You are viewing this page in an unauthorized frame window.
This is a potential security issue, you are being redirected to https://csrc.nist.rip
An unofficial archive of your favorite United States government website
Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.
We are building a provable archive!
A lock () or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)
(All presentations in .pdf format.) Federal Register Notice Announcing Meeting Minutes The Way Ahead for the Common Criteria - A Discussion Panel ICCC5 Berlin Stuart Katzke, National Institute of Standards and Technology...
Presentations Introduction to Industry Day Workshop for FIPS 201 Personal Identity Verification For Federal Employees and Contractors Presentation on Special Publication 800-73 (SP 800-73), Integrated Circuit Card for...
Purpose To evaluate current personal identity verification technologies, systems, components, techniques, and procedures that would satisfy requirements for identifying Federal employees and contractors seeking access to...
Purpose To discuss federal requirements for a Personal Identity Verification (PIV) standard. Topics PIV credentials, cards, systems. Presentations Personal Identity Verification For Federal Employees and Contractors...
(All presentations in .pdf format.) Federal Register Notice Announcing Meeting Minutes Possible Government-Wide Information Security Enhancements Some Informal and Unofficial Thoughts Bruce Brody, ISPAB Board Member...
The Cryptographic Module Validation Program Symposium 2004 will be held on September 14-15, 2004 at the DoubleTree Hotel & Executive Meeting Center in Rockville, MD. NIST and the Communications Security Establishment (CSE)...
NIST held a Random Number Generation Workshop from July 19-22, 2004 in Gaithersburg, Maryland. See below for the workshop agenda and selected presentations. Workshop Agenda Comments Received on Draft ANS X9.82 Random Number...
(All presentations in .pdf format.) Federal Register Notice Announcing Meeting Minutes NIST Special Publication 800-53, Recommended Security Controls for Federal Information Systems Ron Ross, Computer Security...
(All presentations in .pdf format.) Federal Register Notice Announcing Meeting Minutes NIAP Review Briefing Dr. Gregory N. Larsen, IDA Comments on the First Privacy Trust Survey of the U.S. Government Dr. Larry...
Knowledge based authentication (KBA) offers several advantages to traditional (conventional) forms of e-authentication like passwords, PKI and biometrics. KBA is a particularly useful tool to remotely authenticate individuals...
* "Relevance" merely indicates the search engine's score for a document. It is based on the search parameters and information in the document's detailed record.