CINXE.COM

Search | CSRC

<!DOCTYPE html> <html lang="en-us" xml:lang="en-us"> <head><script type="text/javascript" src="/_static/js/bundle-playback.js?v=HxkREWBo" charset="utf-8"></script> <script type="text/javascript" src="/_static/js/wombat.js?v=txqj7nKC" charset="utf-8"></script> <script>window.RufflePlayer=window.RufflePlayer||{};window.RufflePlayer.config={"autoplay":"on","unmuteOverlay":"hidden"};</script> <script type="text/javascript" src="/_static/js/ruffle/ruffle.js"></script> <script type="text/javascript"> __wm.init("https://web.archive.org/web"); __wm.wombat("https://csrc.nist.gov/publications/journal-article","20230128001838","https://web.archive.org/","web","/_static/", "1674865118"); </script> <link rel="stylesheet" type="text/css" href="/_static/css/banner-styles.css?v=S1zqJCYt" /> <link rel="stylesheet" type="text/css" href="/_static/css/iconochive.css?v=3PDvdIFv" /> <!-- End Wayback Rewrite JS Include --> <meta charset="utf-8"/> <title>Search | CSRC</title> <meta http-equiv="content-type" content="text/html; charset=UTF-8"/> <meta http-equiv="content-style-type" content="text/css"/> <meta http-equiv="content-script-type" content="text/javascript"/> <meta name="viewport" content="width=device-width, initial-scale=1.0"/> <meta name="msapplication-config" content="/CSRC/Media/images/favicons/browserconfig.xml"/> <meta name="theme-color" content="#000000"/> <meta name="google-site-verification" content="xbrnrVYDgLD-Bd64xHLCt4XsPXzUhQ-4lGMj4TdUUTA"/> <link rel="apple-touch-icon" sizes="180x180" href="/web/20230128001838im_/https://csrc.nist.gov/images/icons/apple-touch-icon.png"/> <link rel="icon" type="image/png" href="/web/20230128001838im_/https://csrc.nist.gov/images/icons/favicon-32x32.png" sizes="32x32"/> <link rel="icon" type="image/png" href="/web/20230128001838im_/https://csrc.nist.gov/images/icons/favicon-16x16.png" sizes="16x16"/> <link rel="manifest" href="/web/20230128001838/https://csrc.nist.gov/images/icons/manifest.json"/> <link rel="mask-icon" href="/web/20230128001838im_/https://csrc.nist.gov/images/icons/safari-pinned-tab.svg" color="#000000"/> <link href="/web/20230128001838im_/https://csrc.nist.gov/CSRC/Media/images/favicons/favicon.ico" type="image/x-icon" rel="shortcut icon"/> <link href="/web/20230128001838im_/https://csrc.nist.gov/CSRC/Media/images/favicons/favicon.ico" type="image/x-icon" rel="icon"/> <!-- <link href="/dist/katex/katex.min.css" rel="stylesheet"/> --> <link href="/web/20230128001838cs_/https://csrc.nist.gov/dist/app.css" rel="stylesheet"/> <!-- reCAPTCHA v3 --> <style> .grecaptcha-badge { visibility: hidden; } </style> <script async type="text/javascript" id="_fed_an_ua_tag" src="https://web.archive.org/web/20230128001838js_/https://dap.digitalgov.gov/Universal-Federated-Analytics-Min.js?agency=nist&amp;subagency=csrc&amp;pua=UA-66610693-15&amp;yt=true&amp;exts=xsd,xml,wav,mpg,mpeg,avi,rtf,webm,ogg,ogv,oga,map,otf,eot,svg,ttf,woff"></script> <style id="antiClickjack"> body > * { display: none !important; } #antiClickjack { display: block !important; } </style> <noscript> <style id="antiClickjackNoScript"> body > * { display: block !important; } #antiClickjack { display: none !important; } </style> </noscript> <script type="text/javascript" id="antiClickjackScript"> if (self === top) { // no clickjacking var antiClickjack = document.getElementById("antiClickjack"); antiClickjack.parentNode.removeChild(antiClickjack); } else { setTimeout(tryForward(), 5000); } function tryForward() { top.location = self.location; } </script> <!-- Google tag (gtag.js) --> <script async src="https://web.archive.org/web/20230128001838js_/https://www.googletagmanager.com/gtag/js?id=G-TSQ0PLGJZP"></script> <script>window.dataLayer = window.dataLayer || []; function gtag() { dataLayer.push(arguments); } gtag('js', new Date()); gtag('config', 'G-TSQ0PLGJZP');</script> </head> <body> <div id="antiClickjack" style="display: none;"> <strong style="font-size: 1.6rem;">You are viewing this page in an unauthorized frame window.</strong> <p>This is a potential security issue, you are being redirected to <a href="https://web.archive.org/web/20230128001838/https://csrc.nist.gov/">https://csrc.nist.gov</a>.</p> </div> <section class="usa-banner" aria-label="Official government website"> <div class="usa-accordion container"> <header class="usa-banner__header"> <noscript> <p style="font-size: 0.85rem; font-weight: bold;">You have JavaScript disabled. This site requires JavaScript to be enabled for complete site functionality.</p> </noscript> <img class="usa-banner__header-flag" src="/web/20230128001838im_/https://csrc.nist.gov/images/usbanner/us_flag_small.png" alt="U.S. flag"> &nbsp; <span class="usa-banner__header-text">An official website of the United States government</span> <button id="gov-banner-button" class="usa-accordion__button usa-banner__button" data-toggle="collapse" data-target="#gov-banner" aria-expanded="true" aria-controls="gov-banner"> <span class="usa-banner__button-text">Here's how you know</span> </button> </header> <div class="usa-banner__content usa-accordion__content collapse in" role="tabpanel" id="gov-banner" aria-expanded="true"> <div class="row"> <div class="col-md-5 col-sm-12"> <div class="row"> <div class="col-sm-2 col-xs-3"> <img class="usa-banner__icon usa-media-block__img" src="/web/20230128001838im_/https://csrc.nist.gov/images/usbanner/icon-dot-gov.svg" alt="Dot gov"> </div> <div class="col-sm-10 col-xs-9"> <p> <strong>Official websites use .gov</strong> <br> A <strong>.gov</strong> website belongs to an official government organization in the United States. </p> </div> </div> </div> <div class="col-md-5 col-sm-12"> <div class="row"> <div class="col-sm-2 col-xs-3"> <img class="usa-banner__icon usa-media-block__img" src="/web/20230128001838im_/https://csrc.nist.gov/images/usbanner/icon-https.svg" alt="Https"> </div> <div class="col-sm-10 col-xs-9"> <p> <strong>Secure .gov websites use HTTPS</strong> <br> A <strong>lock</strong> (<img class="usa-banner__lock" src="/web/20230128001838im_/https://csrc.nist.gov/images/usbanner/lock.svg" alt="Dot gov">) or <strong>https://</strong> means you've safely connected to the .gov website. Share sensitive information only on official, secure websites. </p> </div> </div> </div> </div> </div> </div> </section> <nav id="navbar" class="navbar"> <div id="nist-menu-container" class="container"> <div class="row"> <!-- Brand --> <div class="col-xs-6 col-md-4 navbar-header"> <a class="navbar-brand" href="https://web.archive.org/web/20230128001838/https://www.nist.gov/" target="_blank" id="navbar-brand-image"> <img src="/web/20230128001838im_/https://csrc.nist.gov/CSRC/media/images/svg/nist-logo.svg" alt="National Institute of Standards and Technology" width="110" height="30"> </a> </div> <div class="col-xs-6 col-md-8 navbar-nist-logo"> <div class="form-inline hidden-sm hidden-xs"> <form name="site-search" id="site-search-form" action="/web/20230128001838/https://csrc.nist.gov/search" method="GET"> <label for="search-csrc-query" class="element-invisible">Search</label> <input autocomplete="off" class="form-control" id="search-csrc-query" name="keywords" type="text" size="15" maxlength="128" placeholder="Search CSRC"/> <input type="hidden" name="ipp" value="25"/> <input type="hidden" name="sortBy" value="relevance"/> <input type="hidden" name="showOnly" value="publications,projects,news,events,presentations,glossary,topics"/> <input type="hidden" name="topicsMatch" value="ANY"/> <input type="hidden" name="status" value="Final,Draft"/> <input type="hidden" name="series" value="FIPS,SP,NISTIR,ITL Bulletin,White Paper,Building Block,Use Case,Journal Article,Conference Paper,Book"/> <button type="submit" id="search-csrc-submit-btn" class="form-submit"> <span class="element-invisible">Search</span> <i class="fa fa-search"></i> </button> </form> </div> <span id="nvd-menu-button" class="pull-right"> <a href="#" id="nvd-menu-button-link"> <span class="fa fa-bars"></span> <span id="nvd-menu-full-text">CSRC MENU</span> </a> </span> </div> </div> </div> <div class="form-inline hidden-md hidden-lg"> <form name="site-search-mobile" id="site-search-form-mobile" action="/web/20230128001838/https://csrc.nist.gov/search" method="GET"> <label for="search-csrc-query-mobile" class="element-invisible">Search</label> <input autocomplete="off" class="form-control" id="search-csrc-query-mobile" name="keywords" type="text" size="15" maxlength="128" placeholder="Search CSRC"/> <button type="submit" id="search-csrc-submit-btn-mobile" class="form-submit"> <span class="element-invisible">Search</span> <i class="fa fa-search"></i> </button> </form> </div> <div class="main-menu-row container"> <!-- Collect the nav links, forms, and other content for toggling --> <div id="main-menu-drop" class="col-lg-12" style="display: none;"> <ul> <li><a href="/web/20230128001838/https://csrc.nist.gov/projects">Projects</a></li> <li> <a href="/web/20230128001838/https://csrc.nist.gov/publications"> Publications <span class="expander fa fa-plus" id="main-menu-pubs-expander" data-expander-name="publications" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="publications" id="main-menu-pubs-expanded"> <div class="row"> <div class="col-lg-4"> <p><a href="/web/20230128001838/https://csrc.nist.gov/publications/drafts-open-for-comment">Drafts for Public Comment</a></p> <p><a href="/web/20230128001838/https://csrc.nist.gov/publications/draft-pubs">All Public Drafts</a></p> <p><a href="/web/20230128001838/https://csrc.nist.gov/publications/final-pubs">Final Pubs</a></p> <p><a href="/web/20230128001838/https://csrc.nist.gov/publications/fips">FIPS</a></p> </div> <div class="col-lg-4"> <p><a href="/web/20230128001838/https://csrc.nist.gov/publications/sp">Special Publications (SP<small>s</small>)</a></p> <p><a href="/web/20230128001838/https://csrc.nist.gov/publications/nistir">NISTIR<small>s</small></a></p> <p><a href="/web/20230128001838/https://csrc.nist.gov/publications/itl-bulletin">ITL Bulletins</a></p> <p><a href="/web/20230128001838/https://csrc.nist.gov/publications/white-paper">White Papers</a></p> </div> <div class="col-lg-4"> <p><a href="/web/20230128001838/https://csrc.nist.gov/publications/journal-article">Journal Articles</a></p> <p><a href="/web/20230128001838/https://csrc.nist.gov/publications/conference-paper">Conference Papers</a></p> <p><a href="/web/20230128001838/https://csrc.nist.gov/publications/book">Books</a></p> </div> </div> </div> </li> <li> <a href="/web/20230128001838/https://csrc.nist.gov/topics"> Topics <span class="expander fa fa-plus" id="main-menu-topics-expander" data-expander-name="topics" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="topics" id="main-menu-topics-expanded"> <div class="row"> <div class="col-lg-4"> <p><a href="/web/20230128001838/https://csrc.nist.gov/Topics/Security-and-Privacy">Security &amp; Privacy</a></p> <p><a href="/web/20230128001838/https://csrc.nist.gov/Topics/Applications">Applications</a></p> </div> <div class="col-lg-4"> <p><a href="/web/20230128001838/https://csrc.nist.gov/Topics/Technologies">Technologies</a></p> <p><a href="/web/20230128001838/https://csrc.nist.gov/Topics/Sectors">Sectors</a></p> </div> <div class="col-lg-4"> <p><a href="/web/20230128001838/https://csrc.nist.gov/Topics/Laws-and-Regulations">Laws &amp; Regulations</a></p> <p><a href="/web/20230128001838/https://csrc.nist.gov/Topics/Activities-and-Products">Activities &amp; Products</a></p> </div> </div> </div> </li> <li><a href="/web/20230128001838/https://csrc.nist.gov/news">News &amp; Updates</a></li> <li><a href="/web/20230128001838/https://csrc.nist.gov/events">Events</a></li> <li><a href="/web/20230128001838/https://csrc.nist.gov/glossary">Glossary</a></li> <li> <a href="/web/20230128001838/https://csrc.nist.gov/about"> About CSRC <span class="expander fa fa-plus" id="main-menu-about-expander" data-expander-name="about" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="about" id="main-menu-about-expanded"> <div class="row"> <div class="col-lg-6"> <p> <strong><a href="/web/20230128001838/https://csrc.nist.gov/Groups/Computer-Security-Division">Computer Security Division</a></strong><br/> <ul> <li><a href="/web/20230128001838/https://csrc.nist.gov/Groups/Computer-Security-Division/Cryptographic-Technology">Cryptographic Technology</a></li> <li><a href="/web/20230128001838/https://csrc.nist.gov/Groups/Computer-Security-Division/Secure-Systems-and-Applications">Secure Systems and Applications</a></li> <li><a href="/web/20230128001838/https://csrc.nist.gov/Groups/Computer-Security-Division/Security-Components-and-Mechanisms">Security Components and Mechanisms</a></li> <li><a href="/web/20230128001838/https://csrc.nist.gov/Groups/Computer-Security-Division/Security-Engineering-and-Risk-Management">Security Engineering and Risk Management</a></li> <li><a href="/web/20230128001838/https://csrc.nist.gov/Groups/Computer-Security-Division/Security-Testing-Validation-and-Measurement">Security Testing, Validation, and Measurement</a></li> </ul> </p> </div> <div class="col-lg-6"> <p> <strong><a href="/web/20230128001838/https://csrc.nist.gov/Groups/Applied-Cybersecurity-Division">Applied Cybersecurity Division</a></strong><br/> <ul> <li><a href="/web/20230128001838/https://csrc.nist.gov/Groups/Applied-Cybersecurity-Division/Cybersecurity-and-Privacy-Applications">Cybersecurity and Privacy Applications</a></li> <li><a href="/web/20230128001838/https://csrc.nist.gov/Groups/Applied-Cybersecurity-Division/National-Cybersecurity-Center-of-Excellence">National Cybersecurity Center of Excellence (NCCoE)</a></li> <li><a href="https://web.archive.org/web/20230128001838/https://www.nist.gov/nice/">National Initiative for Cybersecurity Education (NICE)</a></li> </ul> </p> <p> <a href="/web/20230128001838/https://csrc.nist.gov/contact"> Contact Us </a> </p> </div> </div> </div> </li> </ul> </div><!-- /#mobile-nav-container --> </div> </nav> <section id="itl-header" class="has-menu"> <div class="container"> <div class="row"> <div class="col-sm-12 col-md-8"> <div class="hidden-xs hidden-sm" id="itl-header-lg"> <a href="https://web.archive.org/web/20230128001838/https://www.nist.gov/itl" target="_blank" id="itl-header-link">Information Technology Laboratory</a> </div> <div class="hidden-xs hidden-sm" id="csrc-header-lg"> <a href="/web/20230128001838/https://csrc.nist.gov/" id="csrc-header-link-lg">Computer Security Resource Center</a> </div> </div> <div class="col-sm-12 col-md-4"> <div class="hidden-xs hidden-sm hidden-md"> <a id="logo-csrc-lg" href="/web/20230128001838/https://csrc.nist.gov/"><img id="img-logo-csrc-lg" src="/web/20230128001838im_/https://csrc.nist.gov/CSRC/Media/images/nist-logo-csrc-white.svg" alt="CSRC Logo" class="csrc-header-logo"></a> </div> <div class="hidden-lg"> <a id="logo-csrc-sm" href="/web/20230128001838/https://csrc.nist.gov/"><img id="img-logo-csrc-sm" src="/web/20230128001838im_/https://csrc.nist.gov/CSRC/Media/images/nist-logo-csrc-white.svg" alt="CSRC Logo" class="csrc-header-logo"></a> </div> </div> </div> </div> </section> <div id="body-section" class="container"> <div class="publications-content"> <div class="row"> <div class="col-lg-3 col-md-4 hidden-sm hidden-xs hidden-xxs"> <div id="publications-quicklinks-lg" class="bs-callout bs-callout-subnav hidden-sm hidden-xs hidden-xxs"> <h4>Current Publications <i class="fa fa-bolt"></i></h4> <ul> <li> <strong> NIST Series Pubs <i class="fa fa-info-circle" aria-hidden="true" data-placement="right" data-html="true" data-tooltip-toggle="tooltipWithFunction" data-title-container="nist-series-pubs-tooltip"></i> </strong> <ul> <li><a href="/web/20230128001838/https://csrc.nist.gov/publications/final-pubs" id="quick-link-final-lg">Final Pubs</a></li> <li><a href="/web/20230128001838/https://csrc.nist.gov/publications/drafts-open-for-comment" id="quick-links-comments-lg">Drafts Open for Comment</a></li> <li><a href="/web/20230128001838/https://csrc.nist.gov/publications/draft-pubs" id="quick-link-draft-lg">All Public Drafts</a></li> <li> <strong> View By Series <i class="fa fa-info-circle" aria-hidden="true" data-placement="right" data-html="true" data-tooltip-toggle="tooltipWithFunction" data-title-container="nist-view-series-pubs-tooltip"></i> </strong> <ul> <li><a href="/web/20230128001838/https://csrc.nist.gov/publications/fips" id="quick-link-fips-lg">FIPS</a></li> <li><a href="/web/20230128001838/https://csrc.nist.gov/publications/sp800" id="quick-link-sp-800-lg">SP 800 series</a></li> <li><a href="/web/20230128001838/https://csrc.nist.gov/publications/sp" id="quick-link-sp-lg">All SP series</a></li> <li><a href="/web/20230128001838/https://csrc.nist.gov/publications/nistir" id="quick-link-nistir-lg">NISTIRs</a></li> <li><a href="/web/20230128001838/https://csrc.nist.gov/publications/itl-bulletin" id="quick-link-itl-bul-lg">ITL Bulletins</a></li> </ul> </li> </ul> </li> <li> <strong> Other Pubs <i class="fa fa-info-circle" aria-hidden="true" data-placement="right" data-html="true" data-tooltip-toggle="tooltipWithFunction" data-title-container="nist-other-pubs-tooltip"></i> </strong> <ul> <li><a href="/web/20230128001838/https://csrc.nist.gov/publications/white-paper" id="quick-link-white-papers-lg">White Papers</a></li> <li><a href="/web/20230128001838/https://csrc.nist.gov/publications/journal-article" id="quick-link-journal-articles-lg">Journal Articles</a></li> <li><a href="/web/20230128001838/https://csrc.nist.gov/publications/conference-paper" id="quick-link-conference-papers-lg">Conference Papers</a></li> <li><a href="/web/20230128001838/https://csrc.nist.gov/publications/book" id="quick-link-books-lg">Books</a></li> </ul> </li> </ul> <span style="display: none;" id="nist-series-pubs-tooltip"> <strong>Final:</strong> <em>Current list of all published NIST cybersecurity documents.</em> Does not include "Withdrawn" documents. Includes FIPS, Special Publications, NISTIRs, ITL Bulletins, and NIST Cybersecurity White Papers.<br/> <br/> <strong>Public Drafts:</strong> <em>Current list of all draft NIST cybersecurity documents--they are typically posted for public comment.</em> "Current" public drafts are the latest draft versions that have not yet been published as "Final." </span> <span style="display: none;" id="nist-view-series-pubs-tooltip"> <strong>FIPS:</strong> <em>Current Federal Information Processing Standard Publications (FIPS).</em> Includes current (Final and Draft) FIPS.<br/> <br/> <strong>SP 800 Series:</strong> <em>Current NIST Special Publication (SP) 800 series publications, which focus on Computer/Information Security.</em> Includes current (Final and Draft) SP 800 pubs.<br/> <br/> <strong>All SP Series:</strong> <em> Current NIST Special Publications (SP), including SP 800 (Computer/Information Security) and SP 1800 (Cybersecurity Practice Guides) pubs. Also includes SP 500 (Computer Systems Technology) pubs related to cybersecurity and privacy. </em> Includes current (Final and Draft) NIST Special Publications.<br/> <br/> <strong>NISTIRs:</strong> <em>Current list of NIST Interagency or Internal Reports (NISTIR) related to cybersecurity and privacy.</em> Includes current (Final and Draft) NISTIRs.<br/> <br/> <strong>ITL Bulletins:</strong> Current list of NIST Information Technology Laboratory (ITL) Bulletins. </span> <span style="display: none;" id="nist-other-pubs-tooltip"> <strong>White Papers:</strong> <em> Consists of NIST Cybersecurity White Papers; NCCoE Project Descriptions, Building Blocks and Use Cases; and other NIST-authored papers that are not part of a formal series. </em> Includes current (Final and Draft) papers.<br/> <br/> <strong>Journal Articles:</strong> NIST-authored articles published in external journals and in the NIST Journal of Research (JRES).<br/> <br/> <strong>Conference Papers:</strong> NIST-authored conference papers related to cybersecurity and privacy.<br/> <br/> <strong>Books:</strong> NIST-authored books, book sections, and encyclopedia entries related to cybersecurity and privacy. </span> </div> <form action="/web/20230128001838/https://csrc.nist.gov/publications/search" class="bs-callout bs-callout-success csrc-search-form hidden-sm hidden-xs hidden-xxs" data-csrc-form="true" data-default-query="sortBy-lg=releasedate+DESC&amp;viewMode-lg=brief&amp;ipp-lg=ALL&amp;status-lg=Final&amp;series-lg=Journal+Article" data-form-ignore-default="sortBy" data-form-name="pubSearchDesktop" id="pubs-search-form-lg" method="get"> <div class="form-group"> <label for="keywords-lg">Search</label> <input name="keywords-lg" class="form-control" data-val="true" data-val-length="The field Search must be a string with a maximum length of 255." data-val-length-max="255" id="keywords-lg" name="Form.Keywords" type="text" value=""/> <em class="text-muted">Search publication record data<br/> (not a full text search)</em> </div> <div class="form-group"> <label for="sortBy-lg">Sort By</label> <div class="form-inline"> <select name="sortBy-lg" class="form-control" id="sortBy-lg" name="Form.SortBy"><option value="relevance">Relevance (best match)</option> <option selected="selected" value="releasedate DESC">Release Date (newest first)</option> <option value="releasedate ASC">Release Date (oldest first)</option> <option value="Series ASC">Series (A-Z)</option> <option value="Series DESC">Series (Z-A)</option> <option value="Number ASC">Number (lowest to highest)</option> <option value="Number DESC">Number (highest to lowest)</option> <option value="title asc">Title (A-Z)</option> <option value="title desc">Title (Z-A)</option> </select> </div> </div> <div class="form-group"> <label for="viewMode-lg">Results View</label> <select name="viewMode-lg" class="form-control" id="viewMode-lg" name="Form.ResultsViewMode"><option selected="selected" value="brief">Brief</option> <option value="summary">Summary</option> </select> </div> <div class="form-group form-inline"> <label for="ipp-lg" class="form-control-half">Items Per Page</label> <select name="ipp-lg" class="form-control" id="ipp-lg" name="Form.ItemsPerPage"><option value="25">25</option> <option value="50">50</option> <option value="75">75</option> <option value="100">100</option> <option selected="selected" value="all">All</option> </select> </div> <div class="form-group"> <label for="dateFrom-lg">Date</label> <div class="form-inline form-date-inline"> <div class="input-group date" data-date-picker="true"> <input name="dateFrom-lg" class="form-control" data-control-type="date" data-val="true" data-val-date="The field Date must be a date." data-validation="true" data-validation-compare-field="dateTo-lg" data-validation-message="From date must be less than To date" data-validation-type="less-than-date" id="dateFrom-lg" name="Form.DateFrom" placeholder=" / / " type="text" value=""/> <span class="input-group-addon"> <span class="fa fa-calendar"> </span> </span> </div> <div class="input-group date" data-date-picker="true"> <input name="dateTo-lg" class="form-control" data-control-type="date" data-val="true" data-val-date="The field DateTo must be a date." id="dateTo-lg" name="Form.DateTo" placeholder=" / / " type="text" value=""/> <span class="input-group-addon"> <span class="fa fa-calendar"> </span> </span> </div> </div> </div> <div class="form-group"> <label for="status-all-lg"> Status <i class="fa fa-info-circle" aria-hidden="true" data-placement="right" data-html="true" data-tooltip-toggle="tooltipWithFunction" data-title-container="publications-status-info"></i> </label> <div class="form-inline status-type" style="margin-left: 1rem;"> <label class="meta-label"> <input type="checkbox" id="status-final-lg" name="status-lg" value="Final" data-default-checked="True" checked="'checked'"/> Final<br/> </label> <label class="meta-label"> <input type="checkbox" id="status-draft-lg" name="status-lg" value="Draft" data-default-checked="True"/> Public Draft<br/> </label> <label class="meta-label"> <input type="checkbox" id="status-withdrawn-lg" name="status-lg" value="Withdrawn" data-default-checked="True"/> Withdrawn<br/> </label> </div> </div> <div class="form-group"> <label for="pub-search-series"> Series <button type="button" id="series-all-lg" class="btn btn-sm btn-success" data-check-all="series-lg">Check All</button> <button type="button" id="series-clear-lg" class="btn btn-sm btn-success" data-check-none="series-lg">Clear</button> </label> <div class="form-inline series-type" style="margin-left: 1rem;"> <label class="meta-label"> <input type="checkbox" id="series-fips-lg" name="series-lg" value="FIPS" data-default-checked="True"/> FIPS<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-sp-lg" name="series-lg" value="SP" data-default-checked="True"/> SP<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-nistir-lg" name="series-lg" value="NISTIR" data-default-checked="True"/> NISTIR<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-itl-bul-lg" name="series-lg" value="ITL Bulletin" data-default-checked="True"/> ITL Bulletin<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-white-paper-lg" name="series-lg" value="White Paper" data-default-checked="True"/> White Paper<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-build-block-lg" name="series-lg" value="Building Block" data-default-checked="True"/> Building Block<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-use-case-lg" name="series-lg" value="Use Case" data-default-checked="True"/> Use Case<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-journal-lg" name="series-lg" value="Journal Article" data-default-checked="True" checked="'checked'/"> Journal Article<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-conf-paper-lg" name="series-lg" value="Conference Paper" data-default-checked="True"/> Conference Paper<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-book-lg" name="series-lg" value="Book" data-default-checked="True"/> Book<br/> </label> </div> </div> <div class="form-group"> <label for="pub-search-topics-lg"> Topics </label> <input name="topics-lg" id="topics-lg" name="Form.Topics" type="hidden" value=""/> <div class="form-control topics-selection" id="pub-search-topics-lg" contenteditable="true" data-drop-target="pub-search-topics-drop-lg" data-field-name="topics-lg" aria-haspopup="true" aria-expanded="false"> </div> <div class="topics-selection-dropdown desktop" id="pub-search-topics-drop-lg" style="display: none;" data-topics-selector=""><div class="col-sm-4"><strong>Security and Privacy</strong><br/> <ul><li><i class="fa fa-plus fa-fw" id="topics-expander-24670-27481" data-expander-for="/topics/security-and-privacy/cryptography"></i> <a data-topic-id="27481" data-topic-text="cryptography">cryptography</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27647" data-topic-text="digital signatures">digital signatures</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27648" data-topic-text="encryption">encryption</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27649" data-topic-text="key management">key management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27650" data-topic-text="message authentication">message authentication</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27651" data-topic-text="post-quantum cryptography">post-quantum cryptography</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27652" data-topic-text="random number generation">random number generation</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27653" data-topic-text="secure hashing">secure hashing</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27482" data-topic-text="cybersecurity supply chain risk management">cybersecurity supply chain risk management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27483" data-topic-text="general security &amp; privacy">general security &amp; privacy</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-24670-27484" data-expander-for="/topics/security-and-privacy/identity-and-access-management"></i> <a data-topic-id="27484" data-topic-text="identity &amp; access management">identity &amp; access management</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27663" data-topic-text="access authorization">access authorization</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27664" data-topic-text="access control">access control</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27665" data-topic-text="authentication">authentication</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27666" data-topic-text="Personal Identity Verification">Personal Identity Verification</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27667" data-topic-text="public key infrastructure">public key infrastructure</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-24670-27485" data-expander-for="/topics/security-and-privacy/privacy"></i> <a data-topic-id="27485" data-topic-text="privacy">privacy</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27680" data-topic-text="personally identifiable information">personally identifiable information</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27681" data-topic-text="privacy engineering">privacy engineering</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-24670-27486" data-expander-for="/topics/security-and-privacy/risk-management"></i> <a data-topic-id="27486" data-topic-text="risk management">risk management</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27682" data-topic-text="categorization">categorization</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27683" data-topic-text="continuous monitoring">continuous monitoring</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-27486-27684" data-expander-for="/topics/security-and-privacy/risk-management/controls"></i> <a data-topic-id="27684" data-topic-text="controls">controls</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27767" data-topic-text="controls assessment">controls assessment</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27768" data-topic-text="privacy controls">privacy controls</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27769" data-topic-text="security controls">security controls</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27685" data-topic-text="risk assessment">risk assessment</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27686" data-topic-text="roots of trust">roots of trust</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27687" data-topic-text="system authorization">system authorization</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-27486-27688" data-expander-for="/topics/security-and-privacy/risk-management/threats"></i> <a data-topic-id="27688" data-topic-text="threats">threats</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27770" data-topic-text="advanced persistent threats">advanced persistent threats</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27771" data-topic-text="botnets">botnets</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27772" data-topic-text="information sharing">information sharing</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27773" data-topic-text="intrusion detection &amp; prevention">intrusion detection &amp; prevention</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27774" data-topic-text="malware">malware</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27689" data-topic-text="vulnerability management">vulnerability management</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-24670-27487" data-expander-for="/topics/security-and-privacy/security-and-behavior"></i> <a data-topic-id="27487" data-topic-text="security &amp; behavior">security &amp; behavior</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27709" data-topic-text="accessibility">accessibility</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27710" data-topic-text="behavior">behavior</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27711" data-topic-text="usability">usability</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-24670-27488" data-expander-for="/topics/security-and-privacy/security-measurement"></i> <a data-topic-id="27488" data-topic-text="security measurement">security measurement</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27690" data-topic-text="analytics">analytics</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27691" data-topic-text="assurance">assurance</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27692" data-topic-text="modeling">modeling</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27693" data-topic-text="testing &amp; validation">testing &amp; validation</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-24670-27489" data-expander-for="/topics/security-and-privacy/security-programs-and-operations"></i> <a data-topic-id="27489" data-topic-text="security programs &amp; operations">security programs &amp; operations</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27694" data-topic-text="acquisition">acquisition</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27695" data-topic-text="asset management">asset management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27696" data-topic-text="audit &amp; accountability">audit &amp; accountability</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27697" data-topic-text="awareness training &amp; education">awareness training &amp; education</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27698" data-topic-text="configuration management">configuration management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27699" data-topic-text="contingency planning">contingency planning</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27700" data-topic-text="incident response">incident response</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27701" data-topic-text="maintenance">maintenance</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27702" data-topic-text="media protection">media protection</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27703" data-topic-text="patch management">patch management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27704" data-topic-text="personnel security">personnel security</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27705" data-topic-text="physical &amp; environmental protection">physical &amp; environmental protection</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27706" data-topic-text="planning">planning</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27707" data-topic-text="program management">program management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27708" data-topic-text="security automation">security automation</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-24670-27490" data-expander-for="/topics/security-and-privacy/systems-security-engineering"></i> <a data-topic-id="27490" data-topic-text="systems security engineering">systems security engineering</a><ul style="display: none;"><li><i class="fa fa-plus fa-fw" id="topics-expander-27490-27713" data-expander-for="/topics/security-and-privacy/systems-security-engineering/trustworthiness"></i> <a data-topic-id="27713" data-topic-text="trustworthiness">trustworthiness</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27775" data-topic-text="reliability">reliability</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27776" data-topic-text="resilience">resilience</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27777" data-topic-text="safety">safety</a></li></ul> </li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="33442" data-topic-text="zero trust">zero trust</a></li></ul><strong>Technologies</strong><br/> <ul><li><i class="fa fa-fw"></i> <a data-topic-id="27491" data-topic-text="artificial intelligence">artificial intelligence</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27492" data-topic-text="big data">big data</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27493" data-topic-text="biometrics">biometrics</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27494" data-topic-text="blockchain">blockchain</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27495" data-topic-text="cloud &amp; virtualization">cloud &amp; virtualization</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27496" data-topic-text="combinatorial testing">combinatorial testing</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27497" data-topic-text="complexity">complexity</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-24671-27499" data-expander-for="/topics/technologies/hardware"></i> <a data-topic-id="27499" data-topic-text="hardware">hardware</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27714" data-topic-text="circuits">circuits</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27715" data-topic-text="personal computers">personal computers</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27716" data-topic-text="sensors">sensors</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27498" data-topic-text="mobile">mobile</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-24671-27500" data-expander-for="/topics/technologies/networks"></i> <a data-topic-id="27500" data-topic-text="networks">networks</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27717" data-topic-text="email">email</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27718" data-topic-text="firewalls">firewalls</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27719" data-topic-text="internet">internet</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27501" data-topic-text="quantum information science">quantum information science</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27502" data-topic-text="servers">servers</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27503" data-topic-text="smart cards">smart cards</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-24671-27504" data-expander-for="/topics/technologies/software-firmware"></i> <a data-topic-id="27504" data-topic-text="software &amp; firmware">software &amp; firmware</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27720" data-topic-text="BIOS">BIOS</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27721" data-topic-text="databases">databases</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27722" data-topic-text="operating systems">operating systems</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27505" data-topic-text="storage">storage</a></li></ul></div><div class="col-sm-4"><strong>Applications</strong><br/> <ul><li><i class="fa fa-fw"></i> <a data-topic-id="27456" data-topic-text="communications &amp; wireless">communications &amp; wireless</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27457" data-topic-text="cyber-physical systems">cyber-physical systems</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27458" data-topic-text="cybersecurity education">cybersecurity education</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27459" data-topic-text="cybersecurity framework">cybersecurity framework</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27460" data-topic-text="cybersecurity workforce">cybersecurity workforce</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27461" data-topic-text="enterprise">enterprise</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27462" data-topic-text="forensics">forensics</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27463" data-topic-text="industrial control systems">industrial control systems</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27464" data-topic-text="Internet of Things">Internet of Things</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="28914" data-topic-text="positioning navigation &amp; timing">positioning navigation &amp; timing</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27465" data-topic-text="small &amp; medium business">small &amp; medium business</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27466" data-topic-text="telework">telework</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27467" data-topic-text="voting">voting</a></li></ul><strong>Laws and Regulations</strong><br/> <ul><li><i class="fa fa-plus fa-fw" id="topics-expander-24673-27468" data-expander-for="/topics/laws-and-regulations/executive-documents"></i> <a data-topic-id="27468" data-topic-text="executive documents">executive documents</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27668" data-topic-text="Comprehensive National Cybersecurity Initiative">Comprehensive National Cybersecurity Initiative</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27669" data-topic-text="Cybersecurity Strategy and Implementation Plan">Cybersecurity Strategy and Implementation Plan</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27670" data-topic-text="Cyberspace Policy Review">Cyberspace Policy Review</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27671" data-topic-text="Executive Order 13636">Executive Order 13636</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27672" data-topic-text="Executive Order 13702">Executive Order 13702</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27673" data-topic-text="Executive Order 13718">Executive Order 13718</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27674" data-topic-text="Executive Order 13800">Executive Order 13800</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="28915" data-topic-text="Executive Order 13905">Executive Order 13905</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="33441" data-topic-text="Executive Order 14028">Executive Order 14028</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27675" data-topic-text="Federal Cybersecurity Research and Development Strategic Plan">Federal Cybersecurity Research and Development Strategic Plan</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27676" data-topic-text="Homeland Security Presidential Directive 7">Homeland Security Presidential Directive 7</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27677" data-topic-text="Homeland Security Presidential Directive 12">Homeland Security Presidential