Commit History

Add Guidelines for the Authorization of Personal Identity Verification Card Issuers (PCI) and Derived PIV Credential Issuers (DPCI).pdf
1d5d374
verified

ethanolivertroy commited on

Add Report of the Workshop on Cryptography in Support of Computer Security.pdf
9bbf987
verified

ethanolivertroy commited on

Add Recommendation for the Entropy Sources Used for Random Bit Generation.pdf
1cb52a3
verified

ethanolivertroy commited on

Add Cybersecurity Framework Profile for Liquefied Natural Gas.pdf
a1523a6
verified

ethanolivertroy commited on

Add Assessing Security and Privacy Controls in Information Systems and Organizations.pdf
3d054dc
verified

ethanolivertroy commited on

Add Assessing Federal and Commercial Information Security Needs.pdf
5ba3a88
verified

ethanolivertroy commited on

Add Addressing Visibility Challenges with TLS 1.3 within the Enterprise_ High-Level Document.pdf
9005ac2
verified

ethanolivertroy commited on

Add Computer Security Division 2013 Annual Report.pdf
f896e01
verified

ethanolivertroy commited on

Add NIST Privacy Framework_ A Tool for Improving Privacy Through Enterprise Risk Management, Version 1.0.pdf
3cf2fe5
verified

ethanolivertroy commited on

Add Message Authentication Code (MAC) Validation System_ Requirements and Procedures.pdf
46ae353
verified

ethanolivertroy commited on

Add Taxonomic Rules for Password Policies_ Translating the Informal to the Formal Language.pdf
dda726f
verified

ethanolivertroy commited on

Add Audit and Evaluation of Computer Security.pdf
4365860
verified

ethanolivertroy commited on

Add Performance Assurance and Data Integrity Practices.pdf
35e73ee
verified

ethanolivertroy commited on

Add Securing Telehealth Remote Patient Monitoring Ecosystem.pdf
bfb6c05
verified

ethanolivertroy commited on

Add Strategies for the Integration of Software Supply Chain Security in DevSecOps CI_CD Pipelines.pdf
3945dd4
verified

ethanolivertroy commited on

Add 2016 NIST_ITL Cybersecurity Program Annual Report.pdf
7fa0c19
verified

ethanolivertroy commited on

Add BioCTS 2012_ Advanced Conformance Test Architectures and Test Suites for Biometric Data Interchange Formats and Biometric Information Records.pdf
9c5f195
verified

ethanolivertroy commited on

Add Cryptographic Key Management Issues & Challenges in Cloud Services.pdf
8cb7051
verified

ethanolivertroy commited on

Add NIST Cloud Computing Forensic Science Challenges.pdf
3297098
verified

ethanolivertroy commited on

Add Module-Lattice-Based Key-Encapsulation Mechanism Standard.pdf
8d0732c
verified

ethanolivertroy commited on

Add Guide to Computer Security Log Management.pdf
6e1f3eb
verified

ethanolivertroy commited on

Add Guide to Test, Training, and Exercise Programs for IT Plans and Capabilities.pdf
b0be4b0
verified

ethanolivertroy commited on

Add Case Studies in Cyber Supply Chain Risk Management_ Seagate Technology.pdf
e85f3e7
verified

ethanolivertroy commited on

Add Interagency Report on the Status of International Cybersecurity Standardization for the Internet of Things (IoT).pdf
88c39dd
verified

ethanolivertroy commited on

Add Guide to Integrating Forensic Techniques into Incident Response.pdf
52a7899
verified

ethanolivertroy commited on

Add Measuring the Usability and Security of Permuted Passwords on Mobile Platforms.pdf
823d1b5
verified

ethanolivertroy commited on

Add Guidelines for API Protection for Cloud-Native Systems.pdf
1aa64fd
verified

ethanolivertroy commited on

Add Measuring the Common Vulnerability Scoring System Base Score Equation.pdf
a08138d
verified

ethanolivertroy commited on

Add BIOS Protection Guidelines.pdf
acd89af
verified

ethanolivertroy commited on

Add Fingerprint Identification and Mobile Handheld Devices_ An Overview and Implementation.pdf
b3e7876
verified

ethanolivertroy commited on

Add Trusted Cloud_ Security Practice Guide for VMware Hybrid Cloud Infrastructure as a Service (IaaS) Environments.pdf
3a204fc
verified

ethanolivertroy commited on

Add Case Studies in Cyber Supply Chain Risk Management_ Anonymous Renewable Energy Company.pdf
13fdb87
verified

ethanolivertroy commited on

Add Guide to LTE Security.pdf
d506d4e
verified

ethanolivertroy commited on

Add Manufacturing Profile Implementation Methodology for a Robotic Workcell.pdf
8503d5f
verified

ethanolivertroy commited on

Add Guide to Storage Encryption Technologies for End User Devices.pdf
608546f
verified

ethanolivertroy commited on

Add Bug Framework (BF)_ Formalizing Cybersecurity Weaknesses and Vulnerabilities.pdf
c3f47e0
verified

ethanolivertroy commited on

Add Recommendation for Applications Using Approved Hash Algorithms.pdf
d229fb0
verified

ethanolivertroy commited on

Add A Methodology for Developing Authentication Assurance Level Taxonomy for Smart Card-based Identity Verification.pdf
6c69de2
verified

ethanolivertroy commited on

Add Conformance Test Architecture and Test Suite for ANSI_NIST-ITL 1-2007.pdf
6fa904a
verified

ethanolivertroy commited on

Add NIST Roadmap Toward Criteria for Threshold Schemes for Cryptographic Primitives.pdf
6f42fd0
verified

ethanolivertroy commited on

Add Forensics Web Services (FWS).pdf
afdcc09
verified

ethanolivertroy commited on

Add CMVP Approved Authentication Mechanisms_ CMVP Validation Authority Requirements for ISO_IEC 19790 Annex E and ISO_IEC 24579 Section 6.17.pdf
97223fc
verified

ethanolivertroy commited on

Add PIV Card to Reader Interoperability Guidelines.pdf
46a38bc
verified

ethanolivertroy commited on

Add Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171.pdf
40d417e
verified

ethanolivertroy commited on

Add Symmetric Key Injection onto Smart Cards.pdf
80c1bba
verified

ethanolivertroy commited on

Add Security Guidelines for Storage Infrastructure.pdf
f06f4e7
verified

ethanolivertroy commited on

Add Blockchain Networks_ Token Design and Management Overview.pdf
d387493
verified

ethanolivertroy commited on

Add NIST Workshop on the Requirements for an Accordion Cipher Mode 2024_ Workshop Report.pdf
6cba45f
verified

ethanolivertroy commited on

Add Recommendation for Block Cipher Modes of Operation_ the CMAC Mode for Authentication.pdf
dc923f5
verified

ethanolivertroy commited on

Add Requirements for Cryptographic Accordions.pdf
311082c
verified

ethanolivertroy commited on