"Working with encrypted data without decrypting" We have long known that encryption has some amazing properties. Those of us who don't think in terms of mathematical formulas often think of encryption as "putting a message...
Full Workshop Details The National Institute of Standards and Technology (NIST) hosted a workshop on Cryptography for Emerging Technologies and Applications that is intended to identify the cryptographic requirements for...
To encourage development of test methods, metrics and tools for evaluating the effectiveness of mitigations against non-invasive attacks on cryptographic modules. CALL FOR PAPERS (Submission has been closed. Updated Aug....
(All presentations in .pdf format.) Federal Register Notice Announcing Meeting Minutes NIST Updates Donna Dodson, NIST Cloud Security and Privacy ISIMC Cloud Security Earl Crane, Department of Homeland Security Handout...
The Master of Software Engineering (MSE) Professional program at Carnegie Mellon University and the National Institute of Standards and Technology (NIST) held a free, one day seminar on new, industrial strength techniques for...
The HHS Office for Civil Rights (OCR) enforces the HIPAA Privacy Rule, which protects the privacy of individually identifiable health information; the HIPAA Security Rule, which sets national standards for the security of...
During this two-day workshop, NIST introduced Draft FIPS 201-2 and elicited questions, comments and feedback. Presentations Overview (Goals of the workshop, purpose of the revision, overall revision process, summary of...
WELCOME to FISSEA’s 24th Annual Conference: "Bridging to the Future – Emerging Trends in Cybersecurity" March 15 - 17, 2011 Location: NIST National Institute of Standards and Technology Gaithersburg, Maryland
Federal Computer Security Managers Forum - February 2011
* "Relevance" merely indicates the search engine's score for a document. It is based on the search parameters and information in the document's detailed record.