Directive 12</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27678" data-topic-text="OMB Circular A-11">OMB Circular A-11</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27679" data-topic-text="OMB Circular A-130">OMB Circular A-130</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-24673-27469" data-expander-for="/topics/laws-and-regulations/laws"></i> <a data-topic-id="27469" data-topic-text="laws">laws</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27654" data-topic-text="Cyber Security R&amp;D Act">Cyber Security R&D; Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27655" data-topic-text="Cybersecurity Enhancement Act">Cybersecurity Enhancement Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27656" data-topic-text="E-Government Act">E-Government Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27657" data-topic-text="Energy Independence and Security Act">Energy Independence and Security Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27658" data-topic-text="Federal Information Security Modernization Act">Federal Information Security Modernization Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27659" data-topic-text="First Responder Network Authority">First Responder Network Authority</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27660" data-topic-text="Health Insurance Portability and Accountability Act">Health Insurance Portability and Accountability Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27661" data-topic-text="Help America Vote Act">Help America Vote Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="33553" data-topic-text="Internet of Things Cybersecurity Improvement Act">Internet of Things Cybersecurity Improvement Act</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-24673-27470" data-expander-for="/topics/laws-and-regulations/regulations"></i> <a data-topic-id="27470" data-topic-text="regulations">regulations</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27662" data-topic-text="Federal Acquisition Regulation">Federal Acquisition Regulation</a></li></ul> </li></ul></div><div class="col-sm-4"><strong>Activities and Products</strong><br/> <ul><li><i class="fa fa-fw"></i> <a data-topic-id="27452" data-topic-text="annual reports">annual reports</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27453" data-topic-text="conferences &amp; workshops">conferences &amp; workshops</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27454" data-topic-text="reference materials">reference materials</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27455" data-topic-text="standards development">standards development</a></li></ul><strong>Sectors</strong><br/> <ul><li><i class="fa fa-fw"></i> <a data-topic-id="27471" data-topic-text="aerospace">aerospace</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-24675-27472" data-expander-for="/topics/sectors/energy"></i> <a data-topic-id="27472" data-topic-text="energy">energy</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27712" data-topic-text="smart grid">smart grid</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27473" data-topic-text="financial services">financial services</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27474" data-topic-text="healthcare">healthcare</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27475" data-topic-text="hospitality">hospitality</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27476" data-topic-text="manufacturing">manufacturing</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27477" data-topic-text="public safety">public safety</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27478" data-topic-text="retail">retail</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27479" data-topic-text="telecommunications">telecommunications</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27480" data-topic-text="transportation">transportation</a></li></ul></div></div> <div class="form-inline topics-type"> <label class="radio-label">Match ANY: <input name="topicsMatch-lg" checked="checked" id="topicsMatch-any-lg" name="Form.TopicsMatch" type="radio" value="ANY"/></label> <label class="radio-label">Match ALL: <input name="topicsMatch-lg" id="topicsMatch-all-lg" name="Form.TopicsMatch" type="radio" value="ALL"/></label> </div> </div> <div class="form-group"> <label for="pub-search-controls-lg"> Control Family (800-53) </label> <input name="controls-lg" id="controls-lg" name="Form.Controls" type="hidden" value=""/> <div class="form-control controls-selection" id="pub-search-controls-lg" contenteditable="true" data-drop-target="pub-search-controls-drop-lg" data-field-name="controls-lg" aria-haspopup="true" aria-expanded="false"> </div> <div class="controls-selection-dropdown desktop" id="pub-search-controls-drop-lg" style="display: none;" data-controls-selector=""> <strong>Control Families</strong> <ul> <li><a data-control-id="63d54ae4-c6cf-4ae4-a398-f19298c74903">AC - Access Control</a></li> <li><a data-control-id="36fb0b10-f6ae-4e0e-803c-bece9c947fd8">AT - Awareness and Training</a></li> <li><a data-control-id="4243d52c-ff5e-417b-8e1b-8344ff811570">AU - Audit and Accountability</a></li> <li><a data-control-id="0d93bf29-4551-4b7d-9677-23d0eb0524e0">CA - Assessment, Authorization and Monitoring</a></li> <li><a data-control-id="809b7563-f050-4bbf-a0e4-7ad25411734d">CM - Configuration Management</a></li> <li><a data-control-id="da51be5c-b86d-4e32-9484-f94cf75b8217">CP - Contingency Planning</a></li> <li><a data-control-id="ed87a12a-b75a-4555-862c-52f071b7ddb0">IA - Identification and Authentication</a></li> <li><a data-control-id="4801756a-a4ed-4b64-8890-4169d9b6a9ce">IR - Incident Response</a></li> <li><a data-control-id="88089d1d-c115-41f7-92ad-a84abe6101fc">MA - Maintenance</a></li> <li><a data-control-id="3fb9de77-cb37-43fd-b8a5-e33576b8caa1">MP - Media Protection</a></li> <li><a data-control-id="f3b91e7e-2498-49ce-bd0f-5b9ce3bbd9e0">PE - Physical and Environmental Protection</a></li> <li><a data-control-id="641492d1-d2da-40e6-a523-f93fdb5358e9">PL - Planning</a></li> <li><a data-control-id="9d2a46b6-2530-4266-ae75-dab3ea78d7a0">PM - Program Management</a></li> <li><a data-control-id="205e7cff-23a5-4b59-85bc-168ae6e7d95f">PS - Personnel Security</a></li> <li><a data-control-id="09385da5-c3cd-4dcf-91e9-fd455b0ef704">PT - PII Processing and Transparency</a></li> <li><a data-control-id="e08f7835-ea6b-4b7c-9db3-33a3662a38d1">RA - Risk Assessment</a></li> <li><a data-control-id="8e2ea53d-c53d-480e-b374-eb5ab055a94b">SA - System and Services Acquisition</a></li> <li><a data-control-id="f35646b1-d701-4941-b1c5-8e872f6bb812">SC - System and Communications Protection</a></li> <li><a data-control-id="660d9ce0-9cfe-4f5e-890a-41670d010846">SI - System and Information Integrity</a></li> <li><a data-control-id="605d44df-5027-4c32-a228-c000bbcac173">SR - Supply Chain Risk Management</a></li> </ul> </div> <div class="form-inline controls-type"> <label class="radio-label">Match ANY: <input name="controlsMatch-lg" checked="checked" id="controlsMatch-any-lg" name="Form.ControlsMatch" type="radio" value="ANY"/></label> <label class="radio-label">Match ALL: <input name="controlsMatch-lg" id="controlsMatch-all-lg" name="Form.ControlsMatch" type="radio" value="ALL"/></label> </div> </div> <div style="display: none;" data-form-error-pane="true" class="text-danger"> <strong class="text-danger">Please fix the following:</strong> <ul data-form-error-list="true"> </ul> <div class="validation-summary-valid" data-valmsg-summary="true"><ul><li style="display:none"></li> </ul></div> </div> <div class="form-group"> <button type="submit" id="pubs-search-submit-lg" name="submit-btn" data-form-button="submit" class="btn">Search</button> <button type="reset" id="pubs-search-reset-lg" name="reset-btn" data-form-button="reset" class="btn">Reset</button> </div> <span style="display: none;" id="publications-status-info"> <p><strong>Final:</strong> Published documents.</p> <p><strong>Public Draft:</strong> Documents have been posted as Public Drafts, typically with a public comment period.</p> <p> <strong>Withdrawn:</strong> Documents that have been withdrawn, and are no longer current. This includes:<br/> - Final publications that have been withdrawn;<br/> - Public drafts that have been obsoleted by a subsequent draft or final publication;<br/> - Public drafts that have been retired—further development was discontinued. </p> </span> </form> </div> <div class="col-lg-9 col-md-8 col-sm-12 col-xs-12 col-xxs-12"> <h4>Search Results</h4> <form action="/web/20230128001838/https://csrc.nist.gov/publications/search" class="bs-callout bs-callout-success csrc-search-form hidden-lg hidden-md mobile-form" data-csrc-form="true" data-default-query="sortBy-lg=releasedate+DESC&amp;viewMode-lg=brief&amp;ipp-lg=ALL&amp;status-lg=Final&amp;series-lg=Journal+Article" data-form-ignore-default="sortBy" data-form-name="pubSearchMobile" id="pubs-search-form-sm" method="get"> <div class="form-group"> <label for="keywords-sm">Search</label> <input name="keywords-sm" class="form-control" data-val="true" data-val-length="The field Search must be a string with a maximum length of 255." data-val-length-max="255" id="keywords-sm" name="Form.Keywords" type="text" value=""/> <em class="text-muted">Search publication record data<br/> (not a full text search)</em> </div> <div class="form-group"> <label for="sortBy-sm">Sort By</label> <div class="form-inline"> <select name="sortBy-sm" class="form-control" id="sortBy-sm" name="Form.SortBy"><option value="relevance">Relevance (best match)</option> <option selected="selected" value="releasedate DESC">Release Date (newest first)</option> <option value="releasedate ASC">Release Date (oldest first)</option> <option value="Series ASC">Series (A-Z)</option> <option value="Series DESC">Series (Z-A)</option> <option value="Number ASC">Number (lowest to highest)</option> <option value="Number DESC">Number (highest to lowest)</option> <option value="title asc">Title (A-Z)</option> <option value="title desc">Title (Z-A)</option> </select> </div> </div> <div class="form-group"> <label for="viewMode-sm">Results View</label> <select name="viewMode-sm" class="form-control" id="viewMode-sm" name="Form.ResultsViewMode"><option selected="selected" value="brief">Brief</option> <option value="summary">Summary</option> </select> </div> <div class="form-group form-inline"> <label for="ipp-sm" class="form-control-half">Items Per Page</label> <select name="ipp-sm" class="form-control" id="ipp-sm" name="Form.ItemsPerPage"><option value="25">25</option> <option value="50">50</option> <option value="75">75</option> <option value="100">100</option> <option selected="selected" value="all">All</option> </select> </div> <div class="form-group"> <p class="text-center"> <a href="#" data-form-show-name="advancedSearch" id="advanced-search-link"> Advanced Search <i class="fa fa-caret-down" aria-hidden="true" data-form-show-expanded="true" style="display: none;"></i> <i class="fa fa-caret-up" aria-hidden="true" data-form-show-expanded="false"></i> </a> </p> </div> <div style="display: none;" data-form-show-trigger="advancedSearch" data-form-show="false"> <div class="form-group"> <label for="dateFrom-sm">Date</label> <div class="form-inline form-date-inline"> <div class="input-group date" data-date-picker="true"> <input name="dateFrom-sm" class="form-control" data-control-type="date" data-val="true" data-val-date="The field Date must be a date." data-validation="true" data-validation-compare-field="dateTo-sm" data-validation-message="From date must be less than To date" data-validation-type="less-than-date" id="dateFrom-sm" name="Form.DateFrom" placeholder=" / / " type="text" value=""/> <span class="input-group-addon"> <span class="fa fa-calendar"> </span> </span> </div> <div class="input-group date" data-date-picker="true"> <input name="dateTo-sm" class="form-control" data-control-type="date" data-val="true" data-val-date="The field DateTo must be a date." id="dateTo-sm" name="Form.DateTo" placeholder=" / / " type="text" value=""/> <span class="input-group-addon"> <span class="fa fa-calendar"> </span> </span> </div> </div> </div> <div class="form-group"> <label for="status-all-sm"> Status <i class="fa fa-info-circle" aria-hidden="true" data-placement="right" data-html="true" data-tooltip-toggle="tooltipWithFunction" data-title-container="publications-status-info"></i> </label> <div class="form-inline status-type" style="margin-left: 1rem;"> <label class="meta-label"> <input type="checkbox" id="status-final-sm" name="status-sm" value="Final" data-default-checked="True" checked="'checked'"/> Final<br/> </label> <label class="meta-label"> <input type="checkbox" id="status-draft-sm" name="status-sm" value="Draft" data-default-checked="True"/> Public Draft<br/> </label> <label class="meta-label"> <input type="checkbox" id="status-withdrawn-sm" name="status-sm" value="Withdrawn" data-default-checked="True"/> Withdrawn<br/> </label> </div> </div> <div class="form-group"> <label for="pub-search-series"> Series <button type="button" id="series-all-sm" class="btn btn-sm btn-success" data-check-all="series-sm">Check All</button> <button type="button" id="series-clear-sm" class="btn btn-sm btn-success" data-check-none="series-sm">Clear</button> </label> <div class="form-inline series-type" style="margin-left: 1rem;"> <label class="meta-label"> <input type="checkbox" id="series-fips-sm" name="series-sm" value="FIPS" data-default-checked="True"/> FIPS<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-sp-sm" name="series-sm" value="SP" data-default-checked="True"/> SP<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-nistir-sm" name="series-sm" value="NISTIR" data-default-checked="True"/> NISTIR<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-itl-bul-sm" name="series-sm" value="ITL Bulletin" data-default-checked="True"/> ITL Bulletin<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-white-paper-sm" name="series-sm" value="White Paper" data-default-checked="True"/> White Paper<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-build-block-sm" name="series-sm" value="Building Block" data-default-checked="True"/> Building Block<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-use-case-sm" name="series-sm" value="Use Case" data-default-checked="True"/> Use Case<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-journal-sm" name="series-sm" value="Journal Article" data-default-checked="True" checked="'checked'/"> Journal Article<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-conf-paper-sm" name="series-sm" value="Conference Paper" data-default-checked="True"/> Conference Paper<br/> </label> <label class="meta-label"> <input type="checkbox" id="series-book-sm" name="series-sm" value="Book" data-default-checked="True"/> Book<br/> </label> </div> </div> <div class="form-group"> <label for="pub-search-topics-sm"> Topics </label> <input name="topics-sm" id="topics-sm" name="Form.Topics" type="hidden" value=""/> <div class="form-control topics-selection" id="pub-search-topics-sm" contenteditable="true" data-drop-target="pub-search-topics-drop-sm" data-field-name="topics-sm" aria-haspopup="true" aria-expanded="false"> </div> <div class="topics-selection-dropdown desktop" id="pub-search-topics-drop-sm" style="display: none;" data-topics-selector=""><div class="col-sm-4"><strong>Security and Privacy</strong><br/> <ul><li><i class="fa fa-plus fa-fw" id="topics-expander-24670-27481" data-expander-for="/topics/security-and-privacy/cryptography"></i> <a data-topic-id="27481" data-topic-text="cryptography">cryptography</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27647" data-topic-text="digital signatures">digital signatures</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27648" data-topic-text="encryption">encryption</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27649" data-topic-text="key management">key management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27650" data-topic-text="message authentication">message authentication</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27651" data-topic-text="post-quantum cryptography">post-quantum cryptography</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27652" data-topic-text="random number generation">random number generation</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27653" data-topic-text="secure hashing">secure hashing</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27482" data-topic-text="cybersecurity supply chain risk management">cybersecurity supply chain risk management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27483" data-topic-text="general security &amp; privacy">general security &amp; privacy</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-24670-27484" data-expander-for="/topics/security-and-privacy/identity-and-access-management"></i> <a data-topic-id="27484" data-topic-text="identity &amp; access management">identity &amp; access management</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27663" data-topic-text="access authorization">access authorization</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27664" data-topic-text="access control">access control</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27665" data-topic-text="authentication">authentication</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27666" data-topic-text="Personal Identity Verification">Personal Identity Verification</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27667" data-topic-text="public key infrastructure">public key infrastructure</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-24670-27485" data-expander-for="/topics/security-and-privacy/privacy"></i> <a data-topic-id="27485" data-topic-text="privacy">privacy</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27680" data-topic-text="personally identifiable information">personally identifiable information</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27681" data-topic-text="privacy engineering">privacy engineering</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-24670-27486" data-expander-for="/topics/security-and-privacy/risk-management"></i> <a data-topic-id="27486" data-topic-text="risk management">risk management</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27682" data-topic-text="categorization">categorization</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27683" data-topic-text="continuous monitoring">continuous monitoring</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-27486-27684" data-expander-for="/topics/security-and-privacy/risk-management/controls"></i> <a data-topic-id="27684" data-topic-text="controls">controls</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27767" data-topic-text="controls assessment">controls assessment</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27768" data-topic-text="privacy controls">privacy controls</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27769" data-topic-text="security controls">security controls</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27685" data-topic-text="risk assessment">risk assessment</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27686" data-topic-text="roots of trust">roots of trust</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27687" data-topic-text="system authorization">system authorization</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-27486-27688" data-expander-for="/topics/security-and-privacy/risk-management/threats"></i> <a data-topic-id="27688" data-topic-text="threats">threats</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27770" data-topic-text="advanced persistent threats">advanced persistent threats</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27771" data-topic-text="botnets">botnets</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27772" data-topic-text="information sharing">information sharing</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27773" data-topic-text="intrusion detection &amp; prevention">intrusion detection &amp; prevention</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27774" data-topic-text="malware">malware</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27689" data-topic-text="vulnerability management">vulnerability management</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-24670-27487" data-expander-for="/topics/security-and-privacy/security-and-behavior"></i> <a data-topic-id="27487" data-topic-text="security &amp; behavior">security &amp; behavior</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27709" data-topic-text="accessibility">accessibility</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27710" data-topic-text="behavior">behavior</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27711" data-topic-text="usability">usability</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-24670-27488" data-expander-for="/topics/security-and-privacy/security-measurement"></i> <a data-topic-id="27488" data-topic-text="security measurement">security measurement</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27690" data-topic-text="analytics">analytics</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27691" data-topic-text="assurance">assurance</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27692" data-topic-text="modeling">modeling</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27693" data-topic-text="testing &amp; validation">testing &amp; validation</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-24670-27489" data-expander-for="/topics/security-and-privacy/security-programs-and-operations"></i> <a data-topic-id="27489" data-topic-text="security programs &amp; operations">security programs &amp; operations</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27694" data-topic-text="acquisition">acquisition</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27695" data-topic-text="asset management">asset management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27696" data-topic-text="audit &amp; accountability">audit &amp; accountability</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27697" data-topic-text="awareness training &amp; education">awareness training &amp; education</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27698" data-topic-text="configuration management">configuration management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27699" data-topic-text="contingency planning">contingency planning</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27700" data-topic-text="incident response">incident response</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27701" data-topic-text="maintenance">maintenance</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27702" data-topic-text="media protection">media protection</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27703" data-topic-text="patch management">patch management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27704" data-topic-text="personnel security">personnel security</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27705" data-topic-text="physical &amp; environmental protection">physical &amp; environmental protection</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27706" data-topic-text="planning">planning</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27707" data-topic-text="program management">program management</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27708" data-topic-text="security automation">security automation</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-24670-27490" data-expander-for="/topics/security-and-privacy/systems-security-engineering"></i> <a data-topic-id="27490" data-topic-text="systems security engineering">systems security engineering</a><ul style="display: none;"><li><i class="fa fa-plus fa-fw" id="topics-expander-27490-27713" data-expander-for="/topics/security-and-privacy/systems-security-engineering/trustworthiness"></i> <a data-topic-id="27713" data-topic-text="trustworthiness">trustworthiness</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27775" data-topic-text="reliability">reliability</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27776" data-topic-text="resilience">resilience</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27777" data-topic-text="safety">safety</a></li></ul> </li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="33442" data-topic-text="zero trust">zero trust</a></li></ul><strong>Technologies</strong><br/> <ul><li><i class="fa fa-fw"></i> <a data-topic-id="27491" data-topic-text="artificial intelligence">artificial intelligence</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27492" data-topic-text="big data">big data</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27493" data-topic-text="biometrics">biometrics</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27494" data-topic-text="blockchain">blockchain</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27495" data-topic-text="cloud &amp; virtualization">cloud &amp; virtualization</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27496" data-topic-text="combinatorial testing">combinatorial testing</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27497" data-topic-text="complexity">complexity</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-24671-27499" data-expander-for="/topics/technologies/hardware"></i> <a data-topic-id="27499" data-topic-text="hardware">hardware</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27714" data-topic-text="circuits">circuits</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27715" data-topic-text="personal computers">personal computers</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27716" data-topic-text="sensors">sensors</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27498" data-topic-text="mobile">mobile</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-24671-27500" data-expander-for="/topics/technologies/networks"></i> <a data-topic-id="27500" data-topic-text="networks">networks</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27717" data-topic-text="email">email</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27718" data-topic-text="firewalls">firewalls</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27719" data-topic-text="internet">internet</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27501" data-topic-text="quantum information science">quantum information science</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27502" data-topic-text="servers">servers</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27503" data-topic-text="smart cards">smart cards</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-24671-27504" data-expander-for="/topics/technologies/software-firmware"></i> <a data-topic-id="27504" data-topic-text="software &amp; firmware">software &amp; firmware</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27720" data-topic-text="BIOS">BIOS</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27721" data-topic-text="databases">databases</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27722" data-topic-text="operating systems">operating systems</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27505" data-topic-text="storage">storage</a></li></ul></div><div class="col-sm-4"><strong>Applications</strong><br/> <ul><li><i class="fa fa-fw"></i> <a data-topic-id="27456" data-topic-text="communications &amp; wireless">communications &amp; wireless</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27457" data-topic-text="cyber-physical systems">cyber-physical systems</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27458" data-topic-text="cybersecurity education">cybersecurity education</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27459" data-topic-text="cybersecurity framework">cybersecurity framework</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27460" data-topic-text="cybersecurity workforce">cybersecurity workforce</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27461" data-topic-text="enterprise">enterprise</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27462" data-topic-text="forensics">forensics</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27463" data-topic-text="industrial control systems">industrial control systems</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27464" data-topic-text="Internet of Things">Internet of Things</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="28914" data-topic-text="positioning navigation &amp; timing">positioning navigation &amp; timing</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27465" data-topic-text="small &amp; medium business">small &amp; medium business</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27466" data-topic-text="telework">telework</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27467" data-topic-text="voting">voting</a></li></ul><strong>Laws and Regulations</strong><br/> <ul><li><i class="fa fa-plus fa-fw" id="topics-expander-24673-27468" data-expander-for="/topics/laws-and-regulations/executive-documents"></i> <a data-topic-id="27468" data-topic-text="executive documents">executive documents</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27668" data-topic-text="Comprehensive National Cybersecurity Initiative">Comprehensive National Cybersecurity Initiative</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27669" data-topic-text="Cybersecurity Strategy and Implementation Plan">Cybersecurity Strategy and Implementation Plan</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27670" data-topic-text="Cyberspace Policy Review">Cyberspace Policy Review</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27671" data-topic-text="Executive Order 13636">Executive Order 13636</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27672" data-topic-text="Executive Order 13702">Executive Order 13702</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27673" data-topic-text="Executive Order 13718">Executive Order 13718</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27674" data-topic-text="Executive Order 13800">Executive Order 13800</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="28915" data-topic-text="Executive Order 13905">Executive Order 13905</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="33441" data-topic-text="Executive Order 14028">Executive Order 14028</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27675" data-topic-text="Federal Cybersecurity Research and Development Strategic Plan">Federal Cybersecurity Research and Development Strategic Plan</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27676" data-topic-text="Homeland Security Presidential Directive 7">Homeland Security Presidential Directive 7</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27677" data-topic-text="Homeland Security Presidential Directive 12">Homeland Security Presidential Directive 12</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27678" data-topic-text="OMB Circular A-11">OMB Circular A-11</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27679" data-topic-text="OMB Circular A-130">OMB Circular A-130</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-24673-27469" data-expander-for="/topics/laws-and-regulations/laws"></i> <a data-topic-id="27469" data-topic-text="laws">laws</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27654" data-topic-text="Cyber Security R&amp;D Act">Cyber Security R&D; Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27655" data-topic-text="Cybersecurity Enhancement Act">Cybersecurity Enhancement Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27656" data-topic-text="E-Government Act">E-Government Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27657" data-topic-text="Energy Independence and Security Act">Energy Independence and Security Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27658" data-topic-text="Federal Information Security Modernization Act">Federal Information Security Modernization Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27659" data-topic-text="First Responder Network Authority">First Responder Network Authority</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27660" data-topic-text="Health Insurance Portability and Accountability Act">Health Insurance Portability and Accountability Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27661" data-topic-text="Help America Vote Act">Help America Vote Act</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="33553" data-topic-text="Internet of Things Cybersecurity Improvement Act">Internet of Things Cybersecurity Improvement Act</a></li></ul> </li><li><i class="fa fa-plus fa-fw" id="topics-expander-24673-27470" data-expander-for="/topics/laws-and-regulations/regulations"></i> <a data-topic-id="27470" data-topic-text="regulations">regulations</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27662" data-topic-text="Federal Acquisition Regulation">Federal Acquisition Regulation</a></li></ul> </li></ul></div><div class="col-sm-4"><strong>Activities and Products</strong><br/> <ul><li><i class="fa fa-fw"></i> <a data-topic-id="27452" data-topic-text="annual reports">annual reports</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27453" data-topic-text="conferences &amp; workshops">conferences &amp; workshops</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27454" data-topic-text="reference materials">reference materials</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27455" data-topic-text="standards development">standards development</a></li></ul><strong>Sectors</strong><br/> <ul><li><i class="fa fa-fw"></i> <a data-topic-id="27471" data-topic-text="aerospace">aerospace</a></li><li><i class="fa fa-plus fa-fw" id="topics-expander-24675-27472" data-expander-for="/topics/sectors/energy"></i> <a data-topic-id="27472" data-topic-text="energy">energy</a><ul style="display: none;"><li><i class="fa fa-fw"></i> <a data-topic-id="27712" data-topic-text="smart grid">smart grid</a></li></ul> </li><li><i class="fa fa-fw"></i> <a data-topic-id="27473" data-topic-text="financial services">financial services</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27474" data-topic-text="healthcare">healthcare</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27475" data-topic-text="hospitality">hospitality</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27476" data-topic-text="manufacturing">manufacturing</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27477" data-topic-text="public safety">public safety</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27478" data-topic-text="retail">retail</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27479" data-topic-text="telecommunications">telecommunications</a></li><li><i class="fa fa-fw"></i> <a data-topic-id="27480" data-topic-text="transportation">transportation</a></li></ul></div></div> <div class="form-inline topics-type"> <label class="radio-label">Match ANY: <input name="topicsMatch-sm" checked="checked" id="topicsMatch-any-sm" name="Form.TopicsMatch" type="radio" value="ANY"/></label> <label class="radio-label">Match ALL: <input name="topicsMatch-sm" id="topicsMatch-all-sm" name="Form.TopicsMatch" type="radio" value="ALL"/></label> </div> </div> <div class="form-group"> <label for="pub-search-controls-sm"> Control Family (800-53) </label> <input name="controls-sm" id="controls-sm" name="Form.Controls" type="hidden" value=""/> <div class="form-control controls-selection" id="pub-search-controls-sm" contenteditable="true" data-drop-target="pub-search-controls-drop-sm" data-field-name="controls-sm" aria-haspopup="true" aria-expanded="false"> </div> <div class="controls-selection-dropdown desktop" id="pub-search-controls-drop-sm" style="display: none;" data-controls-selector=""> <strong>Control Families</strong> <ul> <li><a data-control-id="63d54ae4-c6cf-4ae4-a398-f19298c74903">AC - Access Control</a></li> <li><a data-control-id="36fb0b10-f6ae-4e0e-803c-bece9c947fd8">AT - Awareness and Training</a></li> <li><a data-control-id="4243d52c-ff5e-417b-8e1b-8344ff811570">AU - Audit and Accountability</a></li> <li><a data-control-id="0d93bf29-4551-4b7d-9677-23d0eb0524e0">CA - Assessment, Authorization and Monitoring</a></li> <li><a data-control-id="809b7563-f050-4bbf-a0e4-7ad25411734d">CM - Configuration Management</a></li> <li><a data-control-id="da51be5c-b86d-4e32-9484-f94cf75b8217">CP - Contingency Planning</a></li> <li><a data-control-id="ed87a12a-b75a-4555-862c-52f071b7ddb0">IA - Identification and Authentication</a></li> <li><a data-control-id="4801756a-a4ed-4b64-8890-4169d9b6a9ce">IR - Incident Response</a></li> <li><a data-control-id="88089d1d-c115-41f7-92ad-a84abe6101fc">MA - Maintenance</a></li> <li><a data-control-id="3fb9de77-cb37-43fd-b8a5-e33576b8caa1">MP - Media Protection</a></li> <li><a data-control-id="f3b91e7e-2498-49ce-bd0f-5b9ce3bbd9e0">PE - Physical and Environmental Protection</a></li> <li><a data-control-id="641492d1-d2da-40e6-a523-f93fdb5358e9">PL - Planning</a></li> <li><a data-control-id="9d2a46b6-2530-4266-ae75-dab3ea78d7a0">PM - Program Management</a></li> <li><a data-control-id="205e7cff-23a5-4b59-85bc-168ae6e7d95f">PS - Personnel Security</a></li> <li><a data-control-id="09385da5-c3cd-4dcf-91e9-fd455b0ef704">PT - PII Processing and Transparency</a></li> <li><a data-control-id="e08f7835-ea6b-4b7c-9db3-33a3662a38d1">RA - Risk Assessment</a></li> <li><a data-control-id="8e2ea53d-c53d-480e-b374-eb5ab055a94b">SA - System and Services Acquisition</a></li> <li><a data-control-id="f35646b1-d701-4941-b1c5-8e872f6bb812">SC - System and Communications Protection</a></li> <li><a data-control-id="660d9ce0-9cfe-4f5e-890a-41670d010846">SI - System and Information Integrity</a></li> <li><a data-control-id="605d44df-5027-4c32-a228-c000bbcac173">SR - Supply Chain Risk Management</a></li> </ul> </div> <div class="form-inline controls-type"> <label class="radio-label">Match ANY: <input name="controlsMatch-sm" checked="checked" id="controlsMatch-any-sm" name="Form.ControlsMatch" type="radio" value="ANY"/></label> <label class="radio-label">Match ALL: <input name="controlsMatch-sm" id="controlsMatch-all-sm" name="Form.ControlsMatch" type="radio" value="ALL"/></label> </div> </div> </div> <div style="display: none;" data-form-error-pane="true" class="text-danger"> <strong class="text-danger">Please fix the following:</strong> <ul data-form-error-list="true"> </ul> <div class="validation-summary-valid" data-valmsg-summary="true"><ul><li style="display:none"></li> </ul></div> </div> <div class="form-group"> <button type="submit" id="pubs-search-submit-sm" name="submit-btn" data-form-button="submit" class="btn">Search</button> <button type="reset" id="pubs-search-reset-sm" name="reset-btn" data-form-button="reset" class="btn">Reset</button> </div> <span style="display: none;" id="publications-status-info"> <p><strong>Final:</strong> Published documents.</p> <p><strong>Public Draft:</strong> Documents have been posted as Public Drafts, typically with a public comment period.</p> <p> <strong>Withdrawn:</strong> Documents that have been withdrawn, and are no longer current. This includes:<br/> - Final publications that have been withdrawn;<br/> - Public drafts that have been obsoleted by a subsequent draft or final publication;<br/> - Public drafts that have been retired—further development was discontinued. </p> </span> </form> <div id="search-criteria-container" data-target-form="pubSearchDesktop"></div> <div class="row top-pagination-area"> <div class="col-md-6 col-sm-12"> <span id="showing-results-text" data-total-pages="1" data-first-record="1" data-last-record="211" data-current-page="1" data-items-per-page="0" data-total-results="211">Showing <strong id="showing-results-total">211</strong> matching records.