrc.nist.gov/publications/draft-pubs" id="quick-link-draft-sm">Drafts</a> (all)</li> <li> <strong> View By Series <i class="fa fa-info-circle" aria-hidden="true" data-placement="right" data-html="true" data-tooltip-toggle="tooltipWithFunction" data-title-container="nist-view-series-pubs-tooltip-lg"></i> </strong> <ul> <li><a href="/web/20231004155343/https://csrc.nist.gov/publications/fips" id="quick-link-fips-sm">FIPS</a> (standards)</li> <li><a href="/web/20231004155343/https://csrc.nist.gov/publications/sp800" id="quick-link-sp-800-sm">SP 800</a> (guidance)</li> <li><a href="/web/20231004155343/https://csrc.nist.gov/publications/sp1800" id="quick-link-sp-1800-sm">SP 1800</a> (practice guides)</li> <li><a href="/web/20231004155343/https://csrc.nist.gov/publications/sp" id="quick-link-sp-sm">SP</a> (all subseries)</li> <li><a href="/web/20231004155343/https://csrc.nist.gov/publications/ir" id="quick-link-nistir-sm">IR</a> (interagency/internal reports)</li> <li><a href="/web/20231004155343/https://csrc.nist.gov/publications/cswp" id="quick-link-white-papers-sm">CSWP</a> (cybersecurity white papers)</li> <li><a href="/web/20231004155343/https://csrc.nist.gov/publications/itl-bulletin" id="quick-link-itl-bul-sm">ITL Bulletins</a></li> </ul> </li> </ul> </li> <li> <strong> Other Pubs <i class="fa fa-info-circle" aria-hidden="true" data-placement="right" data-html="true" data-tooltip-toggle="tooltipWithFunction" data-title-container="nist-other-pubs-tooltip-lg"></i> </strong> <ul> <li><a href="/web/20231004155343/https://csrc.nist.gov/publications/project-description" id="quick-link-project-description-sm">Project Descriptions</a></li> <li><a href="/web/20231004155343/https://csrc.nist.gov/publications/journal-article" id="quick-link-journal-articles-sm">Journal Articles</a></li> <li><a href="/web/20231004155343/https://csrc.nist.gov/publications/conference-paper" id="quick-link-conference-papers-sm">Conference Papers</a></li> <li><a href="/web/20231004155343/https://csrc.nist.gov/publications/book" id="quick-link-books-sm">Books</a></li> <li><a href="/web/20231004155343/https://csrc.nist.gov/publications/other" id="quick-link-other-sm">Other</a></li> </ul> </li> </ul> <span style="display: none;" id="nist-series-pubs-tooltip-lg"> <strong>Final:</strong> <em>Current list of all published NIST cybersecurity documents.</em> Does not include "Withdrawn" documents. Includes FIPS, Special Publications, NISTIRs, ITL Bulletins, and NIST Cybersecurity White Papers.<br/> <br/> <strong>Public Drafts:</strong> <em>Current list of all draft NIST cybersecurity documents--they are typically posted for public comment.</em> "Current" public drafts are the latest draft versions that have not yet been published as "Final." </span> <span style="display: none;" id="nist-view-series-pubs-tooltip-lg"> <strong>FIPS:</strong> <em>Current Federal Information Processing Standard Publications (FIPS).</em> Includes current (Final and Draft) FIPS.<br/> <br/> <strong>SP 800 Series:</strong> <em>Current NIST Special Publication (SP) 800 series publications, which focus on Computer/Information Security.</em> Includes current (Final and Draft) SP 800 pubs.<br/> <br/> <strong>All SP Series:</strong> <em> Current NIST Special Publications (SP), including SP 800 (Computer/Information Security) and SP 1800 (Cybersecurity Practice Guides) pubs. Also includes SP 500 (Computer Systems Technology) pubs related to cybersecurity and privacy. </em> Includes current (Final and Draft) NIST Special Publications.<br/> <br/> <strong>NISTIRs:</strong> <em>Current list of NIST Interagency or Internal Reports (NISTIR) related to cybersecurity and privacy.</em> Includes current (Final and Draft) NISTIRs.<br/> <br/> <strong>ITL Bulletins:</strong> Current list of NIST Information Technology Laboratory (ITL) Bulletins. </span> <span style="display: none;" id="nist-other-pubs-tooltip-lg"> <strong>White Papers:</strong> <em> Consists of NIST Cybersecurity White Papers; NCCoE Project Descriptions, Building Blocks and Use Cases; and other NIST-authored papers that are not part of a formal series. </em> Includes current (Final and Draft) papers.