Home
Recent
Comments
Search
Login
Search
Search:
Stories
Comments
Order By:
Relevance
Newest
Points
22 results for "domain:nist.gov"
2
NIST Researchers Simulate Simple Logic for Nanofluidic Computing
hardware
nist.gov
via
mempko
1 month ago
|
cached
|
no comments
0
3
Security Recommendations for Server-based Hypervisor Platforms (NIST SP 800-125A R1)
pdf
security
virtualization
nvlpubs.nist.gov
via
trn
2 months ago
|
cached
|
no comments
0
1
Proceedings of the 21st NISSC, Early Computer Security Papers (1970-1985)
☶
pdf
historical
security
csrc.nist.gov
via
trn
4 months ago
|
cached
|
no comments
0
2
NIST’s Superconducting Synapse May Be Missing Piece for ‘Artificial Brains’
ai
hardware
nist.gov
via
mempko
7 months ago
|
cached
|
no comments
0
2
‘Quantum Radio’ May Aid Communications and Mapping Indoors, Underground and Underwater
☶
science
nist.gov
via
akpoff
7 months ago
|
cached
|
no comments
0
2
Recommendation for the Entropy Sources Used for Random Bit Generation
crypto
csrc.nist.gov
via
trn
7 months ago
|
cached
|
no comments
0
9
Round 1 Submissions to NIST Post-Quantum Cryptography Project
crypto
csrc.nist.gov
via
dchest
8 months ago
|
cached
|
1 comment
1
17
NIST to include 25519 and 448 in their approved curves
☶
crypto
security
csrc.nist.gov
via
utzig
9 months ago
|
cached
|
1 comment
1
1
NIST SP 800-53, Security and Privacy Controls for Information Systems and Organizations, Draft 5.
☶
pdf
practices
privacy
security
csrc.nist.gov
via
trn
1 year ago
|
cached
|
no comments
0
1
Updated NIST Guidance For Bluetooth Security, July 2017
pdf
practices
security
csrc.nist.gov
via
trn
1 year ago
|
cached
|
no comments
0
2
NIST CSL Bulletin: Guidance on the legality of keystroke monitoring (1993)
historical
law
privacy
security
csrc.nist.gov
via
trn
1 year ago
|
cached
|
no comments
0
1
NIST SP 800-63 Digital Identity Guidelines
security
pages.nist.gov
via
fro
1 year ago
|
cached
|
no comments
0
45
CVE-2016-10229 remote code execution via UDP
linux
security
nvd.nist.gov
via
mulander
1 year ago
|
cached
|
7 comments
7
4
Simultaneous Testing Using Two-layer Covering Arrays
☶
pdf
testing
csrc.nist.gov
via
355E3B
1 year ago
|
cached
|
3 comments
3
3
DRAFT NIST Special Publication 800-63B
☶
practices
security
pages.nist.gov
via
calvin
1 year ago
|
cached
|
no comments
0
11
Dramatically Reducing Software Vulnerabilities
pdf
practices
programming
security
nvlpubs.nist.gov
via
pizzaiolo
1 year ago
|
cached
|
7 comments
7
2
The NIST Definition of Cloud Computing (2011)
pdf
networking
scaling
nvlpubs.nist.gov
via
mjturner
1 year ago
|
cached
|
no comments
0
2
Dramatically Reducing Software Vulnerabilities
☶
pdf
security
csrc.nist.gov
via
puffnfresh
1 year ago
|
cached
|
no comments
0
7
Automatic Combinatorial Testing for Software (ACTS) by NIST
compsci
release
testing
csrc.nist.gov
via
nickpsecurity
2 years ago
|
cached
|
1 comment
1
2
An Evening With Berferd In Which a Cracker is Lured, Endured, and Studied (1992)
pdf
security
csrc.nist.gov
via
pushcx
2 years ago
|
cached
|
no comments
0
Page:
1
2