</span> </div> <div class="col-md-6 col-sm-12"> <span class="pull-right hidden-sm hidden-xs hidden-xxs"> <span class="pagination-links" id="top-pagination-container" data-total-pages="0" data-min-page="1" data-max-page="0" data-current-page="1" data-show-first="False" data-show-last="True"></span> </span> <p class="text-center hidden-md hidden-lg"> <span class="pagination-links" id="mobile-top-pagination-container" data-total-pages="0" data-min-page="1" data-max-page="0" data-current-page="1" data-show-first="False" data-show-last="True"></span> </p> </div> </div> <table class="table table-striped table-condensed publications-table table-bordered" id="publications-results-table" data-total-records="211" data-page="1" data-first-record="1" data-last-record="211" data-ipp="0"> <thead> <tr> <th nowrap class="hidden-sm hidden-xs hidden-xxs">Series</th> <th nowrap class="hidden-sm hidden-xs hidden-xxs">Number</th> <th nowrap> <span class="hidden-sm hidden-xs hidden-xxs">Title</span> <span class="hidden-md hidden-lg">Publications</span> </th> <th nowrap class="hidden-sm hidden-xs hidden-xxs">Status</th> <th nowrap class="hidden-sm hidden-xs hidden-xxs">Release Date</th> </tr> </thead> <tbody> <tr id="result-1"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-1">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-1"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2022/cryptographic-standards-in-a-post-quantum-era" id="pub-title-link-1">Cryptographic Standards in a Post-Quantum Era</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-1">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2022/cryptographic-standards-in-a-post-quantum-era" class="mobile-pub-title" id="pub-title-link-sm-1">Cryptographic Standards in a Post-Quantum Era</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-1">11/02/2022</strong> <br/> Status: <span id="pub-status-sm-1">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-1"> <span id="download-value-1-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1109/MSEC.2022.3202589">Journal Article (DOI)</a>; </span> <span id="download-value-1-1"> <a href="https://web.archive.org/web/20230128001838/https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=934896">Preprint</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-1"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-1"> 11/02/2022 </td> </tr> <tr id="result-2"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-2">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-2"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2022/pairs-of-heron-and-right-triangles" id="pub-title-link-2">Pairs of Heron and right triangles with a common area and a common perimeter</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-2">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2022/pairs-of-heron-and-right-triangles" class="mobile-pub-title" id="pub-title-link-sm-2">Pairs of Heron and right triangles with a common area and a common perimeter</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-2">5/23/2022</strong> <br/> Status: <span id="pub-status-sm-2">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-2"> <span id="download-value-2-0"> <a href="https://web.archive.org/web/20230128001838/https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=934575">Preprint</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-2"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-2"> 5/23/2022 </td> </tr> <tr id="result-3"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-3">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-3"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2022/zkasp-zkp-based-attestation-of-software-possession" id="pub-title-link-3">ZKASP: ZKP-based attestation of software possession for measuring instruments</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-3">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2022/zkasp-zkp-based-attestation-of-software-possession" class="mobile-pub-title" id="pub-title-link-sm-3">ZKASP: ZKP-based attestation of software possession for measuring instruments</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-3">3/09/2022</strong> <br/> Status: <span id="pub-status-sm-3">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-3"> <span id="download-value-3-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1088/1361-6501/ac5438">Journal Article (DOI)</a>; </span> <span id="download-value-3-1"> <a href="https://web.archive.org/web/20230128001838/https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=932897">Preprint</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-3"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-3"> 3/09/2022 </td> </tr> <tr id="result-4"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-4">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-4"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2021/development-of-the-advanced-encryption-standard" id="pub-title-link-4">Development of the Advanced Encryption Standard</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-4">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2021/development-of-the-advanced-encryption-standard" class="mobile-pub-title" id="pub-title-link-sm-4">Development of the Advanced Encryption Standard</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-4">8/16/2021</strong> <br/> Status: <span id="pub-status-sm-4">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-4"> <span id="download-value-4-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.6028/jres.126.024">Journal Article (DOI)</a>; </span> <span id="download-value-4-1"> <a href="https://web.archive.org/web/20230128001838/https://nvlpubs.nist.gov/nistpubs/jres/126/jres.126.024.pdf">Local Download</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-4"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-4"> 8/16/2021 </td> </tr> <tr id="result-5"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-5">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-5"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2021/from-neuron-coverage-to-steering-angle" id="pub-title-link-5">From Neuron Coverage to Steering Angle: Testing Autonomous Vehicles Effectively</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-5">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2021/from-neuron-coverage-to-steering-angle" class="mobile-pub-title" id="pub-title-link-sm-5">From Neuron Coverage to Steering Angle: Testing Autonomous Vehicles Effectively</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-5">8/02/2021</strong> <br/> Status: <span id="pub-status-sm-5">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-5"> <span id="download-value-5-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1109/MC.2021.3079921">Journal Article (DOI)</a>; </span> <span id="download-value-5-1"> <a href="https://web.archive.org/web/20230128001838/https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=932505">Preprint</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-5"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-5"> 8/02/2021 </td> </tr> <tr id="result-6"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-6">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-6"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2021/a-decade-of-reoccurring-software-weaknesses" id="pub-title-link-6">A decade of reoccurring software weaknesses</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-6">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2021/a-decade-of-reoccurring-software-weaknesses" class="mobile-pub-title" id="pub-title-link-sm-6">A decade of reoccurring software weaknesses</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-6">6/24/2021</strong> <br/> Status: <span id="pub-status-sm-6">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-6"> <span id="download-value-6-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1109/MSEC.2021.3082757">Journal Article (DOI)</a>; </span> <span id="download-value-6-1"> <a href="https://web.archive.org/web/20230128001838/https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=932064">Preprint</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-6"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-6"> 6/24/2021 </td> </tr> <tr id="result-7"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-7">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-7"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2021/encounter-metrics-and-exposure-notification" id="pub-title-link-7">Encounter Metrics and Exposure Notification</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-7">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2021/encounter-metrics-and-exposure-notification" class="mobile-pub-title" id="pub-title-link-sm-7">Encounter Metrics and Exposure Notification</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-7">3/28/2021</strong> <br/> Status: <span id="pub-status-sm-7">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-7"> <span id="download-value-7-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.6028/jres.126.003">Journal Article (DOI)</a>; </span> <span id="download-value-7-1"> <a href="https://web.archive.org/web/20230128001838/https://www.nist.gov/news-events/news/2021/03/nist-develops-privacy-preserving-encounter-metrics-could-help-slow-down">NIST news article</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-7"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-7"> 3/28/2021 </td> </tr> <tr id="result-8"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-8">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-8"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2021/cybersecurity-stnds-guidelines-assist-small-medium-manufacturers" id="pub-title-link-8">Cybersecurity Standards and Guidelines to Assist Small and Medium-Sized Manufacturers</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-8">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2021/cybersecurity-stnds-guidelines-assist-small-medium-manufacturers" class="mobile-pub-title" id="pub-title-link-sm-8">Cybersecurity Standards and Guidelines to Assist Small and Medium-Sized Manufacturers</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-8">3/18/2021</strong> <br/> Status: <span id="pub-status-sm-8">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-8"> <span id="download-value-8-0"> <a href="https://web.archive.org/web/20230128001838/https://share.ansi.org/Shared%20Documents/Standards%20Activities/International%20Standardization/IEC/USNC%20Current/News%20and%20Notes/Vol.%2016%20No.%201%20Spring%202021.pdf#page=6">Article</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-8"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-8"> 3/18/2021 </td> </tr> <tr id="result-9"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-9">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-9"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2021/trusted-federated-system-to-share-granular-data" id="pub-title-link-9">A Trusted Federated System to Share Granular Data Among Disparate Database Resources</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-9">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2021/trusted-federated-system-to-share-granular-data" class="mobile-pub-title" id="pub-title-link-sm-9">A Trusted Federated System to Share Granular Data Among Disparate Database Resources</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-9">3/15/2021</strong> <br/> Status: <span id="pub-status-sm-9">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-9"> <span id="download-value-9-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1109/MC.2021.3049888">Journal Article (DOI)</a>; </span> <span id="download-value-9-1"> <a href="https://web.archive.org/web/20230128001838/https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=931696">Preprint</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-9"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-9"> 3/15/2021 </td> </tr> <tr id="result-10"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-10">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-10"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2021/pandemic-parallels-what-can-cybersecurity-learn-from-covid-19" id="pub-title-link-10">Pandemic Parallels: What Can Cybersecurity Learn From COVID-19?</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-10">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2021/pandemic-parallels-what-can-cybersecurity-learn-from-covid-19" class="mobile-pub-title" id="pub-title-link-sm-10">Pandemic Parallels: What Can Cybersecurity Learn From COVID-19?</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-10">3/15/2021</strong> <br/> Status: <span id="pub-status-sm-10">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-10"> <span id="download-value-10-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1109/MC.2020.3046888">Journal Article (DOI)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-10"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-10"> 3/15/2021 </td> </tr> <tr id="result-11"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-11">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-11"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2021/on-the-family-of-elliptic-curves" id="pub-title-link-11">On the Family of Elliptic Curves X + 1/X + Y + 1/Y + t = 0</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-11">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2021/on-the-family-of-elliptic-curves" class="mobile-pub-title" id="pub-title-link-sm-11">On the Family of Elliptic Curves X + 1/X + Y + 1/Y + t = 0</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-11">2/23/2021</strong> <br/> Status: <span id="pub-status-sm-11">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-11"> <span id="download-value-11-0"> <a href="https://web.archive.org/web/20230128001838/http://math.colgate.edu/~integers/v18/v18.pdf">Article</a>; </span> <span id="download-value-11-1"> <a href="https://web.archive.org/web/20230128001838/https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=931852">Preprint</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-11"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-11"> 2/23/2021 </td> </tr> <tr id="result-12"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-12">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-12"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2021/new-approach-to-data-sharing-and-distributed-ledger-technology" id="pub-title-link-12">A New Approach to Data Sharing and Distributed Ledger Technology: A Clinical Trial Use Case</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-12">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2021/new-approach-to-data-sharing-and-distributed-ledger-technology" class="mobile-pub-title" id="pub-title-link-sm-12">A New Approach to Data Sharing and Distributed Ledger Technology: A Clinical Trial Use Case</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-12">2/16/2021</strong> <br/> Status: <span id="pub-status-sm-12">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-12"> <span id="download-value-12-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1109/MNET.2021.9355049">Journal Article (DOI)</a>; </span> <span id="download-value-12-1"> <a href="https://web.archive.org/web/20230128001838/https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=931721">Preprint</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-12"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-12"> 2/16/2021 </td> </tr> <tr id="result-13"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-13">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-13"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2020/an-approach-for-detection-of-advanced-persistent-threat-attacks" id="pub-title-link-13">An Approach for Detection of Advanced Persistent Threat Attacks</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-13">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2020/an-approach-for-detection-of-advanced-persistent-threat-attacks" class="mobile-pub-title" id="pub-title-link-sm-13">An Approach for Detection of Advanced Persistent Threat Attacks</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-13">12/01/2020</strong> <br/> Status: <span id="pub-status-sm-13">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-13"> <span id="download-value-13-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1109/MC.2020.3021548">Journal Article (DOI)</a>; </span> <span id="download-value-13-1"> <a href="https://web.archive.org/web/20230128001838/https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=930774">Preprint</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-13"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-13"> 12/01/2020 </td> </tr> <tr id="result-14"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-14">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-14"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2020/moving-beyond-check-the-box-compliance" id="pub-title-link-14">Security Awareness Training for the Workforce: Moving Beyond &quot;Check-the-Box&quot; Compliance</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-14">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2020/moving-beyond-check-the-box-compliance" class="mobile-pub-title" id="pub-title-link-sm-14">Security Awareness Training for the Workforce: Moving Beyond &quot;Check-the-Box&quot; Compliance</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-14">10/01/2020</strong> <br/> Status: <span id="pub-status-sm-14">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-14"> <span id="download-value-14-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1109/MC.2020.3001959">Journal Article (DOI)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-14"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-14"> 10/01/2020 </td> </tr> <tr id="result-15"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-15">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-15"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2020/parallel-device-independent-quantum-key-distribution" id="pub-title-link-15">Parallel Device-Independent Quantum Key Distribution</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-15">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2020/parallel-device-independent-quantum-key-distribution" class="mobile-pub-title" id="pub-title-link-sm-15">Parallel Device-Independent Quantum Key Distribution</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-15">9/01/2020</strong> <br/> Status: <span id="pub-status-sm-15">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-15"> <span id="download-value-15-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1109/TIT.2020.2986740">Journal Article (DOI)</a>; </span> <span id="download-value-15-1"> <a href="https://web.archive.org/web/20230128001838/https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=923017">Preprint</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-15"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-15"> 9/01/2020 </td> </tr> <tr id="result-16"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-16">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-16"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2020/boolean-functions-with-multiplicative-complexity-3-and-4" id="pub-title-link-16">Boolean Functions with Multiplicative Complexity 3 and 4</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-16">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2020/boolean-functions-with-multiplicative-complexity-3-and-4" class="mobile-pub-title" id="pub-title-link-sm-16">Boolean Functions with Multiplicative Complexity 3 and 4</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-16">7/18/2020</strong> <br/> Status: <span id="pub-status-sm-16">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-16"> <span id="download-value-16-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1007/s12095-020-00445-z">Journal Article (DOI)</a>; </span> <span id="download-value-16-1"> <a href="https://web.archive.org/web/20230128001838/https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=928931">Preprint</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-16"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-16"> 7/18/2020 </td> </tr> <tr id="result-17"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-17">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-17"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2020/narrow-spectrum-software-testing-addressing-complexity-and-trust" id="pub-title-link-17">Narrow Spectrum Software Testing Addressing Complexity and Trust</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-17">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2020/narrow-spectrum-software-testing-addressing-complexity-and-trust" class="mobile-pub-title" id="pub-title-link-sm-17">Narrow Spectrum Software Testing Addressing Complexity and Trust</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-17">4/09/2020</strong> <br/> Status: <span id="pub-status-sm-17">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-17"> <span id="download-value-17-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1109/MC.2020.2971813">Journal Article (DOI)</a>; </span> <span id="download-value-17-1"> <a href="https://web.archive.org/web/20230128001838/https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=929749">Preprint</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-17"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-17"> 4/09/2020 </td> </tr> <tr id="result-18"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-18">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-18"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2020/leveraging-side-channel-information-for-disassembly-and-security" id="pub-title-link-18">Leveraging Side-Channel Information for Disassembly and Security</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-18">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2020/leveraging-side-channel-information-for-disassembly-and-security" class="mobile-pub-title" id="pub-title-link-sm-18">Leveraging Side-Channel Information for Disassembly and Security</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-18">2/01/2020</strong> <br/> Status: <span id="pub-status-sm-18">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-18"> <span id="download-value-18-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1145/3359621">Journal Article (DOI)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-18"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-18"> 2/01/2020 </td> </tr> <tr id="result-19"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-19">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-19"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2020/moment-subset-sums-over-finite-fields" id="pub-title-link-19">Moment Subset Sums Over Finite Fields</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-19">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2020/moment-subset-sums-over-finite-fields" class="mobile-pub-title" id="pub-title-link-sm-19">Moment Subset Sums Over Finite Fields</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-19">2/01/2020</strong> <br/> Status: <span id="pub-status-sm-19">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-19"> <span id="download-value-19-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1016/j.ffa.2019.101607">Journal Article (DOI)</a>; </span> <span id="download-value-19-1"> <a href="https://web.archive.org/web/20230128001838/https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=928827">Preprint</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-19"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-19"> 2/01/2020 </td> </tr> <tr id="result-20"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-20">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-20"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2020/new-mission-and-opportunity-for-mathematics-researchers" id="pub-title-link-20">New Mission and Opportunity for Mathematics Researchers: Cryptography in Quantum Era</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-20">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2020/new-mission-and-opportunity-for-mathematics-researchers" class="mobile-pub-title" id="pub-title-link-sm-20">New Mission and Opportunity for Mathematics Researchers: Cryptography in Quantum Era</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-20">2/01/2020</strong> <br/> Status: <span id="pub-status-sm-20">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-20"> <span id="download-value-20-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.3934/amc.2020013">Journal Article (DOI)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-20"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-20"> 2/01/2020 </td> </tr> <tr id="result-21"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-21">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-21"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2020/input-space-coverage-matters" id="pub-title-link-21">Input Space Coverage Matters</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-21">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2020/input-space-coverage-matters" class="mobile-pub-title" id="pub-title-link-sm-21">Input Space Coverage Matters</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-21">1/15/2020</strong> <br/> Status: <span id="pub-status-sm-21">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-21"> <span id="download-value-21-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1109/MC.2019.2951980">Journal Article (DOI)</a>; </span> <span id="download-value-21-1"> <a href="https://web.archive.org/web/20230128001838/https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=929158">Preprint</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-21"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-21"> 1/15/2020 </td> </tr> <tr id="result-22"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-22">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-22"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2019/standardization-of-file-recovery-classification--authentication" id="pub-title-link-22">Standardization of File Recovery Classification and Authentication</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-22">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2019/standardization-of-file-recovery-classification--authentication" class="mobile-pub-title" id="pub-title-link-sm-22">Standardization of File Recovery Classification and Authentication</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-22">12/01/2019</strong> <br/> Status: <span id="pub-status-sm-22">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-22"> <span id="download-value-22-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1016/j.diin.2019.06.004">Journal Article (DOI)</a>; </span> <span id="download-value-22-1"> <a href="https://web.archive.org/web/20230128001838/https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=927146">Preprint</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-22"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-22"> 12/01/2019 </td> </tr> <tr id="result-23"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-23">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-23"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2019/rethinking-authentication" id="pub-title-link-23">Rethinking Authentication</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-23">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2019/rethinking-authentication" class="mobile-pub-title" id="pub-title-link-sm-23">Rethinking Authentication</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-23">11/11/2019</strong> <br/> Status: <span id="pub-status-sm-23">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-23"> <span id="download-value-23-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1109/MITP.2019.2942792">Journal Article (DOI)</a>; </span> <span id="download-value-23-1"> <a href="https://web.archive.org/web/20230128001838/https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=927803">Preprint</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-23"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-23"> 11/11/2019 </td> </tr> <tr id="result-24"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-24">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-24"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2019/can-deep-learning-save-us-and-itself-from-avalanche-of-threats" id="pub-title-link-24">Can Deep Learning Save Us and Itself from the Avalanche of Threats in Cyberspace?</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-24">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2019/can-deep-learning-save-us-and-itself-from-avalanche-of-threats" class="mobile-pub-title" id="pub-title-link-sm-24">Can Deep Learning Save Us and Itself from the Avalanche of Threats in Cyberspace?</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-24">9/24/2019</strong> <br/> Status: <span id="pub-status-sm-24">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-24"> <span id="download-value-24-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1109/MC.2019.2918391">Journal Article (DOI)</a>; </span> <span id="download-value-24-1"> <a href="https://web.archive.org/web/20230128001838/https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=927964">Preprint</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-24"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-24"> 9/24/2019 </td> </tr> <tr id="result-25"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-25">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-25"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2019/optimizing-network-diversity" id="pub-title-link-25">Optimizing the Network Diversity to Improve the Resilience of Networks Against Unknown Attacks</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-25">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2019/optimizing-network-diversity" class="mobile-pub-title" id="pub-title-link-sm-25">Optimizing the Network Diversity to Improve the Resilience of Networks Against Unknown Attacks</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-25">9/01/2019</strong> <br/> Status: <span id="pub-status-sm-25">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-25"> <span id="download-value-25-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1016/j.comcom.2019.06.004">Journal Article (DOI)</a>; </span> <span id="download-value-25-1"> <a href="https://web.archive.org/web/20230128001838/https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=926444">Preprint</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-25"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-25"> 9/01/2019 </td> </tr> <tr id="result-26"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-26">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-26"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2019/upper-bounds-on-the-multiplicative-complexity" id="pub-title-link-26">Upper Bounds on the Multiplicative Complexity of Symmetric Boolean Functions</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-26">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2019/upper-bounds-on-the-multiplicative-complexity" class="mobile-pub-title" id="pub-title-link-sm-26">Upper Bounds on the Multiplicative Complexity of Symmetric Boolean Functions</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-26">8/17/2019</strong> <br/> Status: <span id="pub-status-sm-26">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-26"> <span id="download-value-26-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1007/s12095-019-00377-3">Journal Article (DOI)</a>; </span> <span id="download-value-26-1"> <a href="https://web.archive.org/web/20230128001838/https://ws680.nist.gov/publication/get_pdf.cfm?pub_id=926913">Preprint</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-26"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-26"> 8/17/2019 </td> </tr> <tr id="result-27"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-27">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-27"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2019/on-addition-subtraction-chains-of-nums-with-low-hamming-weight" id="pub-title-link-27">On Addition-subtraction Chains of Numbers with Low Hamming Weight</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-27">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2019/on-addition-subtraction-chains-of-nums-with-low-hamming-weight" class="mobile-pub-title" id="pub-title-link-sm-27">On Addition-subtraction Chains of Numbers with Low Hamming Weight</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-27">7/01/2019</strong> <br/> Status: <span id="pub-status-sm-27">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-27"> <span id="download-value-27-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.7546/nntdm.2019.25.2.155-168">Journal Article (DOI)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-27"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-27"> 7/01/2019 </td> </tr> <tr id="result-28"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-28">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-28"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2019/electronics-supply-chain-integrity-enabled-by-blockchain" id="pub-title-link-28">Electronics Supply Chain Integrity Enabled by Blockchain</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-28">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2019/electronics-supply-chain-integrity-enabled-by-blockchain" class="mobile-pub-title" id="pub-title-link-sm-28">Electronics Supply Chain Integrity Enabled by Blockchain</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-28">6/01/2019</strong> <br/> Status: <span id="pub-status-sm-28">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-28"> <span id="download-value-28-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1145/3315571">Journal Article (DOI)</a>; </span> <span id="download-value-28-1"> <a href="https://web.archive.org/web/20230128001838/https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=927495">Preprint</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-28"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-28"> 6/01/2019 </td> </tr> <tr id="result-29"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-29">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-29"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2019/graphical-methods-in-device-independent-quantum-cryptography" id="pub-title-link-29">Graphical Methods in Device-Independent Quantum Cryptography</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-29">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2019/graphical-methods-in-device-independent-quantum-cryptography" class="mobile-pub-title" id="pub-title-link-sm-29">Graphical Methods in Device-Independent Quantum Cryptography</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-29">5/27/2019</strong> <br/> Status: <span id="pub-status-sm-29">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-29"> <span id="download-value-29-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.22331/q-2019-05-27-146">Journal Article (DOI)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-29"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-29"> 5/27/2019 </td> </tr> <tr id="result-30"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-30">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-30"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2019/better-circuits-for-binary-polynomial-multiplication" id="pub-title-link-30">Better Circuits for Binary Polynomial Multiplication</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-30">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2019/better-circuits-for-binary-polynomial-multiplication" class="mobile-pub-title" id="pub-title-link-sm-30">Better Circuits for Binary Polynomial Multiplication</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-30">4/01/2019</strong> <br/> Status: <span id="pub-status-sm-30">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-30"> <span id="download-value-30-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1109/TC.2018.2874662">Journal Article (DOI)</a>; </span> <span id="download-value-30-1"> <a href="https://web.archive.org/web/20230128001838/https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6774206/?report=classic">Article</a>; </span> <span id="download-value-30-2"> <a href="https://web.archive.org/web/20230128001838/https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6774206/?report=reader">Article (PubReader)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-30"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-30"> 4/01/2019 </td> </tr> <tr id="result-31"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-31">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-31"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2019/elliptic-curves-arising-from-triangular-numbers" id="pub-title-link-31">Elliptic Curves Arising from Triangular Numbers</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-31">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2019/elliptic-curves-arising-from-triangular-numbers" class="mobile-pub-title" id="pub-title-link-sm-31">Elliptic Curves Arising from Triangular Numbers</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-31">2/01/2019</strong> <br/> Status: <span id="pub-status-sm-31">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-31"> <span id="download-value-31-0"> <a href="https://web.archive.org/web/20230128001838/http://math.colgate.edu/~integers/vol19.html">Volume 19 (w/ link to paper)</a>; </span> <span id="download-value-31-1"> <a href="https://web.archive.org/web/20230128001838/https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=927507">Preprint</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-31"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-31"> 2/01/2019 </td> </tr> <tr id="result-32"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-32">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-32"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2019/rethinking-distributed-ledger-technology" id="pub-title-link-32">Rethinking Distributed Ledger Technology</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-32">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2019/rethinking-distributed-ledger-technology" class="mobile-pub-title" id="pub-title-link-sm-32">Rethinking Distributed Ledger Technology</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-32">2/01/2019</strong> <br/> Status: <span id="pub-status-sm-32">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-32"> <span id="download-value-32-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1109/MC.2019.2898162">Journal Article (DOI)</a>; </span> <span id="download-value-32-1"> <a href="https://web.archive.org/web/20230128001838/https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=927240">Preprint</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-32"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-32"> 2/01/2019 </td> </tr> <tr id="result-33"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-33">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-33"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2018/network-attack-surface-resilience-against-zero-days" id="pub-title-link-33">Network Attack Surface: Lifting the Attack Surface Concept to Network Level for Evaluating the Resilience against Zero-Day Attacks</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-33">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2018/network-attack-surface-resilience-against-zero-days" class="mobile-pub-title" id="pub-title-link-sm-33">Network Attack Surface: Lifting the Attack Surface Concept to Network Level for Evaluating the Resilience against Zero-Day Attacks</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-33">12/21/2018</strong> <br/> Status: <span id="pub-status-sm-33">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-33"> <span id="download-value-33-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1109/TDSC.2018.2889086">Journal Article (DOI)</a>; </span> <span id="download-value-33-1"> <a href="https://web.archive.org/web/20230128001838/https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=921183">Preprint</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-33"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-33"> 12/21/2018 </td> </tr> <tr id="result-34"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-34">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-34"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2018/threat-modeling-for-cloud-infrastructures" id="pub-title-link-34">Threat Modeling for Cloud Infrastructures</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-34">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2018/threat-modeling-for-cloud-infrastructures" class="mobile-pub-title" id="pub-title-link-sm-34">Threat Modeling for Cloud Infrastructures</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-34">12/21/2018</strong> <br/> Status: <span id="pub-status-sm-34">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-34"> <span id="download-value-34-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.4108/eai.10-1-2019.156246">Journal Article (DOI)</a>; </span> <span id="download-value-34-1"> <a href="https://web.archive.org/web/20230128001838/https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=926650">Preprint</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-34"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-34"> 12/21/2018 </td> </tr> <tr id="result-35"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-35">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-35"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2018/the-trouble-with-terms" id="pub-title-link-35">The Trouble with Terms</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-35">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2018/the-trouble-with-terms" class="mobile-pub-title" id="pub-title-link-sm-35">The Trouble with Terms</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-35">12/01/2018</strong> <br/> Status: <span id="pub-status-sm-35">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-35"> <span id="download-value-35-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1109/MITP.2018.2876925">Journal Article (DOI)</a>; </span> <span id="download-value-35-1"> <a href="https://web.archive.org/web/20230128001838/https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=926497">Preprint</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-35"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-35"> 12/01/2018 </td> </tr> <tr id="result-36"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-36">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-36"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2018/toward-cyberresiliency-in-cloud-computing" id="pub-title-link-36">Toward Cyberresiliency in the Context of Cloud Computing</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-36">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2018/toward-cyberresiliency-in-cloud-computing" class="mobile-pub-title" id="pub-title-link-sm-36">Toward Cyberresiliency in the Context of Cloud Computing</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-36">12/01/2018</strong> <br/> Status: <span id="pub-status-sm-36">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-36"> <span id="download-value-36-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1109/MSEC.2018.2882122">Journal Article (DOI)</a>; </span> <span id="download-value-36-1"> <a href="https://web.archive.org/web/20230128001838/https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=926740">Preprint</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-36"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-36"> 