<br/> <br/> <strong>Journal Articles:</strong> NIST-authored articles published in external journals and in the NIST Journal of Research (JRES).<br/> <br/> <strong>Conference Papers:</strong> NIST-authored conference papers related to cybersecurity and privacy.<br/> <br/> <strong>Books:</strong> NIST-authored books, book sections, and encyclopedia entries related to cybersecurity and privacy. </span> </div> </div> </div> </div> <div id="footer-pusher"></div> </div> <footer id="footer"> <div class="container"> <div class="row"> <div class="col-sm-6"> <span class="hidden-xs"> <a href="https://web.archive.org/web/20231004155343/https://www.nist.gov/" title="National Institute of Standards and Technology" rel="home" target="_blank" class="footer-nist-logo" id="footer-nist-logo-link"> <img src="/web/20231004155343im_/https://csrc.nist.gov/CSRC/Media/images/nist-logo-brand-white.svg" alt="National Institute of Standards and Technology logo" id="footer-nist-logo"/> </a> </span> <div class="row footer-contact-container"> <div class="col-sm-12" id="footer-address"> <strong>HEADQUARTERS</strong><br> 100 Bureau Drive<br> Gaithersburg, MD 20899 </div> </div> </div> <div class="col-sm-6"> <ul class="social-list text-right" style="display: block;"> <li class="field-item service-twitter list-horiz"> <a href="https://web.archive.org/web/20231004155343/https://twitter.com/NISTCyber" class="social-btn social-btn--large extlink ext" id="footer-social-twitter-link"> <i class="fa fa-twitter fa-fw"><span class="element-invisible">twitter</span></i><span class="ext"><span class="element-invisible"> (link is external)</span></span> </a> </li> <li class="field-item service-facebook list-horiz"> <a href="https://web.archive.org/web/20231004155343/https://www.facebook.com/NIST" class="social-btn social-btn--large extlink ext" id="footer-social-facebook-link"> <i class="fa fa-facebook fa-fw"><span class="element-invisible">facebook</span></i><span class="ext"><span class="element-invisible"> (link is external)</span></span> </a> </li> <li class="field-item service-linkedin list-horiz"> <a href="https://web.archive.org/web/20231004155343/https://www.linkedin.com/company/nist" class="social-btn social-btn--large extlink ext" id="footer-social-linkedin-link"> <i class="fa fa-linkedin fa-fw"><span class="element-invisible">linkedin</span></i><span class="ext"><span class="element-invisible"> (link is external)</span></span> </a> </li> <li class="field-item service-instagram list-horiz"> <a href="https://web.archive.org/web/20231004155343/https://www.instagram.com/usnistgov/" class="social-btn social-btn--large extlink ext" id="footer-social-instagram-link"> <i class="fa fa-instagram fa-fw"><span class="element-invisible">instagram</span></i> <span class="ext"><span class="element-invisible"> (link is external)</span></span> </a> </li> <li class="field-item service-youtube list-horiz"> <a href="https://web.archive.org/web/20231004155343/https://www.youtube.com/user/USNISTGOV" class="social-btn social-btn--large extlink ext" id="footer-social-youtube-link"> <i class="fa fa-youtube fa-fw"><span class="element-invisible">youtube</span></i><span class="ext"><span class="element-invisible"> (link is external)</span></span> </a> </li> <li class="field-item service-rss list-horiz"> <a href="https://web.archive.org/web/20231004155343/https://www.nist.gov/news-events/nist-rss-feeds" class="social-btn social-btn--large extlink" id="footer-social-rss-link"> <i class="fa fa-rss fa-fw"><span class="element-invisible">rss</span></i> </a> </li> <li class="field-item service-govdelivery list-horiz last"> <a href="https://web.archive.org/web/20231004155343/https://public.govdelivery.com/accounts/USNIST/subscriber/new?qsp=USNIST_3" class="social-btn social-btn--large extlink ext" title="Subscribe to CSRC and publication updates, and other NIST cybersecurity news" id="footer-social-govdelivery-link"> <i class="fa fa-envelope fa-fw"><span class="element-invisible">govdelivery</span></i><span class="ext"><span class="element-invisible"> (link