U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.

Https

We are building a provable archive!
A lock (Dot gov) or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)

Events

Showing 8 matching records.
January 26, 2022 - January 27, 2022
This year’s Multi-Cloud Conference co-hosted by NIST and Tetrate will focus on DevSecOps and ZTA as foundational approaches to development, deployment, and operational phases for achieving high-assurance cloud-native...
January 27, 2021
This 1-day virtual conference will focus on DevSecOps and ZTA as foundational approaches in multi-cloud environments. They facilitate rapid secure application development, promote interoperability, and mitigate threats in a...
December 9, 2020
NIST is hosting a virtual public workshop on the Draft Federal Information Processing Standards (FIPS) 201-3. The purpose of the workshop is to present Draft FIPS 201-3 – focusing specifically on the new/updated features...
October 7, 2020
(Updated: Friday, September 18, 2020): This workshop was rescheduled from August 24 to Wednesday, October 7.    Workshop Objectives The National Institute of Standards and Technology (NIST) will host a virtual workshop on...
October 25, 2017 - October 27, 2017
See the Federal Register Notice from October 3, 2017 for meeting details. Approved Minutes from the October 2017 meeting.
September 1, 2009 - September 3, 2009
NIST and the National Security Agency (NSA) co-hosted the Privilege Management Workshop at NIST in Gaithersburg, Maryland, on September 1-3, 2009. Workshop Results NISTIR 7665, Proceedings of the Privilege Management...
June 3, 2008 - June 4, 2008
This workshop explores innovative and practical applications of pairing-based cryptography. Pairings have been used to create identity-based encryption schemes, but are also a useful tool for solving other cryptographic...
February 9, 2004 - February 10, 2004
Knowledge based authentication (KBA) offers several advantages to traditional (conventional) forms of e-authentication like passwords, PKI and biometrics. KBA is a particularly useful tool to remotely authenticate individuals...