12/01/2018 </td> </tr> <tr id="result-37"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-37">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-37"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2018/access-control-for-emerging-distributed-systems" id="pub-title-link-37">Access Control for Emerging Distributed Systems</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-37">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2018/access-control-for-emerging-distributed-systems" class="mobile-pub-title" id="pub-title-link-sm-37">Access Control for Emerging Distributed Systems</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-37">11/01/2018</strong> <br/> Status: <span id="pub-status-sm-37">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-37"> <span id="download-value-37-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1109/MC.2018.3971347">Journal Article (DOI)</a>; </span> <span id="download-value-37-1"> <a href="https://web.archive.org/web/20230128001838/https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6512971/?report=classic">Article</a>; </span> <span id="download-value-37-2"> <a href="https://web.archive.org/web/20230128001838/https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6512971/?report=reader">Article (PubReader)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-37"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-37"> 11/01/2018 </td> </tr> <tr id="result-38"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-38">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-38"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2018/complexity-and-verification-of-quantum-random-circuit-sampling" id="pub-title-link-38">On the complexity and verification of quantum random circuit sampling</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-38">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2018/complexity-and-verification-of-quantum-random-circuit-sampling" class="mobile-pub-title" id="pub-title-link-sm-38">On the complexity and verification of quantum random circuit sampling</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-38">10/29/2018</strong> <br/> Status: <span id="pub-status-sm-38">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-38"> <span id="download-value-38-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1038/s41567-018-0318-2">Journal Article (DOI)</a>; </span> <span id="download-value-38-1"> <a href="https://web.archive.org/web/20230128001838/https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=927073">Preprint</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-38"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-38"> 10/29/2018 </td> </tr> <tr id="result-39"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-39">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-39"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2018/finding-bugs-in-cryptographic-hash-function-implementations" id="pub-title-link-39">Finding Bugs in Cryptographic Hash Function Implementations</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-39">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2018/finding-bugs-in-cryptographic-hash-function-implementations" class="mobile-pub-title" id="pub-title-link-sm-39">Finding Bugs in Cryptographic Hash Function Implementations</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-39">9/01/2018</strong> <br/> Status: <span id="pub-status-sm-39">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-39"> <span id="download-value-39-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1109/TR.2018.2847247">Journal Article (DOI)</a>; </span> <span id="download-value-39-1"> <a href="https://web.archive.org/web/20230128001838/https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6512998/?report=classic">Article</a>; </span> <span id="download-value-39-2"> <a href="https://web.archive.org/web/20230128001838/https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6512998/?report=reader">Article (PubReader)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-39"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-39"> 9/01/2018 </td> </tr> <tr id="result-40"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-40">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-40"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2018/improved-upper-bounds-for-the-expected-circuit-complexity" id="pub-title-link-40">Improved upper bounds for the expected circuit complexity of dense systems of linear equations over GF(2)</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-40">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2018/improved-upper-bounds-for-the-expected-circuit-complexity" class="mobile-pub-title" id="pub-title-link-sm-40">Improved upper bounds for the expected circuit complexity of dense systems of linear equations over GF(2)</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-40">9/01/2018</strong> <br/> Status: <span id="pub-status-sm-40">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-40"> <span id="download-value-40-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1016/j.ipl.2018.04.010">Journal Article (DOI)</a>; </span> <span id="download-value-40-1"> <a href="https://web.archive.org/web/20230128001838/https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6463526/?report=classic">Article</a>; </span> <span id="download-value-40-2"> <a href="https://web.archive.org/web/20230128001838/https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6463526/?report=reader">Article (PubReader)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-40"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-40"> 9/01/2018 </td> </tr> <tr id="result-41"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-41">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-41"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2018/cybertrust-in-the-iot-age" id="pub-title-link-41">Cybertrust in the IoT Age</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-41">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2018/cybertrust-in-the-iot-age" class="mobile-pub-title" id="pub-title-link-sm-41">Cybertrust in the IoT Age</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-41">7/31/2018</strong> <br/> Status: <span id="pub-status-sm-41">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-41"> <span id="download-value-41-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1109/MC.2018.3011043">Journal Article (DOI)</a>; </span> <span id="download-value-41-1"> <a href="https://web.archive.org/web/20230128001838/https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=926089">Preprint</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-41"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-41"> 7/31/2018 </td> </tr> <tr id="result-42"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-42">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-42"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2018/a-survey-of-physics-based-attack-detection-in-cps" id="pub-title-link-42">A Survey of Physics-Based Attack Detection in Cyber-Physical Systems</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-42">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2018/a-survey-of-physics-based-attack-detection-in-cps" class="mobile-pub-title" id="pub-title-link-sm-42">A Survey of Physics-Based Attack Detection in Cyber-Physical Systems</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-42">7/25/2018</strong> <br/> Status: <span id="pub-status-sm-42">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-42"> <span id="download-value-42-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1145/3203245">Journal Article (DOI)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-42"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-42"> 7/25/2018 </td> </tr> <tr id="result-43"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-43">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-43"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2018/in-iot-we-trust" id="pub-title-link-43">In IoT We Trust?</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-43">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2018/in-iot-we-trust" class="mobile-pub-title" id="pub-title-link-sm-43">In IoT We Trust?</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-43">7/13/2018</strong> <br/> Status: <span id="pub-status-sm-43">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-43"> <span id="download-value-43-0"> <a href="https://web.archive.org/web/20230128001838/https://iot.ieee.org/newsletter/july-2018/in-iot-we-trust">Article</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-43"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-43"> 7/13/2018 </td> </tr> <tr id="result-44"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-44">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-44"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2018/baseline-tailor" id="pub-title-link-44">Baseline Tailor</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-44">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2018/baseline-tailor" class="mobile-pub-title" id="pub-title-link-sm-44">Baseline Tailor</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-44">6/26/2018</strong> <br/> Status: <span id="pub-status-sm-44">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-44"> <span id="download-value-44-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.6028/jres.123.007">Journal Article (DOI)</a>; </span> <span id="download-value-44-1"> <a href="https://web.archive.org/web/20230128001838/https://nvlpubs.nist.gov/nistpubs/jres/123/jres.123.007.pdf">Local Download</a>; </span> <span id="download-value-44-2"> <a href="https://web.archive.org/web/20230128001838/https://www.nist.gov/services-resources/software/baseline-tailor">Baseline Tailor software tool</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-44"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-44"> 6/26/2018 </td> </tr> <tr id="result-45"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-45">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-45"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2018/iot-metrology" id="pub-title-link-45">Internet of Things (IoT) Metrology</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-45">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2018/iot-metrology" class="mobile-pub-title" id="pub-title-link-sm-45">Internet of Things (IoT) Metrology</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-45">6/11/2018</strong> <br/> Status: <span id="pub-status-sm-45">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-45"> <span id="download-value-45-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1109/MITP.2018.032501740">Journal Article (DOI)</a>; </span> <span id="download-value-45-1"> <a href="https://web.archive.org/web/20230128001838/https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=925808">Preprint</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-45"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-45"> 6/11/2018 </td> </tr> <tr id="result-46"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-46">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-46"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2018/stakeholder-id-and-representation-of-iot-apps-in-healthcare" id="pub-title-link-46">Stakeholder Identification and Use Case Representation for Internet of Things Applications in Healthcare</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-46">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2018/stakeholder-id-and-representation-of-iot-apps-in-healthcare" class="mobile-pub-title" id="pub-title-link-sm-46">Stakeholder Identification and Use Case Representation for Internet of Things Applications in Healthcare</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-46">6/01/2018</strong> <br/> Status: <span id="pub-status-sm-46">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-46"> <span id="download-value-46-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1109/JSYST.2016.2558449">Journal Article (DOI)</a>; </span> <span id="download-value-46-1"> <a href="https://web.archive.org/web/20230128001838/https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6512844/?report=classic">Article</a>; </span> <span id="download-value-46-2"> <a href="https://web.archive.org/web/20230128001838/https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6512844/?report=reader">Article (PubReader)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-46"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-46"> 6/01/2018 </td> </tr> <tr id="result-47"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-47">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-47"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2018/bad-security-metrics-part-2-solutions" id="pub-title-link-47">Bad Security Metrics Part 2: Solutions</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-47">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2018/bad-security-metrics-part-2-solutions" class="mobile-pub-title" id="pub-title-link-sm-47">Bad Security Metrics Part 2: Solutions</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-47">4/16/2018</strong> <br/> Status: <span id="pub-status-sm-47">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-47"> <span id="download-value-47-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1109/MITP.2018.021921653">Journal Article (DOI)</a>; </span> <span id="download-value-47-1"> <a href="https://web.archive.org/web/20230128001838/https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=924554">Preprint</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-47"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-47"> 4/16/2018 </td> </tr> <tr id="result-48"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-48">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-48"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2018/a-software-assurance-reference-dataset" id="pub-title-link-48">A Software Assurance Reference Dataset: Thousands of Programs With Known Bugs</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-48">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2018/a-software-assurance-reference-dataset" class="mobile-pub-title" id="pub-title-link-sm-48">A Software Assurance Reference Dataset: Thousands of Programs With Known Bugs</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-48">4/16/2018</strong> <br/> Status: <span id="pub-status-sm-48">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-48"> <span id="download-value-48-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.6028/jres.123.005">Journal Article (DOI)</a>; </span> <span id="download-value-48-1"> <a href="https://web.archive.org/web/20230128001838/https://nvlpubs.nist.gov/nistpubs/jres/123/jres.123.005.pdf">Article</a>; </span> <span id="download-value-48-2"> <a href="https://web.archive.org/web/20230128001838/https://samate.nist.gov/SARD/">Software Assurance Reference Dataset (SARD)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-48"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-48"> 4/16/2018 </td> </tr> <tr id="result-49"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-49">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-49"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2018/multiplicative-complexity-of-6-variable-boolean-functions" id="pub-title-link-49">The Multiplicative Complexity of 6-variable Boolean Functions</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-49">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2018/multiplicative-complexity-of-6-variable-boolean-functions" class="mobile-pub-title" id="pub-title-link-sm-49">The Multiplicative Complexity of 6-variable Boolean Functions</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-49">4/03/2018</strong> <br/> Status: <span id="pub-status-sm-49">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-49"> <span id="download-value-49-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1007/s12095-018-0297-2">Journal Article (DOI)</a>; </span> <span id="download-value-49-1"> <a href="https://web.archive.org/web/20230128001838/https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=924738">Preprint</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-49"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-49"> 4/03/2018 </td> </tr> <tr id="result-50"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-50">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-50"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2018/small-low-depth-circuits-for-cryptographic-applications" id="pub-title-link-50">Small Low-Depth Circuits for Cryptographic Applications</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-50">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2018/small-low-depth-circuits-for-cryptographic-applications" class="mobile-pub-title" id="pub-title-link-sm-50">Small Low-Depth Circuits for Cryptographic Applications</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-50">3/24/2018</strong> <br/> Status: <span id="pub-status-sm-50">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-50"> <span id="download-value-50-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1007/s12095-018-0296-3">Journal Article (DOI)</a>; </span> <span id="download-value-50-1"> <a href="https://web.archive.org/web/20230128001838/https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6463518/?report=classic">Article</a>; </span> <span id="download-value-50-2"> <a href="https://web.archive.org/web/20230128001838/https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6463518/?report=reader">Article (PubReader)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-50"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-50"> 3/24/2018 </td> </tr> <tr id="result-51"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-51">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-51"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2018/surviving-unpatchable-vulns-multi-option-network-hardening" id="pub-title-link-51">Surviving Unpatchable Vulnerabilities through Multi-Option Network Hardening</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-51">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2018/surviving-unpatchable-vulns-multi-option-network-hardening" class="mobile-pub-title" id="pub-title-link-sm-51">Surviving Unpatchable Vulnerabilities through Multi-Option Network Hardening</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-51">3/23/2018</strong> <br/> Status: <span id="pub-status-sm-51">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-51"> <span id="download-value-51-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.3233/JCS-171106">Journal Article (DOI)</a>; </span> <span id="download-value-51-1"> <a href="https://web.archive.org/web/20230128001838/https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=924967">Preprint</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-51"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-51"> 3/23/2018 </td> </tr> <tr id="result-52"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-52">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-52"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2018/local-randomness-examples-and-application" id="pub-title-link-52">Local Randomness: Examples and Application</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-52">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2018/local-randomness-examples-and-application" class="mobile-pub-title" id="pub-title-link-sm-52">Local Randomness: Examples and Application</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-52">3/19/2018</strong> <br/> Status: <span id="pub-status-sm-52">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-52"> <span id="download-value-52-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1103/PhysRevA.97.032324">Journal Article (DOI)</a>; </span> <span id="download-value-52-1"> <a href="https://web.archive.org/web/20230128001838/https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6508616/?report=classic">Article</a>; </span> <span id="download-value-52-2"> <a href="https://web.archive.org/web/20230128001838/https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6508616/?report=reader">Article (PubReader)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-52"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-52"> 3/19/2018 </td> </tr> <tr id="result-53"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-53">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-53"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2018/could-iot-be-used-to-enhance-experiences-in-disaster-sims" id="pub-title-link-53">Could the Internet of Things Be Used to Enhance Student Nurses’ Experiences in a Disaster Simulation?</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-53">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2018/could-iot-be-used-to-enhance-experiences-in-disaster-sims" class="mobile-pub-title" id="pub-title-link-sm-53">Could the Internet of Things Be Used to Enhance Student Nurses’ Experiences in a Disaster Simulation?</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-53">2/27/2018</strong> <br/> Status: <span id="pub-status-sm-53">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-53"> <span id="download-value-53-0"> <a href="https://web.archive.org/web/20230128001838/http://www.himss.org/library/could-internet-things-be-used-enhance-student-nurses-experiences-disaster-simulation">Article</a>; </span> <span id="download-value-53-1"> <a href="https://web.archive.org/web/20230128001838/https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6513328/?report=reader">Article (PubReader)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-53"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-53"> 2/27/2018 </td> </tr> <tr id="result-54"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-54">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-54"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2018/computer-science-in-education-2018" id="pub-title-link-54">Computer Science in Education 2018</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-54">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2018/computer-science-in-education-2018" class="mobile-pub-title" id="pub-title-link-sm-54">Computer Science in Education 2018</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-54">2/14/2018</strong> <br/> Status: <span id="pub-status-sm-54">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-54"> <span id="download-value-54-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1109/MITP.2018.011021350">Journal Article (DOI)</a>; </span> <span id="download-value-54-1"> <a href="https://web.archive.org/web/20230128001838/https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=924753">Preprint</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-54"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-54"> 2/14/2018 </td> </tr> <tr id="result-55"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-55">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-55"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2018/bad-security-metrics-part-1-problems" id="pub-title-link-55">Bad Security Metrics Part 1: Problems</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-55">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2018/bad-security-metrics-part-1-problems" class="mobile-pub-title" id="pub-title-link-sm-55">Bad Security Metrics Part 1: Problems</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-55">2/14/2018</strong> <br/> Status: <span id="pub-status-sm-55">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-55"> <span id="download-value-55-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1109/MITP.2018.011301733">Journal Article (DOI)</a>; </span> <span id="download-value-55-1"> <a href="https://web.archive.org/web/20230128001838/https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=924554">Preprint</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-55"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-55"> 2/14/2018 </td> </tr> <tr id="result-56"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-56">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-56"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2018/keyring-models-an-approach-to-steerability" id="pub-title-link-56">Keyring models: An approach to steerability</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-56">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2018/keyring-models-an-approach-to-steerability" class="mobile-pub-title" id="pub-title-link-sm-56">Keyring models: An approach to steerability</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-56">2/06/2018</strong> <br/> Status: <span id="pub-status-sm-56">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-56"> <span id="download-value-56-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1063/1.5006199">Journal Article (DOI)</a>; </span> <span id="download-value-56-1"> <a href="https://web.archive.org/web/20230128001838/https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=923613">Preprint</a>; </span> <span id="download-value-56-2"> <a href="https://web.archive.org/web/20230128001838/https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6459415/?report=classic">Article</a>; </span> <span id="download-value-56-3"> <a href="https://web.archive.org/web/20230128001838/https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6459415/?report=reader">Article (PubReader)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-56"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-56"> 2/06/2018 </td> </tr> <tr id="result-57"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-57">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-57"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2018/educating-next-gen-computer-scientists" id="pub-title-link-57">Educating Next-Gen Computer Scientists</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-57">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2018/educating-next-gen-computer-scientists" class="mobile-pub-title" id="pub-title-link-sm-57">Educating Next-Gen Computer Scientists</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-57">1/31/2018</strong> <br/> Status: <span id="pub-status-sm-57">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-57"> <span id="download-value-57-0"> <a href="https://web.archive.org/web/20230128001838/https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=924636">Preprint</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-57"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-57"> 1/31/2018 </td> </tr> <tr id="result-58"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-58">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-58"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2018/psst-can-you-keep-a-secret" id="pub-title-link-58">Psst, Can You Keep a Secret?</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-58">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2018/psst-can-you-keep-a-secret" class="mobile-pub-title" id="pub-title-link-sm-58">Psst, Can You Keep a Secret?</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-58">1/24/2018</strong> <br/> Status: <span id="pub-status-sm-58">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-58"> <span id="download-value-58-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1109/MC.2018.1151029">Journal Article (DOI)</a>; </span> <span id="download-value-58-1"> <a href="https://web.archive.org/web/20230128001838/https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5865220/?report=classic">Article</a>; </span> <span id="download-value-58-2"> <a href="https://web.archive.org/web/20230128001838/https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5865220/?report=reader">Article (PubReader)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-58"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-58"> 1/24/2018 </td> </tr> <tr id="result-59"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-59">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-59"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2017/cybersecurity-vulnerability-trends" id="pub-title-link-59">It Doesn&#39;t Have to Be Like This: Cybersecurity Vulnerability Trends</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-59">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2017/cybersecurity-vulnerability-trends" class="mobile-pub-title" id="pub-title-link-sm-59">It Doesn&#39;t Have to Be Like This: Cybersecurity Vulnerability Trends</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-59">11/28/2017</strong> <br/> Status: <span id="pub-status-sm-59">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-59"> <span id="download-value-59-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1109/MITP.2017.4241462">Journal Article (DOI)</a>; </span> <span id="download-value-59-1"> <a href="https://web.archive.org/web/20230128001838/https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=924421">Preprint</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-59"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-59"> 11/28/2017 </td> </tr> <tr id="result-60"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-60">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-60"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2017/rigidity-of-the-magic-pentagram-game" id="pub-title-link-60">Rigidity of the Magic Pentagram Game</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-60">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2017/rigidity-of-the-magic-pentagram-game" class="mobile-pub-title" id="pub-title-link-sm-60">Rigidity of the Magic Pentagram Game</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-60">11/02/2017</strong> <br/> Status: <span id="pub-status-sm-60">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-60"> <span id="download-value-60-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1088/2058-9565/aa931d">Journal Article (DOI)</a>; </span> <span id="download-value-60-1"> <a href="https://web.archive.org/web/20230128001838/https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5803839/?report=classic">Article</a>; </span> <span id="download-value-60-2"> <a href="https://web.archive.org/web/20230128001838/https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5803839/?report=reader">Article (PubReader)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-60"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-60"> 11/02/2017 </td> </tr> <tr id="result-61"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-61">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-61"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2017/sard-thousands-of-reference-programs-for-software-assurance" id="pub-title-link-61">SARD: Thousands of Reference Programs for Software Assurance</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-61">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2017/sard-thousands-of-reference-programs-for-software-assurance" class="mobile-pub-title" id="pub-title-link-sm-61">SARD: Thousands of Reference Programs for Software Assurance</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-61">11/02/2017</strong> <br/> Status: <span id="pub-status-sm-61">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-61"> <span id="download-value-61-0"> <a href="https://web.archive.org/web/20230128001838/https://www.csiac.org/journal-article/sard-thousands-of-reference-programs-for-software-assurance/">Article</a>; </span> <span id="download-value-61-1"> <a href="https://web.archive.org/web/20230128001838/https://samate.nist.gov/SARD/">Software Assurance Reference Dataset (SARD)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-61"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-61"> 11/02/2017 </td> </tr> <tr id="result-62"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-62">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-62"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2017/isosceles-triangle-parallelogram-heron-triangle-rhombus-pairs" id="pub-title-link-62">Integral isosceles triangle-parallelogram and Heron triangle-rhombus pairs with a common area and common perimeter</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-62">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2017/isosceles-triangle-parallelogram-heron-triangle-rhombus-pairs" class="mobile-pub-title" id="pub-title-link-sm-62">Integral isosceles triangle-parallelogram and Heron triangle-rhombus pairs with a common area and common perimeter</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-62">11/01/2017</strong> <br/> Status: <span id="pub-status-sm-62">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-62"> <span id="download-value-62-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1016/j.jnt.2017.04.009">Journal Article (DOI)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-62"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-62"> 11/01/2017 </td> </tr> <tr id="result-63"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-63">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-63"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2017/alexa-can-i-trust-you" id="pub-title-link-63">Alexa, Can I Trust You?</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-63">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2017/alexa-can-i-trust-you" class="mobile-pub-title" id="pub-title-link-sm-63">Alexa, Can I Trust You?</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-63">9/22/2017</strong> <br/> Status: <span id="pub-status-sm-63">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-63"> <span id="download-value-63-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1109/MC.2017.3571053">Journal Article (DOI)</a>; </span> <span id="download-value-63-1"> <a href="https://web.archive.org/web/20230128001838/https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5714311/?report=classic">Article</a>; </span> <span id="download-value-63-2"> <a href="https://web.archive.org/web/20230128001838/https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5714311/?report=reader">Article (PubReader)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-63"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-63"> 9/22/2017 </td> </tr> <tr id="result-64"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-64">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-64"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2017/advancing-coordinated-cyber-investigations" id="pub-title-link-64">Advancing coordinated cyber-investigations and tool interoperability using a community developed specification language</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-64">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2017/advancing-coordinated-cyber-investigations" class="mobile-pub-title" id="pub-title-link-sm-64">Advancing coordinated cyber-investigations and tool interoperability using a community developed specification language</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-64">9/01/2017</strong> <br/> Status: <span id="pub-status-sm-64">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-64"> <span id="download-value-64-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1016/j.diin.2017.08.002">Journal Article (DOI)</a>; </span> <span id="download-value-64-1"> <a href="https://web.archive.org/web/20230128001838/https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=924126">Preprint</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-64"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-64"> 9/01/2017 </td> </tr> <tr id="result-65"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-65">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-65"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2017/cryptography-standards-in-quantum-time" id="pub-title-link-65">Cryptography Standards in Quantum Time: New Wine in an Old Wineskin?</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-65">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2017/cryptography-standards-in-quantum-time" class="mobile-pub-title" id="pub-title-link-sm-65">Cryptography Standards in Quantum Time: New Wine in an Old Wineskin?</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-65">8/17/2017</strong> <br/> Status: <span id="pub-status-sm-65">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-65"> <span id="download-value-65-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1109/MSP.2017.3151339">Journal Article (DOI)</a>; </span> <span id="download-value-65-1"> <a href="https://web.archive.org/web/20230128001838/https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=923190">Preprint</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-65"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-65"> 8/17/2017 </td> </tr> <tr id="result-66"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-66">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-66"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2017/heron-quadrilaterals-via-elliptic-curves" id="pub-title-link-66">Heron Quadrilaterals via Elliptic Curves</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-66">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2017/heron-quadrilaterals-via-elliptic-curves" class="mobile-pub-title" id="pub-title-link-sm-66">Heron Quadrilaterals via Elliptic Curves</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-66">8/08/2017</strong> <br/> Status: <span id="pub-status-sm-66">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-66"> <span id="download-value-66-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1216/RMJ-2017-47-4-1227">Journal Article (DOI)</a>; </span> <span id="download-value-66-1"> <a href="https://web.archive.org/web/20230128001838/https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=917343">Preprint</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-66"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-66"> 8/08/2017 </td> </tr> <tr id="result-67"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-67">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-67"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2017/pqc-a-new-opportunity-for-mathematics-community" id="pub-title-link-67">Post-Quantum Cryptography—A New Opportunity and Challenge for the Mathematics Community</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-67">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2017/pqc-a-new-opportunity-for-mathematics-community" class="mobile-pub-title" id="pub-title-link-sm-67">Post-Quantum Cryptography—A New Opportunity and Challenge for the Mathematics Community</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-67">8/01/2017</strong> <br/> Status: <span id="pub-status-sm-67">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-67"> <span id="download-value-67-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1090/noti1546">Journal Article (DOI)</a>; </span> <span id="download-value-67-1"> <a href="https://web.archive.org/web/20230128001838/https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=926100">Preprint</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-67"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-67"> 8/01/2017 </td> </tr> <tr id="result-68"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-68">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-68"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2017/near-optimal-algorithm-to-count-occurrences-of-subsequences" id="pub-title-link-68">Near-Optimal Algorithm to Count Occurrences of Subsequences of a Given Length</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-68">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2017/near-optimal-algorithm-to-count-occurrences-of-subsequences" class="mobile-pub-title" id="pub-title-link-sm-68">Near-Optimal Algorithm to Count Occurrences of Subsequences of a Given Length</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-68">6/21/2017</strong> <br/> Status: <span id="pub-status-sm-68">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-68"> <span id="download-value-68-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1142/S1793830917500422">Journal Article (DOI)</a>; </span> <span id="download-value-68-1"> <a href="https://web.archive.org/web/20230128001838/https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=920771">Preprint</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-68"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-68"> 6/21/2017 </td> </tr> <tr id="result-69"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-69">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-69"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2017/randomness-in-nonlocal-games-between-mistrustful-players" id="pub-title-link-69">Randomness in Nonlocal Games Between Mistrustful Players</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-69">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2017/randomness-in-nonlocal-games-between-mistrustful-players" class="mobile-pub-title" id="pub-title-link-sm-69">Randomness in Nonlocal Games Between Mistrustful Players</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-69">6/15/2017</strong> <br/> Status: <span id="pub-status-sm-69">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-69"> <span id="download-value-69-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.26421/QIC17.7-8">Journal Article (DOI)</a>; </span> <span id="download-value-69-1"> <a href="https://web.archive.org/web/20230128001838/http://www.rintonpress.com/xxqic17/qic-17-78/0595-0610.pdf">Article</a>; </span> <span id="download-value-69-2"> <a href="https://web.archive.org/web/20230128001838/https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5890341/?report=reader">Article (PubReader)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-69"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-69"> 6/15/2017 </td> </tr> <tr id="result-70"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-70">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-70"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2017/geometric-progressions-on-elliptic-curves" id="pub-title-link-70">Geometric Progressions on Elliptic Curves</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-70">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2017/geometric-progressions-on-elliptic-curves" class="mobile-pub-title" id="pub-title-link-sm-70">Geometric Progressions on Elliptic Curves</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-70">6/13/2017</strong> <br/> Status: <span id="pub-status-sm-70">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-70"> <span id="download-value-70-0"> <a href="https://web.archive.org/web/20230128001838/https://web.math.pmf.unizg.hr/glasnik/vol_52/no1_01.html">Article</a>; </span> <span id="download-value-70-1"> <a href="https://web.archive.org/web/20230128001838/https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=922951">Preprint</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-70"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-70"> 6/13/2017 </td> </tr> <tr id="result-71"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-71">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-71"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2017/what-happened-to-software-metrics" id="pub-title-link-71">What Happened to Software Metrics?