is external)</span></span> </a> </li> </ul> <p class="text-right"> Want updates about CSRC and our publications? <a href="https://web.archive.org/web/20231004155343/https://public.govdelivery.com/accounts/USNIST/subscriber/new?qsp=USNIST_3" class="btn btn-lg btn-primary" style="background-color: #12659c!important; border-color: #12659c!important;" id="footer-subscribe-link">Subscribe</a> </p> </div> </div> <div class="row hidden-sm hidden-md hidden-lg"> <div class="col-sm-12"> <a href="https://web.archive.org/web/20231004155343/https://www.nist.gov/" title="National Institute of Standards and Technology" rel="home" target="_blank" class="footer-nist-logo" id="footer-bottom-nist-logo-link"> <img src="/web/20231004155343im_/https://csrc.nist.gov/CSRC/Media/images/logo_rev.png" alt="National Institute of Standards and Technology logo" id="footer-bottom-nist-logo"/> </a> </div> </div> <div class="row"> <div class="col-sm-6"> <p> <a href="/web/20231004155343/https://csrc.nist.gov/about/contact" id="footer-contact-us-link">Contact Us</a> | <a href="https://web.archive.org/web/20231004155343/https://www.nist.gov/about-nist/our-organization" style="display: inline-block;" id="footer-org-link">Our Other Offices</a> </p> </div> <div class="col-sm-6"> <span class="pull-right text-right"> Send inquiries to <a href="https://web.archive.org/web/20231004155343/mailto:csrc-inquiry@nist.gov?subject=CSRC Inquiry" style="display: inline-block;" id="footer-inquiries-link">csrc-inquiry@nist.gov</a> </span> </div> </div> <div class="row"> <div class="footer-bottom-links-container" id="footer-bottom-links-container"> <ul> <li><a href="https://web.archive.org/web/20231004155343/https://www.nist.gov/privacy-policy">Site Privacy</a></li> <li><a href="https://web.archive.org/web/20231004155343/https://www.nist.gov/oism/accessibility">Accessibility</a></li> <li><a href="https://web.archive.org/web/20231004155343/https://www.nist.gov/privacy">Privacy Program</a></li> <li><a href="https://web.archive.org/web/20231004155343/https://www.nist.gov/oism/copyrights">Copyrights</a></li> <li><a href="https://web.archive.org/web/20231004155343/https://www.commerce.gov/vulnerability-disclosure-policy">Vulnerability Disclosure</a></li> <li><a href="https://web.archive.org/web/20231004155343/https://www.nist.gov/no-fear-act-policy">No Fear Act Policy</a></li> <li><a href="https://web.archive.org/web/20231004155343/https://www.nist.gov/foia">FOIA</a></li> <li><a href="https://web.archive.org/web/20231004155343/https://www.nist.gov/environmental-policy-statement">Environmental Policy</a></li> <li><a href="https://web.archive.org/web/20231004155343/https://www.nist.gov/summary-report-scientific-integrity">Scientific Integrity</a></li> <li><a href="https://web.archive.org/web/20231004155343/https://www.nist.gov/nist-information-quality-standards">Information Quality Standards</a></li> <li><a href="https://web.archive.org/web/20231004155343/https://www.commerce.gov/">Commerce.gov</a></li> <li><a href="https://web.archive.org/web/20231004155343/https://www.science.gov/">Science.gov</a></li> <li><a href="https://web.archive.org/web/20231004155343/https://www.usa.gov/">USA.gov</a></li> <li><a href="https://web.archive.org/web/20231004155343/https://vote.gov/">Vote.gov</a></li> </ul> </div> </div> </div> </footer> <script type="text/javascript" src="/web/20231004155343js_/https://csrc.nist.gov/dist/js/quick-collapse.js"></script> <script type="text/javascript" src="/web/20231004155343js_/https://csrc.nist.gov/dist/app.bundle.js"></script> </body> </html> <!-- FILE ARCHIVED ON 15:53:43 Oct 04, 2023 AND RETRIEVED FROM THE INTERNET ARCHIVE ON 11:27:13 Jan 19, 2025. JAVASCRIPT APPENDED BY WAYBACK MACHINE, COPYRIGHT INTERNET ARCHIVE. ALL OTHER CONTENT MAY ALSO BE PROTECTED BY COPYRIGHT (17 U.S.C. SECTION 108(a)(3)). --> <!-- playback timings (ms): captures_list: 0.554 exclusion.robots: 0.026 exclusion.robots.policy: 0.016 esindex: 0.01 cdx.remote: 16.997 LoadShardBlock: 268.107 (3) PetaboxLoader3.datanode: 93.34 (4) PetaboxLoader3.resolve: 239.667 (3) load_resource: 126.168 -->