</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-71">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2017/what-happened-to-software-metrics" class="mobile-pub-title" id="pub-title-link-sm-71">What Happened to Software Metrics?</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-71">5/10/2017</strong> <br/> Status: <span id="pub-status-sm-71">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-71"> <span id="download-value-71-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1109/MC.2017.144">Journal Article (DOI)</a>; </span> <span id="download-value-71-1"> <a href="https://web.archive.org/web/20230128001838/https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5544018/">Article</a>; </span> <span id="download-value-71-2"> <a href="https://web.archive.org/web/20230128001838/https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4730686/?report=reader">Article (PubReader)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-71"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-71"> 5/10/2017 </td> </tr> <tr id="result-72"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-72">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-72"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2017/linear-time-algorithms-restrict-insider-access" id="pub-title-link-72">Linear Time Algorithms to Restrict Insider Access using Multi-Policy Access Control Systems</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-72">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2017/linear-time-algorithms-restrict-insider-access" class="mobile-pub-title" id="pub-title-link-sm-72">Linear Time Algorithms to Restrict Insider Access using Multi-Policy Access Control Systems</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-72">4/13/2017</strong> <br/> Status: <span id="pub-status-sm-72">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-72"> <span id="download-value-72-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.22667/JOWUA.2017.03.31.004">Journal Article (DOI)</a>; </span> <span id="download-value-72-1"> <a href="https://web.archive.org/web/20230128001838/https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=922390">Article</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-72"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-72"> 4/13/2017 </td> </tr> <tr id="result-73"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-73">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-73"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2017/building-caring-healthcare-systems-in-the-internet-of-things" id="pub-title-link-73">Building Caring Healthcare Systems in the Internet of Things</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-73">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2017/building-caring-healthcare-systems-in-the-internet-of-things" class="mobile-pub-title" id="pub-title-link-sm-73">Building Caring Healthcare Systems in the Internet of Things</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-73">2/22/2017</strong> <br/> Status: <span id="pub-status-sm-73">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-73"> <span id="download-value-73-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1109/JSYST.2017.2662602">Journal Article (DOI)</a>; </span> <span id="download-value-73-1"> <a href="https://web.archive.org/web/20230128001838/https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=922265">Preprint</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-73"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-73"> 2/22/2017 </td> </tr> <tr id="result-74"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-74">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-74"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2016/arithmetic-progressions-on-conics" id="pub-title-link-74">Arithmetic Progressions on Conics</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-74">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2016/arithmetic-progressions-on-conics" class="mobile-pub-title" id="pub-title-link-sm-74">Arithmetic Progressions on Conics</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-74">12/27/2016</strong> <br/> Status: <span id="pub-status-sm-74">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-74"> <span id="download-value-74-0"> <a href="https://web.archive.org/web/20230128001838/https://cs.uwaterloo.ca/journals/JIS/VOL20/Moody/moody7.html">Article</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-74"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-74"> 12/27/2016 </td> </tr> <tr id="result-75"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-75">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-75"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2016/measuring--specifying-combinatorial-coverage-test-input-configs" id="pub-title-link-75">Measuring and Specifying Combinatorial Coverage of Test Input Configurations</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-75">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2016/measuring--specifying-combinatorial-coverage-test-input-configs" class="mobile-pub-title" id="pub-title-link-sm-75">Measuring and Specifying Combinatorial Coverage of Test Input Configurations</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-75">12/01/2016</strong> <br/> Status: <span id="pub-status-sm-75">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-75"> <span id="download-value-75-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1007/s11334-015-0266-2">Journal Article (DOI)</a>; </span> <span id="download-value-75-1"> <a href="https://web.archive.org/web/20230128001838/https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=917142">Preprint</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-75"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-75"> 12/01/2016 </td> </tr> <tr id="result-76"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-76">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-76"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2016/defeating-buffer-overflow-a-trivial-but-dangerous-bug" id="pub-title-link-76">Defeating Buffer Overflow: A Trivial but Dangerous Bug</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-76">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2016/defeating-buffer-overflow-a-trivial-but-dangerous-bug" class="mobile-pub-title" id="pub-title-link-sm-76">Defeating Buffer Overflow: A Trivial but Dangerous Bug</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-76">12/01/2016</strong> <br/> Status: <span id="pub-status-sm-76">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-76"> <span id="download-value-76-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1109/MITP.2016.117">Journal Article (DOI)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-76"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-76"> 12/01/2016 </td> </tr> <tr id="result-77"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-77">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-77"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2016/the-power-of-qualitative-methods-cybersecurity-and-trust" id="pub-title-link-77">The Power of Qualitative Methods: Aha Moments in Exploring Cybersecurity and Trust</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-77">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2016/the-power-of-qualitative-methods-cybersecurity-and-trust" class="mobile-pub-title" id="pub-title-link-sm-77">The Power of Qualitative Methods: Aha Moments in Exploring Cybersecurity and Trust</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-77">11/01/2016</strong> <br/> Status: <span id="pub-status-sm-77">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-77"> <span id="download-value-77-0"> <a href="https://web.archive.org/web/20230128001838/http://uxpamagazine.org/the-power-of-qualitative-methods/">Article</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-77"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-77"> 11/01/2016 </td> </tr> <tr id="result-78"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-78">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-78"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2016/caring-an-undiscovered-super-“ility”-of-smart-healthcare" id="pub-title-link-78">Caring: An Undiscovered Super “Ility” of Smart Healthcare</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-78">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2016/caring-an-undiscovered-super-“ility”-of-smart-healthcare" class="mobile-pub-title" id="pub-title-link-sm-78">Caring: An Undiscovered Super “Ility” of Smart Healthcare</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-78">10/28/2016</strong> <br/> Status: <span id="pub-status-sm-78">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-78"> <span id="download-value-78-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1109/MS.2016.136">Journal Article (DOI)</a>; </span> <span id="download-value-78-1"> <a href="https://web.archive.org/web/20230128001838/https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=920534">Preprint</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-78"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-78"> 10/28/2016 </td> </tr> <tr id="result-79"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-79">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-79"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2016/secure-and-usable-enterprise-authentication" id="pub-title-link-79">Secure and Usable Enterprise Authentication: Lessons from the Field</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-79">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2016/secure-and-usable-enterprise-authentication" class="mobile-pub-title" id="pub-title-link-sm-79">Secure and Usable Enterprise Authentication: Lessons from the Field</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-79">10/25/2016</strong> <br/> Status: <span id="pub-status-sm-79">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-79"> <span id="download-value-79-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1109/MSP.2016.96">Journal Article (DOI)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-79"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-79"> 10/25/2016 </td> </tr> <tr id="result-80"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-80">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-80"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2016/combinatorial-methods-in-security-testing" id="pub-title-link-80">Combinatorial Methods in Security Testing</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-80">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2016/combinatorial-methods-in-security-testing" class="mobile-pub-title" id="pub-title-link-sm-80">Combinatorial Methods in Security Testing</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-80">10/20/2016</strong> <br/> Status: <span id="pub-status-sm-80">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-80"> <span id="download-value-80-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1109/MC.2016.314">Journal Article (DOI)</a>; </span> <span id="download-value-80-1"> <a href="https://web.archive.org/web/20230128001838/https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=921278">Preprint</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-80"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-80"> 10/20/2016 </td> </tr> <tr id="result-81"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-81">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-81"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2016/high-rank-elliptic-curves-with-torsion-z/4z" id="pub-title-link-81">High Rank Elliptic Curves with Torsion Z/4Z Induced by Kihara&#39;s Elliptic Curves</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-81">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2016/high-rank-elliptic-curves-with-torsion-z/4z" class="mobile-pub-title" id="pub-title-link-sm-81">High Rank Elliptic Curves with Torsion Z/4Z Induced by Kihara&#39;s Elliptic Curves</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-81">10/05/2016</strong> <br/> Status: <span id="pub-status-sm-81">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-81"> <span id="download-value-81-0"> <a href="https://web.archive.org/web/20230128001838/http://math.colgate.edu/~integers/vol16.html">Volume 16 (w/ link to paper)</a>; </span> <span id="download-value-81-1"> <a href="https://web.archive.org/web/20230128001838/https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=922952">Preprint</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-81"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-81"> 10/05/2016 </td> </tr> <tr id="result-82"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-82">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-82"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2016/security-fatigue" id="pub-title-link-82">Security Fatigue</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-82">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2016/security-fatigue" class="mobile-pub-title" id="pub-title-link-sm-82">Security Fatigue</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-82">9/28/2016</strong> <br/> Status: <span id="pub-status-sm-82">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-82"> <span id="download-value-82-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1109/MITP.2016.84">Journal Article (DOI)</a>; </span> <span id="download-value-82-1"> <a href="https://web.archive.org/web/20230128001838/https://www.nist.gov/news-events/news/2016/10/security-fatigue-can-cause-computer-users-feel-hopeless-and-act-recklessly">Press Release</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-82"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-82"> 9/28/2016 </td> </tr> <tr id="result-83"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-83">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-83"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2016/entropy-as-a-service-unlocking-cryptography's-full-potential" id="pub-title-link-83">Entropy as a Service: Unlocking Cryptography&#39;s Full Potential</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-83">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2016/entropy-as-a-service-unlocking-cryptography's-full-potential" class="mobile-pub-title" id="pub-title-link-sm-83">Entropy as a Service: Unlocking Cryptography&#39;s Full Potential</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-83">9/07/2016</strong> <br/> Status: <span id="pub-status-sm-83">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-83"> <span id="download-value-83-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1109/MC.2016.275">Journal Article (DOI)</a>; </span> <span id="download-value-83-1"> <a href="https://web.archive.org/web/20230128001838/https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=920992">Preprint</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-83"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-83"> 9/07/2016 </td> </tr> <tr id="result-84"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-84">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-84"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2016/separating-or-sum-and-xor-circuits" id="pub-title-link-84">Separating OR, SUM, and XOR Circuits</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-84">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2016/separating-or-sum-and-xor-circuits" class="mobile-pub-title" id="pub-title-link-sm-84">Separating OR, SUM, and XOR Circuits</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-84">8/23/2016</strong> <br/> Status: <span id="pub-status-sm-84">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-84"> <span id="download-value-84-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1016/j.jcss.2016.01.001">Journal Article (DOI)</a>; </span> <span id="download-value-84-1"> <a href="https://web.archive.org/web/20230128001838/https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=920253">Preprint</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-84"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-84"> 8/23/2016 </td> </tr> <tr id="result-85"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-85">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-85"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2016/whatever-happened-to-formal-methods-for-security" id="pub-title-link-85">Whatever Happened to Formal Methods for Security?</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-85">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2016/whatever-happened-to-formal-methods-for-security" class="mobile-pub-title" id="pub-title-link-sm-85">Whatever Happened to Formal Methods for Security?</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-85">8/23/2016</strong> <br/> Status: <span id="pub-status-sm-85">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-85"> <span id="download-value-85-0"> <a href="https://web.archive.org/web/20230128001838/https://www.computer.org/csdl/mags/co/2016/08/mco2016080070.html">Article</a>; </span> <span id="download-value-85-1"> <a href="https://web.archive.org/web/20230128001838/https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5120363/?report=reader">Article (PubReader)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-85"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-85"> 8/23/2016 </td> </tr> <tr id="result-86"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-86">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-86"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2016/metamorphic-testing-for-cybersecurity" id="pub-title-link-86">Metamorphic Testing for Cybersecurity</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-86">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2016/metamorphic-testing-for-cybersecurity" class="mobile-pub-title" id="pub-title-link-sm-86">Metamorphic Testing for Cybersecurity</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-86">6/27/2016</strong> <br/> Status: <span id="pub-status-sm-86">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-86"> <span id="download-value-86-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1109/MC.2016.176">Journal Article (DOI)</a>; </span> <span id="download-value-86-1"> <a href="https://web.archive.org/web/20230128001838/https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4993050/?report=classic">Article</a>; </span> <span id="download-value-86-2"> <a href="https://web.archive.org/web/20230128001838/https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4993050/?report=reader">Article (PubReader)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-86"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-86"> 6/27/2016 </td> </tr> <tr id="result-87"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-87">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-87"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2016/demystifying-the-internet-of-things" id="pub-title-link-87">Demystifying the Internet of Things</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-87">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2016/demystifying-the-internet-of-things" class="mobile-pub-title" id="pub-title-link-sm-87">Demystifying the Internet of Things</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-87">6/27/2016</strong> <br/> Status: <span id="pub-status-sm-87">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-87"> <span id="download-value-87-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1109/MC.2016.162">Journal Article (DOI)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-87"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-87"> 6/27/2016 </td> </tr> <tr id="result-88"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-88">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-88"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2016/insights-on-formal-methods-of-cybersecurity" id="pub-title-link-88">Insights on Formal Methods of Cybersecurity</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-88">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2016/insights-on-formal-methods-of-cybersecurity" class="mobile-pub-title" id="pub-title-link-sm-88">Insights on Formal Methods of Cybersecurity</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-88">5/27/2016</strong> <br/> Status: <span id="pub-status-sm-88">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-88"> <span id="download-value-88-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1109/MC.2016.131">Journal Article (DOI)</a>; </span> <span id="download-value-88-1"> <a href="https://web.archive.org/web/20230128001838/http://www.nist.gov/customcf/get_pdf.cfm?pub_id=920585">Preprint</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-88"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-88"> 5/27/2016 </td> </tr> <tr id="result-89"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-89">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-89"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2016/on-various-nonlinearity-measures-for-boolean-functions" id="pub-title-link-89">On Various Nonlinearity Measures for Boolean Functions</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-89">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2016/on-various-nonlinearity-measures-for-boolean-functions" class="mobile-pub-title" id="pub-title-link-sm-89">On Various Nonlinearity Measures for Boolean Functions</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-89">5/19/2016</strong> <br/> Status: <span id="pub-status-sm-89">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-89"> <span id="download-value-89-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1007/s12095-015-0150-9">Journal Article (DOI)</a>; </span> <span id="download-value-89-1"> <a href="https://web.archive.org/web/20230128001838/https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4957665/">Article</a>; </span> <span id="download-value-89-2"> <a href="https://web.archive.org/web/20230128001838/https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4957665/?report=reader">Article (PubReader)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-89"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-89"> 5/19/2016 </td> </tr> <tr id="result-90"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-90">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-90"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2016/indifferentiability-security-of-the-fast-widepipe-hash" id="pub-title-link-90">Indifferentiability Security of the Fast Widepipe Hash: Breaking the Birthday Barrier</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-90">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2016/indifferentiability-security-of-the-fast-widepipe-hash" class="mobile-pub-title" id="pub-title-link-sm-90">Indifferentiability Security of the Fast Widepipe Hash: Breaking the Birthday Barrier</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-90">4/21/2016</strong> <br/> Status: <span id="pub-status-sm-90">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-90"> <span id="download-value-90-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1515/jmc-2014-0044">Journal Article (DOI)</a>; </span> <span id="download-value-90-1"> <a href="https://web.archive.org/web/20230128001838/https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=911449">Preprint</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-90"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-90"> 4/21/2016 </td> </tr> <tr id="result-91"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-91">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-91"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2016/using-capability-oriented-methodology-to-build-cloud-ecosystem" id="pub-title-link-91">Using a Capability Oriented Methodology to Build Your Cloud Ecosystem</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-91">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2016/using-capability-oriented-methodology-to-build-cloud-ecosystem" class="mobile-pub-title" id="pub-title-link-sm-91">Using a Capability Oriented Methodology to Build Your Cloud Ecosystem</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-91">3/31/2016</strong> <br/> Status: <span id="pub-status-sm-91">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-91"> <span id="download-value-91-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1109/MCC.2016.38">Journal Article (DOI)</a>; </span> <span id="download-value-91-1"> <a href="https://web.archive.org/web/20230128001838/http://www.nist.gov/customcf/get_pdf.cfm?pub_id=920325">Preprint</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-91"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-91"> 3/31/2016 </td> </tr> <tr id="result-92"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-92">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-92"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2016/linear-time-vertex-partitioning-on-massive-graphs" id="pub-title-link-92">Linear Time Vertex Partitioning on Massive Graphs</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-92">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2016/linear-time-vertex-partitioning-on-massive-graphs" class="mobile-pub-title" id="pub-title-link-sm-92">Linear Time Vertex Partitioning on Massive Graphs</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-92">3/07/2016</strong> <br/> Status: <span id="pub-status-sm-92">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-92"> <span id="download-value-92-0"> <a href="https://web.archive.org/web/20230128001838/http://www.orb-academic.org/index.php/journal-of-computer-science/article/view/232">Article</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-92"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-92"> 3/07/2016 </td> </tr> <tr id="result-93"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-93">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-93"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2016/learning-internet-of-things-security-&quot;hands-on&quot;" id="pub-title-link-93">Learning Internet of Things Security &quot;Hands-On&quot;</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-93">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2016/learning-internet-of-things-security-&quot;hands-on&quot;" class="mobile-pub-title" id="pub-title-link-sm-93">Learning Internet of Things Security &quot;Hands-On&quot;</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-93">2/03/2016</strong> <br/> Status: <span id="pub-status-sm-93">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-93"> <span id="download-value-93-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1109/MSP.2016.4">Journal Article (DOI)</a>; </span> <span id="download-value-93-1"> <a href="https://web.archive.org/web/20230128001838/https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=919708">Preprint</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-93"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-93"> 2/03/2016 </td> </tr> <tr id="result-94"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-94">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-94"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2016/network-diversity-security-metric-for-evaluating-resilience" id="pub-title-link-94">Network Diversity: A Security Metric for Evaluating the Resilience of Networks Against Zero-Day Attacks</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-94">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2016/network-diversity-security-metric-for-evaluating-resilience" class="mobile-pub-title" id="pub-title-link-sm-94">Network Diversity: A Security Metric for Evaluating the Resilience of Networks Against Zero-Day Attacks</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-94">1/12/2016</strong> <br/> Status: <span id="pub-status-sm-94">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-94"> <span id="download-value-94-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1109/TIFS.2016.2516916">Journal Article (DOI)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-94"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-94"> 1/12/2016 </td> </tr> <tr id="result-95"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-95">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-95"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2015/third-party-software's-trust-quagmire" id="pub-title-link-95">Third-Party Software&#39;s Trust Quagmire</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-95">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2015/third-party-software's-trust-quagmire" class="mobile-pub-title" id="pub-title-link-sm-95">Third-Party Software&#39;s Trust Quagmire</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-95">12/18/2015</strong> <br/> Status: <span id="pub-status-sm-95">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-95"> <span id="download-value-95-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1109/MC.2015.372">Journal Article (DOI)</a>; </span> <span id="download-value-95-1"> <a href="https://web.archive.org/web/20230128001838/https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4840412/?report=classic">Article</a>; </span> <span id="download-value-95-2"> <a href="https://web.archive.org/web/20230128001838/https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4840412/?report=reader">Article (PubReader)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-95"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-95"> 12/18/2015 </td> </tr> <tr id="result-96"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-96">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-96"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2015/managing-risk-in-a-cloud-ecosystem" id="pub-title-link-96">Managing Risk in a Cloud Ecosystem</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-96">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2015/managing-risk-in-a-cloud-ecosystem" class="mobile-pub-title" id="pub-title-link-sm-96">Managing Risk in a Cloud Ecosystem</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-96">12/18/2015</strong> <br/> Status: <span id="pub-status-sm-96">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-96"> <span id="download-value-96-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1109/MCC.2015.122">Journal Article (DOI)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-96"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-96"> 12/18/2015 </td> </tr> <tr id="result-97"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-97">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-97"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2015/expanding-continuous-authentication-with-mobile-devices" id="pub-title-link-97">Expanding Continuous Authentication with Mobile Devices</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-97">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2015/expanding-continuous-authentication-with-mobile-devices" class="mobile-pub-title" id="pub-title-link-sm-97">Expanding Continuous Authentication with Mobile Devices</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-97">11/13/2015</strong> <br/> Status: <span id="pub-status-sm-97">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-97"> <span id="download-value-97-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1109/MC.2015.333">Journal Article (DOI)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-97"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-97"> 11/13/2015 </td> </tr> <tr id="result-98"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-98">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-98"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2015/dependence-for-crypto-primitives-relative-to-ideal-functions" id="pub-title-link-98">A Measure of Dependence for Cryptographic Primitives Relative to Ideal Functions</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-98">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2015/dependence-for-crypto-primitives-relative-to-ideal-functions" class="mobile-pub-title" id="pub-title-link-sm-98">A Measure of Dependence for Cryptographic Primitives Relative to Ideal Functions</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-98">11/02/2015</strong> <br/> Status: <span id="pub-status-sm-98">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-98"> <span id="download-value-98-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1216/RMJ-2015-45-4-1283">Journal Article (DOI)</a>; </span> <span id="download-value-98-1"> <a href="https://web.archive.org/web/20230128001838/https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=926106">Preprint</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-98"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-98"> 11/02/2015 </td> </tr> <tr id="result-99"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-99">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-99"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2015/spreading-alerts-quietly-and-the-subgroup-escape-problem" id="pub-title-link-99">Spreading Alerts Quietly and the Subgroup Escape Problem</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-99">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2015/spreading-alerts-quietly-and-the-subgroup-escape-problem" class="mobile-pub-title" id="pub-title-link-sm-99">Spreading Alerts Quietly and the Subgroup Escape Problem</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-99">10/01/2015</strong> <br/> Status: <span id="pub-status-sm-99">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-99"> <span id="download-value-99-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1007/s00145-014-9181-1">Journal Article (DOI)</a>; </span> <span id="download-value-99-1"> <a href="https://web.archive.org/web/20230128001838/https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=152185">Preprint</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-99"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-99"> 10/01/2015 </td> </tr> <tr id="result-100"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-100">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-100"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2015/analogues-of-velu's-formulas-for-isogenies-on-alternate-models-o" id="pub-title-link-100">Analogues of Velu&#39;s Formulas for Isogenies on Alternate Models of Elliptic Curves</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-100">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2015/analogues-of-velu's-formulas-for-isogenies-on-alternate-models-o" class="mobile-pub-title" id="pub-title-link-sm-100">Analogues of Velu&#39;s Formulas for Isogenies on Alternate Models of Elliptic Curves</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-100">9/09/2015</strong> <br/> Status: <span id="pub-status-sm-100">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-100"> <span id="download-value-100-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1090/mcom/3036">Journal Article (DOI)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-100"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-100"> 9/09/2015 </td> </tr> <tr id="result-101"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-101">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-101"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2015/leveraging-the-potential-of-cloud-security-service-level-agreeme" id="pub-title-link-101">Leveraging the Potential of Cloud Security Service-Level Agreements through Standards</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-101">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2015/leveraging-the-potential-of-cloud-security-service-level-agreeme" class="mobile-pub-title" id="pub-title-link-sm-101">Leveraging the Potential of Cloud Security Service-Level Agreements through Standards</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-101">7/15/2015</strong> <br/> Status: <span id="pub-status-sm-101">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-101"> <span id="download-value-101-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1109/MCC.2015.52">Journal Article (DOI)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-101"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-101"> 7/15/2015 </td> </tr> <tr id="result-102"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-102">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-102"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2015/measuring-limits-on-the-ability-of-colluding-countries-to-partit" id="pub-title-link-102">Measuring Limits on the Ability of Colluding Countries to Partition the Internet</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-102">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2015/measuring-limits-on-the-ability-of-colluding-countries-to-partit" class="mobile-pub-title" id="pub-title-link-sm-102">Measuring Limits on the Ability of Colluding Countries to Partition the Internet</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-102">6/30/2015</strong> <br/> Status: <span id="pub-status-sm-102">Final</span> </div> <div class="control-value-no-block"> Download: <span id="download-values-102">None available</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-102"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-102"> 6/30/2015 </td> </tr> <tr id="result-103"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-103">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-103"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2015/new-second-preimage-attacks-on-hash-functions" id="pub-title-link-103">New Second-Preimage Attacks on Hash Functions</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-103">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2015/new-second-preimage-attacks-on-hash-functions" class="mobile-pub-title" id="pub-title-link-sm-103">New Second-Preimage Attacks on Hash Functions</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-103">6/23/2015</strong> <br/> Status: <span id="pub-status-sm-103">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-103"> <span id="download-value-103-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1007/s00145-015-9206-4">Journal Article (DOI)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-103"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-103"> 6/23/2015 </td> </tr> <tr id="result-104"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-104">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-104"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2015/evasion-resistant-network-scan-detection" id="pub-title-link-104">Evasion-Resistant Network Scan Detection</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-104">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2015/evasion-resistant-network-scan-detection" class="mobile-pub-title" id="pub-title-link-sm-104">Evasion-Resistant Network Scan Detection</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-104">5/09/2015</strong> <br/> Status: <span id="pub-status-sm-104">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-104"> <span id="download-value-104-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1186/s13388-015-0019-7">Journal Article (DOI)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-104"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-104"> 5/09/2015 </td> </tr> <tr id="result-105"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-105">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-105"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2015/introducing-combinatorial-testing-in-a-large-organization" id="pub-title-link-105">Introducing Combinatorial Testing in a Large Organization</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-105">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2015/introducing-combinatorial-testing-in-a-large-organization" class="mobile-pub-title" id="pub-title-link-sm-105">Introducing Combinatorial Testing in a Large Organization</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-105">4/23/2015</strong> <br/> Status: <span id="pub-status-sm-105">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-105"> <span id="download-value-105-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1109/MC.2015.114">Journal Article (DOI)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-105"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-105"> 4/23/2015 </td> </tr> <tr id="result-106"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-106">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-106"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2015/combinatorial-coverage-as-an-aspect-of-test-quality" id="pub-title-link-106">Combinatorial Coverage as an Aspect of Test Quality</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-106">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2015/combinatorial-coverage-as-an-aspect-of-test-quality" class="mobile-pub-title" id="pub-title-link-sm-106">Combinatorial Coverage as an Aspect of Test Quality</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-106">3/31/2015</strong> <br/> Status: <span id="pub-status-sm-106">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-106"> <span id="download-value-106-0"> <a href="https://web.archive.org/web/20230128001838/https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=917352">Article</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-106"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-106"> 3/31/2015 </td> </tr> <tr id="result-107"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-107">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-107"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2015/improved-indifferentiability-security-bound-for-the-jh-mode" id="pub-title-link-107">Improved Indifferentiability Security Bound for the JH Mode</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-107">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2015/improved-indifferentiability-security-bound-for-the-jh-mode" class="mobile-pub-title" id="pub-title-link-sm-107">Improved Indifferentiability Security Bound for the JH Mode</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-107">2/15/2015</strong> <br/> Status: <span id="pub-status-sm-107">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-107"> <span id="download-value-107-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1007/s10623-015-0047-9">Journal Article (DOI)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-107"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-107"> 2/15/2015 </td> </tr> <tr id="result-108"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-108">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-108"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2015/it-security" id="pub-title-link-108">IT Security</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-108">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2015/it-security" class="mobile-pub-title" id="pub-title-link-sm-108">IT Security</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-108">2/04/2015</strong> <br/> Status: <span id="pub-status-sm-108">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-108"> <span id="download-value-108-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1109/MITP.2015.10">Journal Article (DOI)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-108"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-108"> 2/04/2015 </td> </tr> <tr id="result-109"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-109">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-109"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2015/report-on-pairing-based-cryptography" id="pub-title-link-109">Report on Pairing-based Cryptography</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-109">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2015/report-on-pairing-based-cryptography" class="mobile-pub-title" id="pub-title-link-sm-109">Report on Pairing-based Cryptography</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-109">2/03/2015</strong> <br/> Status: <span id="pub-status-sm-109">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-109"> <span id="download-value-109-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.6028/jres.120.002">Journal Article (DOI)</a>; </span> <span id="download-value-109-1"> <a href="https://web.archive.org/web/20230128001838/https://nvlpubs.nist.gov/nistpubs/jres/120/jres.120.002.pdf">Article</a>; </span> <span id="download-value-109-2"> <a href="https://web.archive.org/web/20230128001838/https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4730686/?report=classic">Article</a>; </span> <span id="download-value-109-3"> <a href="https://web.archive.org/web/20230128001838/https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4730686/?report=reader">Article (PubReader)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-109"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-109"> 2/03/2015 </td> </tr> <tr id="result-110"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-110">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-110"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2014/measuring-impact-of-cybersecurity-on-the-performance-of-ics" id="pub-title-link-110">Measuring Impact of Cybersecurity on the Performance of Industrial Control Systems</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-110">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2014/measuring-impact-of-cybersecurity-on-the-performance-of-ics" class="mobile-pub-title" id="pub-title-link-sm-110">Measuring Impact of Cybersecurity on the Performance of Industrial Control Systems</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-110">12/31/2014</strong> <br/> Status: <span id="pub-status-sm-110">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-110"> <span id="download-value-110-0"> <a href="https://web.archive.org/web/20230128001838/https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=917176">Article</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-110"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-110"> 12/31/2014 </td> </tr> <tr id="result-111"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-111">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-111"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2014/avoiding-cyberspace-catastrophes-through-smarter-testing" id="pub-title-link-111">Avoiding Cyberspace Catastrophes through Smarter Testing</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-111">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2014/avoiding-cyberspace-catastrophes-through-smarter-testing" class="mobile-pub-title" id="pub-title-link-sm-111">Avoiding Cyberspace Catastrophes through Smarter Testing</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-111">10/16/2014</strong> <br/> Status: <span id="pub-status-sm-111">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-111"> <span id="download-value-111-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1109/MC.2014.273">Journal Article (DOI)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-111"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-111"> 10/16/2014 </td> </tr> <tr id="result-112"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-112">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-112"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2014/reducing-the-cognitive-load-on-analysts-through-hamming-distance" id="pub-title-link-112">Reducing the Cognitive Load on Analysts through Hamming Distance Based Alert Aggregation</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-112">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2014/reducing-the-cognitive-load-on-analysts-through-hamming-distance" class="mobile-pub-title" id="pub-title-link-sm-112">Reducing the Cognitive Load on Analysts through Hamming Distance Based Alert Aggregation</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-112">9/30/2014</strong> <br/> Status: <span id="pub-status-sm-112">Final</span> </div> <div class="control-value-no-block"> Download: <span id="download-values-112">None available</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-112"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-112"> 9/30/2014 </td> </tr> <tr id="result-113"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-113">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-113"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2014/the-future-of-cybersecurity-education" id="pub-title-link-113">The Future of Cybersecurity Education</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-113">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2014/the-future-of-cybersecurity-education" class="mobile-pub-title" id="pub-title-link-sm-113">The Future of Cybersecurity Education</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-113">8/19/2014</strong> <br/> Status: <span id="pub-status-sm-113">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-113"> <span id="download-value-113-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1109/MC.2014.224">Journal Article (DOI)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-113"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-113"> 8/19/2014 </td> </tr> <tr id="result-114"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-114">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-114"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2014/it-pro-conference-on-information-systems-governance" id="pub-title-link-114">IT Pro Conference on Information Systems Governance</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-114">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2014/it-pro-conference-on-information-systems-governance" class="mobile-pub-title" id="pub-title-link-sm-114">IT Pro Conference on Information Systems Governance</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-114">8/06/2014</strong> <br/> Status: <span id="pub-status-sm-114">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-114"> <span id="download-value-114-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1109/MITP.2014.55">Journal Article (DOI)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-114"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-114"> 8/06/2014 </td> </tr> <tr id="result-115"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-115">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-115"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2014/elliptic-curves-arising-from-brahmagupta-quadrilaterals" id="pub-title-link-115">Elliptic Curves Arising from Brahmagupta Quadrilaterals</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-115">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2014/elliptic-curves-arising-from-brahmagupta-quadrilaterals" class="mobile-pub-title" id="pub-title-link-sm-115">Elliptic Curves Arising from Brahmagupta Quadrilaterals</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-115">8/01/2014</strong> <br/> Status: <span id="pub-status-sm-115">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-115"> <span id="download-value-115-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1017/S0004972713001172">Journal Article (DOI)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-115"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-115"> 8/01/2014 </td> </tr> <tr id="result-116"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-116">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-116"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2014/nist-cybersecurity-framework-addresses-risks-to-critical-infrast" id="pub-title-link-116">NIST Cybersecurity Framework Addresses Risks to Critical Infrastructure</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-116">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2014/nist-cybersecurity-framework-addresses-risks-to-critical-infrast" class="mobile-pub-title" id="pub-title-link-sm-116">NIST Cybersecurity Framework Addresses Risks to Critical Infrastructure</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-116">6/02/2014</strong> <br/> Status: <span id="pub-status-sm-116">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-116"> <span id="download-value-116-0"> <a href="https://web.archive.org/web/20230128001838/https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=915855">Article</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-116"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-116"> 6/02/2014 </td> </tr> <tr id="result-117"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-117">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-117"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2014/nist-and-computer-security" id="pub-title-link-117">NIST and Computer Security</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-117">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2014/nist-and-computer-security" class="mobile-pub-title" id="pub-title-link-sm-117">NIST and Computer Security</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-117">4/04/2014</strong> <br/> Status: <span id="pub-status-sm-117">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-117"> <span id="download-value-117-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1109/MITP.2013.88">Journal Article (DOI)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-117"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-117"> 4/04/2014 </td> </tr> <tr id="result-118"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-118">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-118"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2014/the-importance-of-entropy-to-information-security" id="pub-title-link-118">The Importance of Entropy to Information Security</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-118">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2014/the-importance-of-entropy-to-information-security" class="mobile-pub-title" id="pub-title-link-sm-118">The Importance of Entropy to Information Security</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-118">2/03/2014</strong> <br/> Status: <span id="pub-status-sm-118">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-118"> <span id="download-value-118-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1109/MC.2014.47">Journal Article (DOI)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-118"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-118"> 2/03/2014 </td> </tr> <tr id="result-119"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-119">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-119"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2014/software-testing" id="pub-title-link-119">Software Testing</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-119">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2014/software-testing" class="mobile-pub-title" id="pub-title-link-sm-119">Software Testing</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-119">2/03/2014</strong> <br/> Status: <span id="pub-status-sm-119">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-119"> <span id="download-value-119-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1109/MC.2014.45">Journal Article (DOI)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-119"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-119"> 2/03/2014 </td> </tr> <tr id="result-120"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-120">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-120"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2014/it-risks" id="pub-title-link-120">IT Risks</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-120">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2014/it-risks" class="mobile-pub-title" id="pub-title-link-sm-120">IT Risks</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-120">2/03/2014</strong> <br/> Status: <span id="pub-status-sm-120">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-120"> <span id="download-value-120-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1109/MITP.2014.7">Journal Article (DOI)</a>; </span> <span id="download-value-120-1"> <a href="https://web.archive.org/web/20230128001838/https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=915277">Preprint</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-120"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-120"> 2/03/2014 </td> </tr> <tr id="result-121"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-121">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-121"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2014/k-zero-day-safety-network-security-metric-for-measuring-risk" id="pub-title-link-121">k-Zero Day Safety: A Network Security Metric for Measuring the Risk of Unknown Vulnerabilities</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-121">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2014/k-zero-day-safety-network-security-metric-for-measuring-risk" class="mobile-pub-title" id="pub-title-link-sm-121">k-Zero Day Safety: A Network Security Metric for Measuring the Risk of Unknown Vulnerabilities</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-121">1/31/2014</strong> <br/> Status: <span id="pub-status-sm-121">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-121"> <span id="download-value-121-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1109/TDSC.2013.24">Journal Article (DOI)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-121"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-121"> 1/31/2014 </td> </tr> <tr id="result-122"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-122">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-122"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2013/a-new-standard-for-securing-media-independent-handover-ieee-802" id="pub-title-link-122">A New Standard for Securing Media-Independent Handover: IEEE 802.21a</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-122">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2013/a-new-standard-for-securing-media-independent-handover-ieee-802" class="mobile-pub-title" id="pub-title-link-sm-122">A New Standard for Securing Media-Independent Handover: IEEE 802.21a</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-122">12/31/2013</strong> <br/> Status: <span id="pub-status-sm-122">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-122"> <span id="download-value-122-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1109/MWC.2013.6704478">Journal Article (DOI)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-122"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-122"> 12/31/2013 </td> </tr> <tr id="result-123"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-123">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-123"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2013/delay-behavior-of-on-off-scheduling-extending-idle-periods" id="pub-title-link-123">Delay Behavior of On-Off Scheduling: Extending Idle Periods</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-123">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2013/delay-behavior-of-on-off-scheduling-extending-idle-periods" class="mobile-pub-title" id="pub-title-link-sm-123">Delay Behavior of On-Off Scheduling: Extending Idle Periods</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-123">11/01/2013</strong> <br/> Status: <span id="pub-status-sm-123">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-123"> <span id="download-value-123-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.12785/amis/070603">Journal Article (DOI)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-123"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-123"> 11/01/2013 </td> </tr> <tr id="result-124"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-124">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-124"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2013/avoiding-accidental-data-loss" id="pub-title-link-124">Avoiding Accidental Data Loss</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-124">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2013/avoiding-accidental-data-loss" class="mobile-pub-title" id="pub-title-link-sm-124">Avoiding Accidental Data Loss</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-124">10/18/2013</strong> <br/> Status: <span id="pub-status-sm-124">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-124"> <span id="download-value-124-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1109/MITP.2013.75">Journal Article (DOI)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-124"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-124"> 10/18/2013 </td> </tr> <tr id="result-125"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-125">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-125"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2013/vulnerability-metrics-using-attack-graphs" id="pub-title-link-125">Aggregating Vulnerability Metrics in Enterprise Networks using Attack Graphs</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-125">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2013/vulnerability-metrics-using-attack-graphs" class="mobile-pub-title" id="pub-title-link-sm-125">Aggregating Vulnerability Metrics in Enterprise Networks using Attack Graphs</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-125">9/20/2013</strong> <br/> Status: <span id="pub-status-sm-125">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-125"> <span id="download-value-125-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.3233/JCS-130475">Journal Article (DOI)</a>; </span> <span id="download-value-125-1"> <a href="https://web.archive.org/web/20230128001838/https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=926022">Preprint</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-125"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-125"> 9/20/2013 </td> </tr> <tr id="result-126"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-126">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-126"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2013/on-integer-solutions-of-x4y4-2z4-2w40" id="pub-title-link-126">On Integer Solutions of x^4+y^4-2z^4-2w^4=0</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-126">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2013/on-integer-solutions-of-x4y4-2z4-2w40" class="mobile-pub-title" id="pub-title-link-sm-126">On Integer Solutions of x^4+y^4-2z^4-2w^4=0</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-126">9/18/2013</strong> <br/> Status: <span id="pub-status-sm-126">Final</span> </div> <div class="control-value-no-block"> Download: <span id="download-values-126">None available</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-126"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-126"> 9/18/2013 </td> </tr> <tr id="result-127"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-127">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-127"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2013/enabling-an-enterprise-wide-data-centric-operating-environment" id="pub-title-link-127">Enabling an Enterprise-wide, Data-centric Operating Environment</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-127">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2013/enabling-an-enterprise-wide-data-centric-operating-environment" class="mobile-pub-title" id="pub-title-link-sm-127">Enabling an Enterprise-wide, Data-centric Operating Environment</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-127">6/21/2013</strong> <br/> Status: <span id="pub-status-sm-127">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-127"> <span id="download-value-127-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1109/MC.2013.130">Journal Article (DOI)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-127"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-127"> 6/21/2013 </td> </tr> <tr id="result-128"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-128">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-128"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2013/secure-sealed-bid-online-auctions-using-discreet-cryptographic-p" id="pub-title-link-128">Secure Sealed-Bid Online Auctions Using Discreet Cryptographic Proofs</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-128">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2013/secure-sealed-bid-online-auctions-using-discreet-cryptographic-p" class="mobile-pub-title" id="pub-title-link-sm-128">Secure Sealed-Bid Online Auctions Using Discreet Cryptographic Proofs</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-128">5/10/2013</strong> <br/> Status: <span id="pub-status-sm-128">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-128"> <span id="download-value-128-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1016/j.mcm.2011.07.027">Journal Article (DOI)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-128"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-128"> 5/10/2013 </td> </tr> <tr id="result-129"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-129">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-129"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2013/logic-minimization-techniques-with-applications-to-cryptology" id="pub-title-link-129">Logic Minimization Techniques with Applications to Cryptology</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-129">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2013/logic-minimization-techniques-with-applications-to-cryptology" class="mobile-pub-title" id="pub-title-link-sm-129">Logic Minimization Techniques with Applications to Cryptology</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-129">4/01/2013</strong> <br/> Status: <span id="pub-status-sm-129">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-129"> <span id="download-value-129-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1007/s00145-012-9124-7">Journal Article (DOI)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-129"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-129"> 4/01/2013 </td> </tr> <tr id="result-130"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-130">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-130"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2013/combinatorial-testing-for-software-design-of-experiments" id="pub-title-link-130">Combinatorial Testing for Software: an Adaptation of Design of Experiments</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-130">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2013/combinatorial-testing-for-software-design-of-experiments" class="mobile-pub-title" id="pub-title-link-sm-130">Combinatorial Testing for Software: an Adaptation of Design of Experiments</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-130">3/14/2013</strong> <br/> Status: <span id="pub-status-sm-130">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-130"> <span id="download-value-130-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1016/j.measurement.2013.02.021">Journal Article (DOI)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-130"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-130"> 3/14/2013 </td> </tr> <tr id="result-131"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-131">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-131"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2013/changes-in-federal-information-processing-standard-fips-180-4" id="pub-title-link-131">Changes in Federal Information Processing Standard (FIPS) 180-4, Secure Hash Standard</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-131">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2013/changes-in-federal-information-processing-standard-fips-180-4" class="mobile-pub-title" id="pub-title-link-sm-131">Changes in Federal Information Processing Standard (FIPS) 180-4, Secure Hash Standard</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-131">1/11/2013</strong> <br/> Status: <span id="pub-status-sm-131">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-131"> <span id="download-value-131-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1080/01611194.2012.687431">Journal Article (DOI)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-131"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-131"> 1/11/2013 </td> </tr> <tr id="result-132"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-132">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-132"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2013/advances-in-biometric-standardisation-–-addressing-global-requir" id="pub-title-link-132">Advances in Biometric Standardisation – Addressing Global Requirements for Interoperable Biometrics</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-132">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2013/advances-in-biometric-standardisation-–-addressing-global-requir" class="mobile-pub-title" id="pub-title-link-sm-132">Advances in Biometric Standardisation – Addressing Global Requirements for Interoperable Biometrics</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-132">1/01/2013</strong> <br/> Status: <span id="pub-status-sm-132">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-132"> <span id="download-value-132-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1504/IJBM.2013.050730">Journal Article (DOI)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-132"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-132"> 1/01/2013 </td> </tr> <tr id="result-133"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-133">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-133"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2012/securing-america’s-digital-infrastructure-through-education" id="pub-title-link-133">Securing America’s Digital Infrastructure Through Education</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-133">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2012/securing-america’s-digital-infrastructure-through-education" class="mobile-pub-title" id="pub-title-link-sm-133">Securing America’s Digital Infrastructure Through Education</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-133">12/14/2012</strong> <br/> Status: <span id="pub-status-sm-133">Final</span> </div> <div class="control-value-no-block"> Download: <span id="download-values-133">None available</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-133"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-133"> 12/14/2012 </td> </tr> <tr id="result-134"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-134">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-134"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2012/introducing-the-federal-cybersecurity-rd-strategic-plan" id="pub-title-link-134">Introducing the Federal Cybersecurity R&amp;D Strategic Plan</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-134">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2012/introducing-the-federal-cybersecurity-rd-strategic-plan" class="mobile-pub-title" id="pub-title-link-sm-134">Introducing the Federal Cybersecurity R&amp;D Strategic Plan</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-134">12/14/2012</strong> <br/> Status: <span id="pub-status-sm-134">Final</span> </div> <div class="control-value-no-block"> Download: <span id="download-values-134">None available</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-134"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-134"> 12/14/2012 </td> </tr> <tr id="result-135"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-135">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-135"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2012/protecting-wireless-local-area-networks" id="pub-title-link-135">Protecting Wireless Local Area Networks</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-135">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2012/protecting-wireless-local-area-networks" class="mobile-pub-title" id="pub-title-link-sm-135">Protecting Wireless Local Area Networks</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-135">12/03/2012</strong> <br/> Status: <span id="pub-status-sm-135">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-135"> <span id="download-value-135-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1109/MITP.2012.110">Journal Article (DOI)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-135"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-135"> 12/03/2012 </td> </tr> <tr id="result-136"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-136">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-136"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2012/class-numbers-via-3-isogenies-and-elliptic-surfaces" id="pub-title-link-136">Class Numbers via 3-Isogenies and Elliptic Surfaces</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-136">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2012/class-numbers-via-3-isogenies-and-elliptic-surfaces" class="mobile-pub-title" id="pub-title-link-sm-136">Class Numbers via 3-Isogenies and Elliptic Surfaces</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-136">11/06/2012</strong> <br/> Status: <span id="pub-status-sm-136">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-136"> <span id="download-value-136-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1142/S179304211250128X">Journal Article (DOI)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-136"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-136"> 11/06/2012 </td> </tr> <tr id="result-137"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-137">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-137"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2012/on-the-nonlinearity-of-maximum-length-nfsr-feedbacks" id="pub-title-link-137">On the Nonlinearity of Maximum-length NFSR Feedbacks</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-137">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2012/on-the-nonlinearity-of-maximum-length-nfsr-feedbacks" class="mobile-pub-title" id="pub-title-link-sm-137">On the Nonlinearity of Maximum-length NFSR Feedbacks</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-137">8/14/2012</strong> <br/> Status: <span id="pub-status-sm-137">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-137"> <span id="download-value-137-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1007/s12095-012-0067-5">Journal Article (DOI)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-137"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-137"> 8/14/2012 </td> </tr> <tr id="result-138"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-138">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-138"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2012/efficient-methods-for-interoperability-testing-using-event-seque" id="pub-title-link-138">Efficient Methods for Interoperability Testing Using Event Sequences</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-138">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2012/efficient-methods-for-interoperability-testing-using-event-seque" class="mobile-pub-title" id="pub-title-link-sm-138">Efficient Methods for Interoperability Testing Using Event Sequences</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-138">7/31/2012</strong> <br/> Status: <span id="pub-status-sm-138">Final</span> </div> <div class="control-value-no-block"> Download: <span id="download-values-138">None available</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-138"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-138"> 7/31/2012 </td> </tr> <tr id="result-139"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-139">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-139"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2012/what-continuous-monitoring-really-means" id="pub-title-link-139">What Continuous Monitoring Really Means</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-139">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2012/what-continuous-monitoring-really-means" class="mobile-pub-title" id="pub-title-link-sm-139">What Continuous Monitoring Really Means</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-139">7/24/2012</strong> <br/> Status: <span id="pub-status-sm-139">Final</span> </div> <div class="control-value-no-block"> Download: <span id="download-values-139">None available</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-139"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-139"> 7/24/2012 </td> </tr> <tr id="result-140"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-140">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-140"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2012/arithmetic-progressions-on-huff-curves" id="pub-title-link-140">Arithmetic Progressions on Huff Curves</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-140">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2012/arithmetic-progressions-on-huff-curves" class="mobile-pub-title" id="pub-title-link-sm-140">Arithmetic Progressions on Huff Curves</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-140">7/23/2012</strong> <br/> Status: <span id="pub-status-sm-140">Final</span> </div> <div class="control-value-no-block"> Download: <span id="download-values-140">None available</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-140"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-140"> 7/23/2012 </td> </tr> <tr id="result-141"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-141">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-141"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2012/what's-special-about-cloud-security" id="pub-title-link-141">What&#39;s Special About Cloud Security?</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-141">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2012/what's-special-about-cloud-security" class="mobile-pub-title" id="pub-title-link-sm-141">What&#39;s Special About Cloud Security?</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-141">7/16/2012</strong> <br/> Status: <span id="pub-status-sm-141">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-141"> <span id="download-value-141-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1109/MITP.2012.84">Journal Article (DOI)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-141"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-141"> 7/16/2012 </td> </tr> <tr id="result-142"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-142">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-142"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2012/the-internet-of-things-a-reality-check" id="pub-title-link-142">The Internet of Things: A Reality Check</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-142">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2012/the-internet-of-things-a-reality-check" class="mobile-pub-title" id="pub-title-link-sm-142">The Internet of Things: A Reality Check</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-142">6/11/2012</strong> <br/> Status: <span id="pub-status-sm-142">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-142"> <span id="download-value-142-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1109/MITP.2012.60">Journal Article (DOI)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-142"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-142"> 6/11/2012 </td> </tr> <tr id="result-143"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-143">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-143"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2012/nice-creating-a-cybersecurity-workforce-and-aware-public" id="pub-title-link-143">NICE: Creating a Cybersecurity Workforce and Aware Public</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-143">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2012/nice-creating-a-cybersecurity-workforce-and-aware-public" class="mobile-pub-title" id="pub-title-link-sm-143">NICE: Creating a Cybersecurity Workforce and Aware Public</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-143">6/04/2012</strong> <br/> Status: <span id="pub-status-sm-143">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-143"> <span id="download-value-143-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1109/MSP.2012.73">Journal Article (DOI)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-143"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-143"> 6/04/2012 </td> </tr> <tr id="result-144"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-144">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-144"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2012/evaluation-of-fault-detection-effectiveness-for-combinatorial-an" id="pub-title-link-144">Evaluation of Fault Detection Effectiveness for Combinatorial and Exhaustive Selection of Discretized Test Inputs</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-144">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2012/evaluation-of-fault-detection-effectiveness-for-combinatorial-an" class="mobile-pub-title" id="pub-title-link-sm-144">Evaluation of Fault Detection Effectiveness for Combinatorial and Exhaustive Selection of Discretized Test Inputs</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-144">6/04/2012</strong> <br/> Status: <span id="pub-status-sm-144">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-144"> <span id="download-value-144-0"> <a href="https://web.archive.org/web/20230128001838/http://asq.org/software-quality/2012/06/evaluation-of-fault-detection-effectiveness.pdf">Article</a>; </span> <span id="download-value-144-1"> <a href="https://web.archive.org/web/20230128001838/https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=909661">Preprint</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-144"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-144"> 6/04/2012 </td> </tr> <tr id="result-145"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-145">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-145"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2012/isomorphism-classes-of-edwards-and-twisted-edwards-curves-over-f" id="pub-title-link-145">Isomorphism classes of Edwards and twisted Edwards curves over finite fields</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-145">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2012/isomorphism-classes-of-edwards-and-twisted-edwards-curves-over-f" class="mobile-pub-title" id="pub-title-link-sm-145">Isomorphism classes of Edwards and twisted Edwards curves over finite fields</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-145">5/18/2012</strong> <br/> Status: <span id="pub-status-sm-145">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-145"> <span id="download-value-145-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1016/j.ffa.2011.12.004">Journal Article (DOI)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-145"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-145"> 5/18/2012 </td> </tr> <tr id="result-146"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-146">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-146"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2012/a-matter-of-policy" id="pub-title-link-146">A Matter of Policy</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-146">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2012/a-matter-of-policy" class="mobile-pub-title" id="pub-title-link-sm-146">A Matter of Policy</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-146">3/26/2012</strong> <br/> Status: <span id="pub-status-sm-146">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-146"> <span id="download-value-146-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1109/MITP.2012.30">Journal Article (DOI)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-146"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-146"> 3/26/2012 </td> </tr> <tr id="result-147"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-147">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-147"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2012/basing-cybersecurity-training-on-user-perceptions" id="pub-title-link-147">Basing Cybersecurity Training on User Perceptions</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-147">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2012/basing-cybersecurity-training-on-user-perceptions" class="mobile-pub-title" id="pub-title-link-sm-147">Basing Cybersecurity Training on User Perceptions</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-147">3/01/2012</strong> <br/> Status: <span id="pub-status-sm-147">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-147"> <span id="download-value-147-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1109/MSP.2011.180">Journal Article (DOI)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-147"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-147"> 3/01/2012 </td> </tr> <tr id="result-148"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-148">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-148"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2012/building-security-into-&quot;off-the-shelf&quot;-smartphones" id="pub-title-link-148">Building Security into &quot;Off-the-Shelf&quot; Smartphones</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-148">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2012/building-security-into-&quot;off-the-shelf&quot;-smartphones" class="mobile-pub-title" id="pub-title-link-sm-148">Building Security into &quot;Off-the-Shelf&quot; Smartphones</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-148">2/01/2012</strong> <br/> Status: <span id="pub-status-sm-148">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-148"> <span id="download-value-148-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1109/MC.2012.44">Journal Article (DOI)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-148"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-148"> 2/01/2012 </td> </tr> <tr id="result-149"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-149">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-149"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2012/families-of-elliptic-curves-with-rational-3-torsion" id="pub-title-link-149">Families of Elliptic Curves with Rational 3-torsion</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-149">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2012/families-of-elliptic-curves-with-rational-3-torsion" class="mobile-pub-title" id="pub-title-link-sm-149">Families of Elliptic Curves with Rational 3-torsion</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-149">1/30/2012</strong> <br/> Status: <span id="pub-status-sm-149">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-149"> <span id="download-value-149-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1515/jmc-2011-0013">Journal Article (DOI)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-149"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-149"> 1/30/2012 </td> </tr> <tr id="result-150"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-150">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-150"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2011/role-engineering-methods-and-standards" id="pub-title-link-150">Role Engineering: Methods and Standards</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-150">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2011/role-engineering-methods-and-standards" class="mobile-pub-title" id="pub-title-link-sm-150">Role Engineering: Methods and Standards</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-150">12/08/2011</strong> <br/> Status: <span id="pub-status-sm-150">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-150"> <span id="download-value-150-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1109/MITP.2011.105">Journal Article (DOI)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-150"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-150"> 12/08/2011 </td> </tr> <tr id="result-151"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-151">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-151"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2011/mobile-app-addiction-threat-to-security" id="pub-title-link-151">Mobile-App Addiction: Threat to Security?</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-151">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2011/mobile-app-addiction-threat-to-security" class="mobile-pub-title" id="pub-title-link-sm-151">Mobile-App Addiction: Threat to Security?</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-151">12/08/2011</strong> <br/> Status: <span id="pub-status-sm-151">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-151"> <span id="download-value-151-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1109/MITP.2011.104">Journal Article (DOI)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-151"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-151"> 12/08/2011 </td> </tr> <tr id="result-152"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-152">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-152"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2011/mean-value-formulas-for-twisted-edwards-curves" id="pub-title-link-152">Mean Value Formulas for Twisted Edwards Curves</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-152">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2011/mean-value-formulas-for-twisted-edwards-curves" class="mobile-pub-title" id="pub-title-link-sm-152">Mean Value Formulas for Twisted Edwards Curves</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-152">11/03/2011</strong> <br/> Status: <span id="pub-status-sm-152">Final</span> </div> <div class="control-value-no-block"> Download: <span id="download-values-152">None available</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-152"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-152"> 11/03/2011 </td> </tr> <tr id="result-153"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-153">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-153"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2011/security-automation" id="pub-title-link-153">Security Automation</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-153">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2011/security-automation" class="mobile-pub-title" id="pub-title-link-sm-153">Security Automation</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-153">10/21/2011</strong> <br/> Status: <span id="pub-status-sm-153">Final</span> </div> <div class="control-value-no-block"> Download: <span id="download-values-153">None available</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-153"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-153"> 10/21/2011 </td> </tr> <tr id="result-154"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-154">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-154"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2011/vetting-mobile-apps" id="pub-title-link-154">Vetting Mobile Apps</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-154">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2011/vetting-mobile-apps" class="mobile-pub-title" id="pub-title-link-sm-154">Vetting Mobile Apps</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-154">7/21/2011</strong> <br/> Status: <span id="pub-status-sm-154">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-154"> <span id="download-value-154-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1109/MITP.2011.73">Journal Article (DOI)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-154"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-154"> 7/21/2011 </td> </tr> <tr id="result-155"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-155">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-155"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2011/encryption-basics" id="pub-title-link-155">Encryption Basics</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-155">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2011/encryption-basics" class="mobile-pub-title" id="pub-title-link-sm-155">Encryption Basics</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-155">5/02/2011</strong> <br/> Status: <span id="pub-status-sm-155">Final</span> </div> <div class="control-value-no-block"> Download: <span id="download-values-155">None available</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-155"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-155"> 5/02/2011 </td> </tr> <tr id="result-156"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-156">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-156"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2011/a-survey-of-binary-covering-arrays" id="pub-title-link-156">A Survey of Binary Covering Arrays</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-156">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2011/a-survey-of-binary-covering-arrays" class="mobile-pub-title" id="pub-title-link-sm-156">A Survey of Binary Covering Arrays</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-156">4/07/2011</strong> <br/> Status: <span id="pub-status-sm-156">Final</span> </div> <div class="control-value-no-block"> Download: <span id="download-values-156">None available</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-156"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-156"> 4/07/2011 </td> </tr> <tr id="result-157"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-157">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-157"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2011/research-directions-in-security-metrics" id="pub-title-link-157">Research Directions in Security Metrics</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-157">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2011/research-directions-in-security-metrics" class="mobile-pub-title" id="pub-title-link-sm-157">Research Directions in Security Metrics</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-157">4/04/2011</strong> <br/> Status: <span id="pub-status-sm-157">Final</span> </div> <div class="control-value-no-block"> Download: <span id="download-values-157">None available</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-157"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-157"> 4/04/2011 </td> </tr> <tr id="result-158"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-158">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-158"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2011/the-policy-machine-a-novel-architecture-and-framework-for-acces" id="pub-title-link-158">The Policy Machine: a Novel Architecture and Framework for Access Control Policy Specification and Enforcement</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-158">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2011/the-policy-machine-a-novel-architecture-and-framework-for-acces" class="mobile-pub-title" id="pub-title-link-sm-158">The Policy Machine: a Novel Architecture and Framework for Access Control Policy Specification and Enforcement</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-158">4/01/2011</strong> <br/> Status: <span id="pub-status-sm-158">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-158"> <span id="download-value-158-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1016/j.sysarc.2010.04.005">Journal Article (DOI)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-158"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-158"> 4/01/2011 </td> </tr> <tr id="result-159"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-159">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-159"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2011/thoughts-on-higher-education-and-scientific-research" id="pub-title-link-159">Thoughts on Higher Education and Scientific Research</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-159">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2011/thoughts-on-higher-education-and-scientific-research" class="mobile-pub-title" id="pub-title-link-sm-159">Thoughts on Higher Education and Scientific Research</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-159">3/22/2011</strong> <br/> Status: <span id="pub-status-sm-159">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-159"> <span id="download-value-159-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1109/MITP.2011.34">Journal Article (DOI)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-159"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-159"> 3/22/2011 </td> </tr> <tr id="result-160"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-160">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-160"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2011/model-checking-for-verification-of-mandatory-access-control-mode" id="pub-title-link-160">Model Checking for Verification of Mandatory Access Control Models and Properties</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-160">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2011/model-checking-for-verification-of-mandatory-access-control-mode" class="mobile-pub-title" id="pub-title-link-sm-160">Model Checking for Verification of Mandatory Access Control Models and Properties</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-160">2/28/2011</strong> <br/> Status: <span id="pub-status-sm-160">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-160"> <span id="download-value-160-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1142/S021819401100513X">Journal Article (DOI)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-160"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-160"> 2/28/2011 </td> </tr> <tr id="result-161"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-161">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-161"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2011/who-is-who?-biometrics-provides-answers-for-public-and-private-s" id="pub-title-link-161">Who is Who? Biometrics provides answers for public and private sectors</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-161">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2011/who-is-who?-biometrics-provides-answers-for-public-and-private-s" class="mobile-pub-title" id="pub-title-link-sm-161">Who is Who? Biometrics provides answers for public and private sectors</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-161">2/10/2011</strong> <br/> Status: <span id="pub-status-sm-161">Final</span> </div> <div class="control-value-no-block"> Download: <span id="download-values-161">None available</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-161"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-161"> 2/10/2011 </td> </tr> <tr id="result-162"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-162">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-162"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2011/arithmetic-progressions-on-edwards-curves" id="pub-title-link-162">Arithmetic Progressions on Edwards Curves</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-162">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2011/arithmetic-progressions-on-edwards-curves" class="mobile-pub-title" id="pub-title-link-sm-162">Arithmetic Progressions on Edwards Curves</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-162">2/08/2011</strong> <br/> Status: <span id="pub-status-sm-162">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-162"> <span id="download-value-162-0"> <a href="https://web.archive.org/web/20230128001838/https://cs.uwaterloo.ca/journals/JIS/VOL14/Moody/moody2.html">Article</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-162"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-162"> 2/08/2011 </td> </tr> <tr id="result-163"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-163">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-163"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2011/managing-security-using-the-security-content-automation-protocol" id="pub-title-link-163">Managing Security Using the Security Content Automation Protocol</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-163">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2011/managing-security-using-the-security-content-automation-protocol" class="mobile-pub-title" id="pub-title-link-sm-163">Managing Security Using the Security Content Automation Protocol</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-163">2/04/2011</strong> <br/> Status: <span id="pub-status-sm-163">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-163"> <span id="download-value-163-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1109/MITP.2011.11">Journal Article (DOI)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-163"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-163"> 2/04/2011 </td> </tr> <tr id="result-164"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-164">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-164"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2010/advanced-combinatorial-test-methods-for-system-reliability" id="pub-title-link-164">Advanced Combinatorial Test Methods for System Reliability</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-164">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2010/advanced-combinatorial-test-methods-for-system-reliability" class="mobile-pub-title" id="pub-title-link-sm-164">Advanced Combinatorial Test Methods for System Reliability</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-164">12/31/2010</strong> <br/> Status: <span id="pub-status-sm-164">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-164"> <span id="download-value-164-0"> <a href="https://web.archive.org/web/20230128001838/http://rs.ieee.org/images/files/Publications/2010/2010-16.pdf">Article</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-164"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-164"> 12/31/2010 </td> </tr> <tr id="result-165"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-165">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-165"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2010/mobile-applications-the-fifth-cycle" id="pub-title-link-165">Mobile Applications: the Fifth Cycle</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-165">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2010/mobile-applications-the-fifth-cycle" class="mobile-pub-title" id="pub-title-link-sm-165">Mobile Applications: the Fifth Cycle</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-165">12/13/2010</strong> <br/> Status: <span id="pub-status-sm-165">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-165"> <span id="download-value-165-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1109/MITP.2010.151">Journal Article (DOI)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-165"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-165"> 12/13/2010 </td> </tr> <tr id="result-166"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-166">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-166"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2010/free-and-open-source-software" id="pub-title-link-166">Free and Open Source Software</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-166">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2010/free-and-open-source-software" class="mobile-pub-title" id="pub-title-link-sm-166">Free and Open Source Software</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-166">12/13/2010</strong> <br/> Status: <span id="pub-status-sm-166">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-166"> <span id="download-value-166-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1109/MITP.2010.147">Journal Article (DOI)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-166"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-166"> 12/13/2010 </td> </tr> <tr id="result-167"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-167">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-167"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2010/a-new-analysis-of-the-false-positive-rate-of-a-bloom-filter" id="pub-title-link-167">A New Analysis of the False Positive Rate of a Bloom Filter</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-167">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2010/a-new-analysis-of-the-false-positive-rate-of-a-bloom-filter" class="mobile-pub-title" id="pub-title-link-sm-167">A New Analysis of the False Positive Rate of a Bloom Filter</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-167">10/15/2010</strong> <br/> Status: <span id="pub-status-sm-167">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-167"> <span id="download-value-167-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1016/j.ipl.2010.07.024">Journal Article (DOI)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-167"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-167"> 10/15/2010 </td> </tr> <tr id="result-168"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-168">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-168"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2010/in-trust-we-trust" id="pub-title-link-168">In Trust We Trust</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-168">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2010/in-trust-we-trust" class="mobile-pub-title" id="pub-title-link-sm-168">In Trust We Trust</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-168">10/14/2010</strong> <br/> Status: <span id="pub-status-sm-168">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-168"> <span id="download-value-168-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1109/MC.2010.289">Journal Article (DOI)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-168"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-168"> 10/14/2010 </td> </tr> <tr id="result-169"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-169">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-169"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2010/reliability-of-embedded-and-cyber-physical-systems" id="pub-title-link-169">Reliability of Embedded and Cyber-Physical Systems</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-169">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2010/reliability-of-embedded-and-cyber-physical-systems" class="mobile-pub-title" id="pub-title-link-sm-169">Reliability of Embedded and Cyber-Physical Systems</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-169">10/14/2010</strong> <br/> Status: <span id="pub-status-sm-169">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-169"> <span id="download-value-169-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1109/MSP.2010.152">Journal Article (DOI)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-169"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-169"> 10/14/2010 </td> </tr> <tr id="result-170"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-170">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-170"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2010/ethics-and-the-cloud" id="pub-title-link-170">Ethics and the Cloud</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-170">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2010/ethics-and-the-cloud" class="mobile-pub-title" id="pub-title-link-sm-170">Ethics and the Cloud</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-170">9/30/2010</strong> <br/> Status: <span id="pub-status-sm-170">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-170"> <span id="download-value-170-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1109/MITP.2010.129">Journal Article (DOI)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-170"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-170"> 9/30/2010 </td> </tr> <tr id="result-171"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-171">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-171"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2010/introduction-cybersecurity" id="pub-title-link-171">Introduction: Cybersecurity</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-171">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2010/introduction-cybersecurity" class="mobile-pub-title" id="pub-title-link-sm-171">Introduction: Cybersecurity</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-171">8/31/2010</strong> <br/> Status: <span id="pub-status-sm-171">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-171"> <span id="download-value-171-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1109/MITP.2010.110">Journal Article (DOI)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-171"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-171"> 8/31/2010 </td> </tr> <tr id="result-172"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-172">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-172"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2010/on-feedback-functions-of-maximum-length-nfsrs" id="pub-title-link-172">On Feedback Functions of Maximum Length Nonlinear Feedback Shift Registers</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-172">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2010/on-feedback-functions-of-maximum-length-nfsrs" class="mobile-pub-title" id="pub-title-link-sm-172">On Feedback Functions of Maximum Length Nonlinear Feedback Shift Registers</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-172">8/02/2010</strong> <br/> Status: <span id="pub-status-sm-172">Final</span> </div> <div class="control-value-no-block"> Download: <span id="download-values-172">None available</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-172"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-172"> 8/02/2010 </td> </tr> <tr id="result-173"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-173">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-173"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2010/vulnerability-trends-measuring-progress" id="pub-title-link-173">Vulnerability Trends: Measuring Progress</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-173">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2010/vulnerability-trends-measuring-progress" class="mobile-pub-title" id="pub-title-link-sm-173">Vulnerability Trends: Measuring Progress</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-173">7/19/2010</strong> <br/> Status: <span id="pub-status-sm-173">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-173"> <span id="download-value-173-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1109/MITP.2010.116">Journal Article (DOI)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-173"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-173"> 7/19/2010 </td> </tr> <tr id="result-174"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-174">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-174"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2010/measuring-security-risk-of-networks-using-attack-graphs" id="pub-title-link-174">Measuring Security Risk of Networks Using Attack Graphs</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-174">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2010/measuring-security-risk-of-networks-using-attack-graphs" class="mobile-pub-title" id="pub-title-link-sm-174">Measuring Security Risk of Networks Using Attack Graphs</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-174">7/14/2010</strong> <br/> Status: <span id="pub-status-sm-174">Final</span> </div> <div class="control-value-no-block"> Download: <span id="download-values-174">None available</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-174"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-174"> 7/14/2010 </td> </tr> <tr id="result-175"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-175">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-175"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2010/state-of-security-readiness" id="pub-title-link-175">State of Security Readiness</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-175">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2010/state-of-security-readiness" class="mobile-pub-title" id="pub-title-link-sm-175">State of Security Readiness</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-175">6/10/2010</strong> <br/> Status: <span id="pub-status-sm-175">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-175"> <span id="download-value-175-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1145/1734160.1734168">Journal Article (DOI)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-175"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-175"> 6/10/2010 </td> </tr> <tr id="result-176"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-176">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-176"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2010/adding-attributes-to-role-based-access-control" id="pub-title-link-176">Adding Attributes to Role-Based Access Control</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-176">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2010/adding-attributes-to-role-based-access-control" class="mobile-pub-title" id="pub-title-link-sm-176">Adding Attributes to Role-Based Access Control</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-176">6/01/2010</strong> <br/> Status: <span id="pub-status-sm-176">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-176"> <span id="download-value-176-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1109/MC.2010.155">Journal Article (DOI)</a>; </span> <span id="download-value-176-1"> <a href="/web/20230128001838/https://csrc.nist.gov/CSRC/media/Publications/journal-article/2010/adding-attributes-to-role-based-access-control/documents/kuhn-coyne-weil-10.pdf">Preprint</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-176"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-176"> 6/01/2010 </td> </tr> <tr id="result-177"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-177">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-177"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2010/e-mail-security-an-overview-of-threats-and-safeguards" id="pub-title-link-177">E-mail Security: an Overview of Threats and Safeguards</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-177">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2010/e-mail-security-an-overview-of-threats-and-safeguards" class="mobile-pub-title" id="pub-title-link-sm-177">E-mail Security: an Overview of Threats and Safeguards</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-177">4/01/2010</strong> <br/> Status: <span id="pub-status-sm-177">Final</span> </div> <div class="control-value-no-block"> Download: <span id="download-values-177">None available</span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-177"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-177"> 4/01/2010 </td> </tr> <tr id="result-178"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-178">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-178"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2010/on-hash-functions-using-checksums" id="pub-title-link-178">On hash functions using checksums</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-178">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2010/on-hash-functions-using-checksums" class="mobile-pub-title" id="pub-title-link-sm-178">On hash functions using checksums</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-178">4/01/2010</strong> <br/> Status: <span id="pub-status-sm-178">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-178"> <span id="download-value-178-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1007/s10207-009-0100-7">Journal Article (DOI)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-178"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-178"> 4/01/2010 </td> </tr> <tr id="result-179"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-179">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-179"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2010/data-loss-prevention" id="pub-title-link-179">Data Loss Prevention</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-179">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2010/data-loss-prevention" class="mobile-pub-title" id="pub-title-link-sm-179">Data Loss Prevention</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-179">3/29/2010</strong> <br/> Status: <span id="pub-status-sm-179">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-179"> <span id="download-value-179-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1109/MITP.2010.52">Journal Article (DOI)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-179"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-179"> 3/29/2010 </td> </tr> <tr id="result-180"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-180">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-180"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2009/practical-interdomain-routing-security" id="pub-title-link-180">Practical Interdomain Routing Security</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-180">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2009/practical-interdomain-routing-security" class="mobile-pub-title" id="pub-title-link-sm-180">Practical Interdomain Routing Security</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-180">11/20/2009</strong> <br/> Status: <span id="pub-status-sm-180">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-180"> <span id="download-value-180-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1109/MITP.2009.131">Journal Article (DOI)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-180"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-180"> 11/20/2009 </td> </tr> <tr id="result-181"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-181">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-181"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2009/open-issues-in-secure-dns-deployment" id="pub-title-link-181">Open Issues in Secure DNS Deployment</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-181">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2009/open-issues-in-secure-dns-deployment" class="mobile-pub-title" id="pub-title-link-sm-181">Open Issues in Secure DNS Deployment</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-181">10/06/2009</strong> <br/> Status: <span id="pub-status-sm-181">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-181"> <span id="download-value-181-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1109/MSP.2009.129">Journal Article (DOI)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-181"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-181"> 10/06/2009 </td> </tr> <tr id="result-182"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-182">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-182"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2009/combinatorial-software-testing" id="pub-title-link-182">Combinatorial Software Testing</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-182">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2009/combinatorial-software-testing" class="mobile-pub-title" id="pub-title-link-sm-182">Combinatorial Software Testing</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-182">8/07/2009</strong> <br/> Status: <span id="pub-status-sm-182">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-182"> <span id="download-value-182-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1109/MC.2009.253">Journal Article (DOI)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-182"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-182"> 8/07/2009 </td> </tr> <tr id="result-183"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-183">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-183"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2009/understanding-insecure-it-practical-risk-assessment" id="pub-title-link-183">Understanding Insecure IT: Practical Risk Assessment</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-183">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2009/understanding-insecure-it-practical-risk-assessment" class="mobile-pub-title" id="pub-title-link-sm-183">Understanding Insecure IT: Practical Risk Assessment</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-183">5/27/2009</strong> <br/> Status: <span id="pub-status-sm-183">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-183"> <span id="download-value-183-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1109/MITP.2009.62">Journal Article (DOI)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-183"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-183"> 5/27/2009 </td> </tr> <tr id="result-184"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-184">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-184"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2009/surviving-insecure-it-effective-patch-management" id="pub-title-link-184">Surviving Insecure IT: Effective Patch Management</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-184">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2009/surviving-insecure-it-effective-patch-management" class="mobile-pub-title" id="pub-title-link-sm-184">Surviving Insecure IT: Effective Patch Management</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-184">3/21/2009</strong> <br/> Status: <span id="pub-status-sm-184">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-184"> <span id="download-value-184-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1109/MITP.2009.38">Journal Article (DOI)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-184"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-184"> 3/21/2009 </td> </tr> <tr id="result-185"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-185">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-185"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2009/introducing-&quot;insecure-it&quot;" id="pub-title-link-185">Introducing &quot;Insecure IT&quot;</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-185">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2009/introducing-&quot;insecure-it&quot;" class="mobile-pub-title" id="pub-title-link-sm-185">Introducing &quot;Insecure IT&quot;</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-185">1/20/2009</strong> <br/> Status: <span id="pub-status-sm-185">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-185"> <span id="download-value-185-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1109/MITP.2009.10">Journal Article (DOI)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-185"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-185"> 1/20/2009 </td> </tr> <tr id="result-186"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-186">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-186"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2008/refining-the-in-parameter-order-strategy-for-constructing-coveri" id="pub-title-link-186">Refining the In-Parameter-Order Strategy for Constructing Covering Arrays</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-186">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2008/refining-the-in-parameter-order-strategy-for-constructing-coveri" class="mobile-pub-title" id="pub-title-link-sm-186">Refining the In-Parameter-Order Strategy for Constructing Covering Arrays</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-186">9/01/2008</strong> <br/> Status: <span id="pub-status-sm-186">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-186"> <span id="download-value-186-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.6028/jres.113.022">Journal Article (DOI)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-186"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-186"> 9/01/2008 </td> </tr> <tr id="result-187"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-187">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-187"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2008/automated-combinatorial-test-methods-beyond-pairwise-testing" id="pub-title-link-187">Automated Combinatorial Test Methods Beyond Pairwise Testing</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-187">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2008/automated-combinatorial-test-methods-beyond-pairwise-testing" class="mobile-pub-title" id="pub-title-link-sm-187">Automated Combinatorial Test Methods Beyond Pairwise Testing</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-187">6/02/2008</strong> <br/> Status: <span id="pub-status-sm-187">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-187"> <span id="download-value-187-0"> <a href="https://web.archive.org/web/20230128001838/https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=152162">Article</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-187"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-187"> 6/02/2008 </td> </tr> <tr id="result-188"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-188">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-188"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2008/practical-combinatorial-testing-beyond-pairwise" id="pub-title-link-188">Practical Combinatorial Testing: Beyond Pairwise</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-188">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2008/practical-combinatorial-testing-beyond-pairwise" class="mobile-pub-title" id="pub-title-link-sm-188">Practical Combinatorial Testing: Beyond Pairwise</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-188">6/01/2008</strong> <br/> Status: <span id="pub-status-sm-188">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-188"> <span id="download-value-188-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1109/MITP.2008.54">Journal Article (DOI)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-188"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-188"> 6/01/2008 </td> </tr> <tr id="result-189"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-189">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-189"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2008/internet-protocol-version-6-ipv6" id="pub-title-link-189">Internet Protocol Version 6 (IPv6)</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-189">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2008/internet-protocol-version-6-ipv6" class="mobile-pub-title" id="pub-title-link-sm-189">Internet Protocol Version 6 (IPv6)</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-189">5/30/2008</strong> <br/> Status: <span id="pub-status-sm-189">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-189"> <span id="download-value-189-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1109/MSP.2008.65">Journal Article (DOI)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-189"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-189"> 5/30/2008 </td> </tr> <tr id="result-190"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-190">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-190"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2008/a-new-hash-competition" id="pub-title-link-190">A New Hash Competition</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-190">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2008/a-new-hash-competition" class="mobile-pub-title" id="pub-title-link-sm-190">A New Hash Competition</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-190">5/20/2008</strong> <br/> Status: <span id="pub-status-sm-190">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-190"> <span id="download-value-190-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1109/MSP.2008.55">Journal Article (DOI)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-190"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-190"> 5/20/2008 </td> </tr> <tr id="result-191"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-191">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-191"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2008/tight-bounds-for-mult-complexity-of-symmetric-functions" id="pub-title-link-191">Tight Bounds for the Multiplicative Complexity of Symmetric Functions</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-191">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2008/tight-bounds-for-mult-complexity-of-symmetric-functions" class="mobile-pub-title" id="pub-title-link-sm-191">Tight Bounds for the Multiplicative Complexity of Symmetric Functions</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-191">4/28/2008</strong> <br/> Status: <span id="pub-status-sm-191">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-191"> <span id="download-value-191-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1016/j.tcs.2008.01.030">Journal Article (DOI)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-191"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-191"> 4/28/2008 </td> </tr> <tr id="result-192"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-192">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-192"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2008/implementing-interactive-analysis-of-attack-graphs-using-rdbs" id="pub-title-link-192">Implementing Interactive Analysis of Attack Graphs Using Relational Databases</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-192">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2008/implementing-interactive-analysis-of-attack-graphs-using-rdbs" class="mobile-pub-title" id="pub-title-link-sm-192">Implementing Interactive Analysis of Attack Graphs Using Relational Databases</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-192">4/02/2008</strong> <br/> Status: <span id="pub-status-sm-192">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-192"> <span id="download-value-192-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.3233/JCS-2008-0327">Journal Article (DOI)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-192"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-192"> 4/02/2008 </td> </tr> <tr id="result-193"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-193">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-193"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2008/two-tier-bloom-filter-to-achieve-faster-membership-testing" id="pub-title-link-193">Two-Tier Bloom Filter to Achieve Faster Membership Testing</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-193">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2008/two-tier-bloom-filter-to-achieve-faster-membership-testing" class="mobile-pub-title" id="pub-title-link-sm-193">Two-Tier Bloom Filter to Achieve Faster Membership Testing</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-193">3/27/2008</strong> <br/> Status: <span id="pub-status-sm-193">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-193"> <span id="download-value-193-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1049/el:20080081">Journal Article (DOI)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-193"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-193"> 3/27/2008 </td> </tr> <tr id="result-194"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-194">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-194"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2007/rbac-standard-rationale-comments-on-&quot;a-critique-of-the-ansi-sta" id="pub-title-link-194">RBAC Standard Rationale: Comments on &quot;A Critique of the ANSI Standard on Role Based Access Control&quot;</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-194">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2007/rbac-standard-rationale-comments-on-&quot;a-critique-of-the-ansi-sta" class="mobile-pub-title" id="pub-title-link-sm-194">RBAC Standard Rationale: Comments on &quot;A Critique of the ANSI Standard on Role Based Access Control&quot;</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-194">12/12/2007</strong> <br/> Status: <span id="pub-status-sm-194">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-194"> <span id="download-value-194-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1109/MSP.2007.173">Journal Article (DOI)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-194"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-194"> 12/12/2007 </td> </tr> <tr id="result-195"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-195">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-195"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2007/ipog/ipod-efficient-test-generation-for-multi-way-combinatorial" id="pub-title-link-195">IPOG/IPOD: Efficient Test Generation for Multi-Way Combinatorial Testing</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-195">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2007/ipog/ipod-efficient-test-generation-for-multi-way-combinatorial" class="mobile-pub-title" id="pub-title-link-sm-195">IPOG/IPOD: Efficient Test Generation for Multi-Way Combinatorial Testing</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-195">11/29/2007</strong> <br/> Status: <span id="pub-status-sm-195">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-195"> <span id="download-value-195-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1002/stvr.381">Journal Article (DOI)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-195"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-195"> 11/29/2007 </td> </tr> <tr id="result-196"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-196">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-196"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2004/software-fault-interactions-and-implications-for-software-testin" id="pub-title-link-196">Software Fault Interactions and Implications for Software Testing</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-196">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2004/software-fault-interactions-and-implications-for-software-testin" class="mobile-pub-title" id="pub-title-link-sm-196">Software Fault Interactions and Implications for Software Testing</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-196">6/16/2004</strong> <br/> Status: <span id="pub-status-sm-196">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-196"> <span id="download-value-196-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1109/TSE.2004.24">Journal Article (DOI)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-196"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-196"> 6/16/2004 </td> </tr> <tr id="result-197"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-197">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-197"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2001/failure-modes-in-medical-device-software-an-analysis-of-15-year" id="pub-title-link-197">Failure Modes in Medical Device Software: an Analysis of 15 Years of Recall Data</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-197">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2001/failure-modes-in-medical-device-software-an-analysis-of-15-year" class="mobile-pub-title" id="pub-title-link-sm-197">Failure Modes in Medical Device Software: an Analysis of 15 Years of Recall Data</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-197">12/05/2001</strong> <br/> Status: <span id="pub-status-sm-197">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-197"> <span id="download-value-197-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1142/S021853930100058X">Journal Article (DOI)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-197"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-197"> 12/05/2001 </td> </tr> <tr id="result-198"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-198">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-198"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2001/proposed-nist-standard-for-role-based-access-control" id="pub-title-link-198">Proposed NIST Standard for Role-Based Access Control</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-198">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2001/proposed-nist-standard-for-role-based-access-control" class="mobile-pub-title" id="pub-title-link-sm-198">Proposed NIST Standard for Role-Based Access Control</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-198">8/01/2001</strong> <br/> Status: <span id="pub-status-sm-198">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-198"> <span id="download-value-198-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1145/501978.501980">Journal Article (DOI)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-198"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-198"> 8/01/2001 </td> </tr> <tr id="result-199"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-199">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-199"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2001/report-on-the-development-of-the-aes" id="pub-title-link-199">Report on the Development of the Advanced Encryption Standard (AES)</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-199">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/2001/report-on-the-development-of-the-aes" class="mobile-pub-title" id="pub-title-link-sm-199">Report on the Development of the Advanced Encryption Standard (AES)</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-199">6/01/2001</strong> <br/> Status: <span id="pub-status-sm-199">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-199"> <span id="download-value-199-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.6028/jres.106.023">Journal Article (DOI)</a>; </span> <span id="download-value-199-1"> <a href="https://web.archive.org/web/20230128001838/https://nvlpubs.nist.gov/nistpubs/jres/106/3/j63nec.pdf">Article</a>; </span> <span id="download-value-199-2"> <a href="https://web.archive.org/web/20230128001838/https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4863838/">Article</a>; </span> <span id="download-value-199-3"> <a href="https://web.archive.org/web/20230128001838/https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4863838/?report=reader">Article (PubReader)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-199"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-199"> 6/01/2001 </td> </tr> <tr id="result-200"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-200">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-200"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/1999/first-round-status-report-on-aes-development" id="pub-title-link-200">Status Report on the First Round of the Development of the Advanced Encryption Standard (AES)</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-200">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/1999/first-round-status-report-on-aes-development" class="mobile-pub-title" id="pub-title-link-sm-200">Status Report on the First Round of the Development of the Advanced Encryption Standard (AES)</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-200">10/01/1999</strong> <br/> Status: <span id="pub-status-sm-200">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-200"> <span id="download-value-200-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.6028/jres.104.027">Journal Article (DOI)</a>; </span> <span id="download-value-200-1"> <a href="https://web.archive.org/web/20230128001838/https://nvlpubs.nist.gov/nistpubs/jres/104/5/j45nec.pdf">Article</a>; </span> <span id="download-value-200-2"> <a href="https://web.archive.org/web/20230128001838/https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4878865/">Article</a>; </span> <span id="download-value-200-3"> <a href="https://web.archive.org/web/20230128001838/https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4878865/?report=reader">Article (PubReader)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-200"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-200"> 10/01/1999 </td> </tr> <tr id="result-201"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-201">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-201"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/1999/object-retrieval-and-access-management-in-electronic-commerce" id="pub-title-link-201">Object Retrieval and Access Management in Electronic Commerce</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-201">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/1999/object-retrieval-and-access-management-in-electronic-commerce" class="mobile-pub-title" id="pub-title-link-sm-201">Object Retrieval and Access Management in Electronic Commerce</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-201">9/01/1999</strong> <br/> Status: <span id="pub-status-sm-201">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-201"> <span id="download-value-201-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1109/35.790905">Journal Article (DOI)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-201"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-201"> 9/01/1999 </td> </tr> <tr id="result-202"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-202">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-202"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/1999/a-role-based-access-control-model-and-reference-implementation-w" id="pub-title-link-202">A Role-Based Access Control Model and Reference Implementation Within a Corporate Intranet</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-202">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/1999/a-role-based-access-control-model-and-reference-implementation-w" class="mobile-pub-title" id="pub-title-link-sm-202">A Role-Based Access Control Model and Reference Implementation Within a Corporate Intranet</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-202">2/01/1999</strong> <br/> Status: <span id="pub-status-sm-202">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-202"> <span id="download-value-202-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1145/300830.300834">Journal Article (DOI)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-202"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-202"> 2/01/1999 </td> </tr> <tr id="result-203"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-203">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-203"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/1995/17th-national-computer-security-conference-overview" id="pub-title-link-203">17th National Computer Security Conference Baltimore, MD October 11–14, 1994</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-203">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/1995/17th-national-computer-security-conference-overview" class="mobile-pub-title" id="pub-title-link-sm-203">17th National Computer Security Conference Baltimore, MD October 11–14, 1994</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-203">5/01/1995</strong> <br/> Status: <span id="pub-status-sm-203">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-203"> <span id="download-value-203-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.6028/jres.100.023">Journal Article (DOI)</a>; </span> <span id="download-value-203-1"> <a href="https://web.archive.org/web/20230128001838/https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4887245/?report=reader">Article (PubReader)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-203"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-203"> 5/01/1995 </td> </tr> <tr id="result-204"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-204">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-204"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/1993/privacy--security-of-personal-info-in-a-new-health-care-system" id="pub-title-link-204">Privacy and Security of Personal Information in a New Health Care System</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-204">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/1993/privacy--security-of-personal-info-in-a-new-health-care-system" class="mobile-pub-title" id="pub-title-link-sm-204">Privacy and Security of Personal Information in a New Health Care System</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-204">11/24/1993</strong> <br/> Status: <span id="pub-status-sm-204">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-204"> <span id="download-value-204-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1001/jama.1993.03510200093038">Journal Article (DOI)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-204"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-204"> 11/24/1993 </td> </tr> <tr id="result-205"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-205">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-205"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/1992/a-technique-for-analyzing-the-effects-of-changes-in-formal-specs" id="pub-title-link-205">A Technique for Analyzing the Effects of Changes in Formal Specifications</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-205">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/1992/a-technique-for-analyzing-the-effects-of-changes-in-formal-specs" class="mobile-pub-title" id="pub-title-link-sm-205">A Technique for Analyzing the Effects of Changes in Formal Specifications</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-205">12/01/1992</strong> <br/> Status: <span id="pub-status-sm-205">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-205"> <span id="download-value-205-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1093/comjnl/35.6.574">Journal Article (DOI)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-205"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-205"> 12/01/1992 </td> </tr> <tr id="result-206"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-206">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-206"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/1990/conference-report-12th-ncsc-1989" id="pub-title-link-206">Conference Reports: Twelfth National Computer Security Conference, Baltimore, MD October 10-13, 1989</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-206">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/1990/conference-report-12th-ncsc-1989" class="mobile-pub-title" id="pub-title-link-sm-206">Conference Reports: Twelfth National Computer Security Conference, Baltimore, MD October 10-13, 1989</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-206">3/01/1990</strong> <br/> Status: <span id="pub-status-sm-206">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-206"> <span id="download-value-206-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.6028/jres.095.023">Journal Article (DOI)</a>; </span> <span id="download-value-206-1"> <a href="https://web.archive.org/web/20230128001838/https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4930047/">Article (PubReader)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-206"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-206"> 3/01/1990 </td> </tr> <tr id="result-207"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-207">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-207"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/1989/generating-extended-state-transitions-from-structured-specs" id="pub-title-link-207">Generating Extended State Transitions from Structured Specifications for Process Control Systems</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-207">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/1989/generating-extended-state-transitions-from-structured-specs" class="mobile-pub-title" id="pub-title-link-sm-207">Generating Extended State Transitions from Structured Specifications for Process Control Systems</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-207">9/01/1989</strong> <br/> Status: <span id="pub-status-sm-207">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-207"> <span id="download-value-207-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1049/sej.1989.0038">Journal Article (DOI)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-207"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-207"> 9/01/1989 </td> </tr> <tr id="result-208"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-208">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-208"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/1989/conference-report-11th-ncsc-1988" id="pub-title-link-208">Conference Reports: Eleventh National Computer Security Conference, Baltimore, MD October 17-20, 1988</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-208">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/1989/conference-report-11th-ncsc-1988" class="mobile-pub-title" id="pub-title-link-sm-208">Conference Reports: Eleventh National Computer Security Conference, Baltimore, MD October 17-20, 1988</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-208">7/03/1989</strong> <br/> Status: <span id="pub-status-sm-208">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-208"> <span id="download-value-208-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.6028/jres.094.025">Journal Article (DOI)</a>; </span> <span id="download-value-208-1"> <a href="https://web.archive.org/web/20230128001838/https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4943745/">Article (PubReader)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-208"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-208"> 7/03/1989 </td> </tr> <tr id="result-209"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-209">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-209"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/1988/accuracy-integrity-and-security-in-computerized-vote-tallying" id="pub-title-link-209">Accuracy, Integrity and Security in Computerized Vote-Tallying</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-209">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/1988/accuracy-integrity-and-security-in-computerized-vote-tallying" class="mobile-pub-title" id="pub-title-link-sm-209">Accuracy, Integrity and Security in Computerized Vote-Tallying</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-209">10/01/1988</strong> <br/> Status: <span id="pub-status-sm-209">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-209"> <span id="download-value-209-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1145/63039.63041">Journal Article (DOI)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-209"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-209"> 10/01/1988 </td> </tr> <tr id="result-210"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-210">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-210"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/1988/the-data-encryption-standard-past-and-future" id="pub-title-link-210">The Data Encryption Standard: Past and Future</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-210">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/1988/the-data-encryption-standard-past-and-future" class="mobile-pub-title" id="pub-title-link-sm-210">The Data Encryption Standard: Past and Future</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-210">5/01/1988</strong> <br/> Status: <span id="pub-status-sm-210">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-210"> <span id="download-value-210-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1109/5.4441">Journal Article (DOI)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-210"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-210"> 5/01/1988 </td> </tr> <tr id="result-211"> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-series-211">Journal Article</td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-number-211"> </td> <td> <div class="hidden-sm hidden-xs hidden-xxs"> <strong><a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/1982/reflections-on-ten-years-of-computer-security" id="pub-title-link-211">Reflections on Ten Years of Computer Security</a></strong> </div> <div class="hidden-md hidden-lg"> <strong> <span id="pub-full-display-sm-211">Journal Article </span><br/> <a href="/web/20230128001838/https://csrc.nist.gov/publications/detail/journal-article/1982/reflections-on-ten-years-of-computer-security" class="mobile-pub-title" id="pub-title-link-sm-211">Reflections on Ten Years of Computer Security</a> </strong> </div> <div class="hidden-md hidden-lg"> <strong id="pub-release-date-sm-211">11/01/1982</strong> <br/> Status: <span id="pub-status-sm-211">Final</span> </div> <div class="control-value-no-block"> <span> Download: <span id="download-values-211"> <span id="download-value-211-0"> <a href="https://web.archive.org/web/20230128001838/https://doi.org/10.1016/0167-4048(82)90038-4">Journal Article (DOI)</a> </span> </span> </span> </div> </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-status-211"> Final </td> <td class="hidden-sm hidden-xs hidden-xxs" id="pub-release-date-211"> 11/01/1982 </td> </tr> </tbody> </table> <div class="row bottom-pagination-area"> <p class="text-center"> <span class="pagination-links" id="bottom-pagination-container" data-total-pages="0" data-min-page="1" data-max-page="0" data-current-page="1" data-show-first="False" data-show-last="True"></span> </p> </div> <div> <span class="pull-right"> <a href="/web/20230128001838/https://csrc.nist.gov/publications/search" id="view-all-pubs-link">View All Publications</a> </span> </div> <div id="publications-quicklinks-sm" class="bs-callout bs-callout-subnav hidden-md hidden-lg"> <h4>Current Publications <i class="fa fa-bolt"></i></h4> <ul> <li> <strong> NIST Series Pubs <i class="fa fa-info-circle" aria-hidden="true" data-placement="right" data-html="true" data-tooltip-toggle="tooltipWithFunction" data-title-container="nist-series-pubs-tooltip"></i> </strong> <ul> <li><a href="/web/20230128001838/https://csrc.nist.gov/publications/final-pubs" id="quick-link-final-sm">Final Pubs</a></li> <li><a href="/web/20230128001838/https://csrc.nist.gov/publications/drafts-open-for-comment" id="quick-links-comments-sm">Drafts Open for Comment</a></li> <li><a href="/web/20230128001838/https://csrc.nist.gov/publications/draft-pubs" id="quick-link-draft-sm">All Public Drafts</a></li> <li> <strong> View By Series <i class="fa fa-info-circle" aria-hidden="true" data-placement="right" data-html="true" data-tooltip-toggle="tooltipWithFunction" data-title-container="nist-view-series-pubs-tooltip"></i> </strong> <ul> <li><a href="/web/20230128001838/https://csrc.nist.gov/publications/fips" id="quick-link-fips-sm">FIPS</a></li> <li><a href="/web/20230128001838/https://csrc.nist.gov/publications/sp800" id="quick-link-sp-800-sm">SP 800 series</a></li> <li><a href="/web/20230128001838/https://csrc.nist.gov/publications/sp" id="quick-link-sp-sm">All SP series</a></li> <li><a href="/web/20230128001838/https://csrc.nist.gov/publications/nistir" id="quick-link-nistir-sm">NISTIRs</a></li> <li><a href="/web/20230128001838/https://csrc.nist.gov/publications/itl-bulletin" id="quick-link-itl-bul-sm">ITL Bulletins</a></li> </ul> </li> </ul> </li> <li> <strong> Other Pubs <i class="fa fa-info-circle" aria-hidden="true" data-placement="right" data-html="true" data-tooltip-toggle="tooltipWithFunction" data-title-container="nist-other-pubs-tooltip"></i> </strong> <ul> <li><a href="/web/20230128001838/https://csrc.nist.gov/publications/white-paper" id="quick-link-white-papers-sm">White Papers</a></li> <li><a href="/web/20230128001838/https://csrc.nist.gov/publications/journal-article" id="quick-link-journal-articles-sm">Journal Articles</a></li> <li><a href="/web/20230128001838/https://csrc.nist.gov/publications/conference-paper" id="quick-link-conference-papers-sm">Conference Papers</a></li> <li><a href="/web/20230128001838/https://csrc.nist.gov/publications/book" id="quick-link-books-sm">Books</a></li> </ul> </li> </ul> <span style="display: none;" id="nist-series-pubs-tooltip"> <strong>Final:</strong> <em>Current list of all published NIST cybersecurity documents.</em> Does not include "Withdrawn" documents. Includes FIPS, Special Publications, NISTIRs, ITL Bulletins, and NIST Cybersecurity White Papers.<br/> <br/> <strong>Public Drafts:</strong> <em>Current list of all draft NIST cybersecurity documents--they are typically posted for public comment.</em> "Current" public drafts are the latest draft versions that have not yet been published as "Final." </span> <span style="display: none;" id="nist-view-series-pubs-tooltip"> <strong>FIPS:</strong> <em>Current Federal Information Processing Standard Publications (FIPS).</em> Includes current (Final and Draft) FIPS.<br/> <br/> <strong>SP 800 Series:</strong> <em>Current NIST Special Publication (SP) 800 series publications, which focus on Computer/Information Security.</em> Includes current (Final and Draft) SP 800 pubs.<br/> <br/> <strong>All SP Series:</strong> <em> Current NIST Special Publications (SP), including SP 800 (Computer/Information Security) and SP 1800 (Cybersecurity Practice Guides) pubs. Also includes SP 500 (Computer Systems Technology) pubs related to cybersecurity and privacy. </em> Includes current (Final and Draft) NIST Special Publications.<br/> <br/> <strong>NISTIRs:</strong> <em>Current list of NIST Interagency or Internal Reports (NISTIR) related to cybersecurity and privacy.</em> Includes current (Final and Draft) NISTIRs.<br/> <br/> <strong>ITL Bulletins:</strong> Current list of NIST Information Technology Laboratory (ITL) Bulletins. </span> <span style="display: none;" id="nist-other-pubs-tooltip"> <strong>White Papers:</strong> <em> Consists of NIST Cybersecurity White Papers; NCCoE Project Descriptions, Building Blocks and Use Cases; and other NIST-authored papers that are not part of a formal series. </em> Includes current (Final and Draft) papers.<br/> <br/> <strong>Journal Articles:</strong> NIST-authored articles published in external journals and in the NIST Journal of Research (JRES).<br/> <br/> <strong>Conference Papers:</strong> NIST-authored conference papers related to cybersecurity and privacy.<br/> <br/> <strong>Books:</strong> NIST-authored books, book sections, and encyclopedia entries related to cybersecurity and privacy. </span> </div> </div> </div> </div> <div id="footer-pusher"></div> </div> <footer id="footer"> <div class="container"> <div class="row"> <div class="col-sm-6"> <span class="hidden-xs"> <a href="https://web.archive.org/web/20230128001838/https://www.nist.gov/" title="National Institute of Standards and Technology" rel="home" target="_blank" class="footer-nist-logo" id="footer-nist-logo-link"> <img src="/web/20230128001838im_/https://csrc.nist.gov/CSRC/Media/images/nist-logo-brand-white.svg" alt="National Institute of Standards and Technology logo" id="footer-nist-logo"/> </a> </span> <div class="row footer-contact-container"> <div class="col-sm-12" id="footer-address"> <strong>HEADQUARTERS</strong><br> 100 Bureau Drive<br> Gaithersburg, MD 20899 </div> </div> </div> <div class="col-sm-6"> <ul class="social-list text-right" style="display: block;"> <li class="field-item service-twitter list-horiz"> <a href="https://web.archive.org/web/20230128001838/https://twitter.com/NISTCyber" class="social-btn social-btn--large extlink ext" id="footer-social-twitter-link"> <i class="fa fa-twitter fa-fw"><span class="element-invisible">twitter</span></i><span class="ext"><span class="element-invisible"> (link is external)</span></span> </a> </li> <li class="field-item service-facebook list-horiz"> <a href="https://web.archive.org/web/20230128001838/https://www.facebook.com/NIST" class="social-btn social-btn--large extlink ext" id="footer-social-facebook-link"> <i class="fa fa-facebook fa-fw"><span class="element-invisible">facebook</span></i><span class="ext"><span class="element-invisible"> (link is external)</span></span> </a> </li> <li class="field-item service-linkedin list-horiz"> <a href="https://web.archive.org/web/20230128001838/https://www.linkedin.com/company/nist" class="social-btn social-btn--large extlink ext" id="footer-social-linkedin-link"> <i class="fa fa-linkedin fa-fw"><span class="element-invisible">linkedin</span></i><span class="ext"><span class="element-invisible"> (link is external)</span></span> </a> </li> <li class="field-item service-instagram list-horiz"> <a href="https://web.archive.org/web/20230128001838/https://www.instagram.com/usnistgov/" class="social-btn social-btn--large extlink ext" id="footer-social-instagram-link"> <i class="fa fa-instagram fa-fw"><span class="element-invisible">instagram</span></i> <span class="ext"><span class="element-invisible"> (link is external)</span></span> </a> </li> <li class="field-item service-youtube list-horiz"> <a href="https://web.archive.org/web/20230128001838/https://www.youtube.com/user/USNISTGOV" class="social-btn social-btn--large extlink ext" id="footer-social-youtube-link"> <i class="fa fa-youtube fa-fw"><span class="element-invisible">youtube</span></i><span class="ext"><span class="element-invisible"> (link is external)</span></span> </a> </li> <li class="field-item service-rss list-horiz"> <a href="https://web.archive.org/web/20230128001838/https://www.nist.gov/news-events/nist-rss-feeds" class="social-btn social-btn--large extlink" id="footer-social-rss-link"> <i class="fa fa-rss fa-fw"><span class="element-invisible">rss</span></i> </a> </li> <li class="field-item service-govdelivery list-horiz last"> <a href="https://web.archive.org/web/20230128001838/https://public.govdelivery.com/accounts/USNIST/subscriber/new?qsp=USNIST_3" class="social-btn social-btn--large extlink ext" title="Subscribe to CSRC and publication updates, and other NIST cybersecurity news" id="footer-social-govdelivery-link"> <i class="fa fa-envelope fa-fw"><span class="element-invisible">govdelivery</span></i><span class="ext"><span class="element-invisible"> (link is external)</span></span> </a> </li> </ul> <p class="text-right"> Want updates about CSRC and our publications? <a href="https://web.archive.org/web/20230128001838/https://public.govdelivery.com/accounts/USNIST/subscriber/new?qsp=USNIST_3" class="btn btn-lg btn-info" style="background-color: #12659c!important; border-color: #12659c!important;" id="footer-subscribe-link">Subscribe</a> </p> </div> </div> <div class="row hidden-sm hidden-md hidden-lg"> <div class="col-sm-12"> <a href="https://web.archive.org/web/20230128001838/https://www.nist.gov/" title="National Institute of Standards and Technology" rel="home" target="_blank" class="footer-nist-logo" id="footer-bottom-nist-logo-link"> <img src="/web/20230128001838im_/https://csrc.nist.gov/CSRC/Media/images/logo_rev.png" alt="National Institute of Standards and Technology logo" id="footer-bottom-nist-logo"/> </a> </div> </div> <div class="row"> <div class="col-sm-6"> <p> <a href="/web/20230128001838/https://csrc.nist.gov/about/contact" id="footer-contact-us-link">Contact Us</a> | <a href="https://web.archive.org/web/20230128001838/https://www.nist.gov/about-nist/our-organization" style="display: inline-block;" id="footer-org-link">Our Other Offices</a> </p> </div> <div class="col-sm-6"> <span class="pull-right text-right"> Send inquiries to <a href="https://web.archive.org/web/20230128001838/mailto:csrc-inquiry@nist.gov?subject=CSRC Inquiry" style="display: inline-block;" id="footer-inquiries-link">csrc-inquiry@nist.gov</a> </span> </div> </div> <div class="row"> <div class="footer-bottom-links-container" id="footer-bottom-links-container"> <ul> <li><a href="https://web.archive.org/web/20230128001838/https://www.nist.gov/privacy-policy">Site Privacy</a></li> <li><a href="https://web.archive.org/web/20230128001838/https://www.nist.gov/oism/accessibility">Accessibility</a></li> <li><a href="https://web.archive.org/web/20230128001838/https://www.nist.gov/privacy">Privacy Program</a></li> <li><a href="https://web.archive.org/web/20230128001838/https://www.nist.gov/oism/copyrights">Copyrights</a></li> <li><a href="https://web.archive.org/web/20230128001838/https://www.commerce.gov/vulnerability-disclosure-policy">Vulnerability Disclosure</a></li> <li><a href="https://web.archive.org/web/20230128001838/https://www.nist.gov/no-fear-act-policy">No Fear Act Policy</a></li> <li><a href="https://web.archive.org/web/20230128001838/https://www.nist.gov/foia">FOIA</a></li> <li><a href="https://web.archive.org/web/20230128001838/https://www.nist.gov/environmental-policy-statement">Environmental Policy</a></li> <li><a href="https://web.archive.org/web/20230128001838/https://www.nist.gov/summary-report-scientific-integrity">Scientific Integrity</a></li> <li><a href="https://web.archive.org/web/20230128001838/https://www.nist.gov/nist-information-quality-standards">Information Quality Standards</a></li> <li><a href="https://web.archive.org/web/20230128001838/https://www.commerce.gov/">Commerce.gov</a></li> <li><a href="https://web.archive.org/web/20230128001838/https://www.science.gov/">Science.gov</a></li> <li><a href="https://web.archive.org/web/20230128001838/https://www.usa.gov/">USA.gov</a></li> <li><a href="https://web.archive.org/web/20230128001838/https://vote.gov/">Vote.gov</a></li> </ul> </div> </div> </div> </footer> <script type="text/javascript" src="/web/20230128001838js_/https://csrc.nist.gov/dist/js/quick-collapse.js"></script> <script type="text/javascript" src="/web/20230128001838js_/https://csrc.nist.gov/dist/app.bundle.js"></script> <!-- reCAPTCHA v3 --> <script defer src="https://web.archive.org/web/20230128001838js_/https://www.google.com/recaptcha/api.js?render=6LcQo40UAAAAAJpAj4X-i-WfOzdbu6d7j7kKryDS"></script> </body> </html> <!-- FILE ARCHIVED ON 00:18:38 Jan 28, 2023 AND RETRIEVED FROM THE INTERNET ARCHIVE ON 07:53:35 Nov 24, 2024. JAVASCRIPT APPENDED BY WAYBACK MACHINE, COPYRIGHT INTERNET ARCHIVE. ALL OTHER CONTENT MAY ALSO BE PROTECTED BY COPYRIGHT (17 U.S.C. SECTION 108(a)(3)). --> <!-- playback timings (ms): captures_list: 1.122 exclusion.robots: 0.053 exclusion.robots.policy: 0.031 esindex: 0.018 cdx.remote: 6.581 LoadShardBlock: 80.979 (3) PetaboxLoader3.datanode: 69.305 (4) PetaboxLoader3.resolve: 118.934 (2) load_resource: 142.12 -->

Pages: 1 2 3 4 5 6 7 8 9 10