Date Updated: 2025-07-22
CURRENT DRAFTS
[1]
Dworkin M (2025) Recommendation for Block Cipher Modes of Operation: Methods for Format-Preserving Encryption. (National Institute of Standards and Technology, Gaithersburg, MD). https://doi.org/10.6028/nist.sp.800-38gr1.2pd
[2]
Alagic G (2025) Recommendations for Key-Encapsulation Mechanisms. (National Institute of Standards and Technology, Gaithersburg, MD). https://doi.org/10.6028/nist.sp.800-227.ipd
[3]
Sonmez Turan M (2024) Keyed-Hash Message Authentication Code (HMAC): Specification of HMAC and Recommendations for Message Authentication. (National Institute of Standards and Technology, Gaithersburg, MD). https://doi.org/10.6028/nist.sp.800-224.ipd
[4]
Fisher W (2025) Multi-Factor Authentication for Criminal Justice Information Systems: Implementation Considerations for Protecting Criminal Justice Information. (National Institute of Standards and Technology, Gaithersburg, MD). https://doi.org/10.6028/nist.ir.8523.ipd
[5]
McCarthy J (2024) Cybersecurity for Smart Inverters: Guidelines for Residential and Light Commercial Solar Energy Systems. (National Institute of Standards and Technology, Gaithersburg, MD). https://doi.org/10.6028/nist.ir.8498.ipd
[6]
Galluzzo R (2024) Attribute Validation Services for Identity Management: Architecture, Security, Privacy, and Operational Considerations. (National Institute of Standards and Technology, Gaithersburg, MD). https://doi.org/10.6028/nist.ir.8480.ipd
[7]
Barker E (2024) Bridging the Gap between Standards on Random Number Generation: Comparison of SP 800-90 Series and AIS 20/31. (National Institute of Standards and Technology, Gaithersburg, MD). https://doi.org/10.6028/nist.ir.8446.ipd
[8]
Fagan MJ (2025) Foundational Cybersecurity Activities for IoT Product Manufacturers. (National Institute of Standards and Technology, Gaithersburg, MD). https://doi.org/10.6028/nist.ir.8259r1.ipd
[9]
National Institute of Standards and Technology (2025) REDUCING THE CYBERSECURITY RISKS OF PORTABLE STORAGE MEDIA IN OT ENVIRONMENTS. (National Institute of Standards and Technology, Gaithersburg, MD). https://doi.org/10.6028/nist.sp.1334.ipd
[10]
Bartock M (2025) 5G Network Security Design Principles:Design Principles: Applying 5G Cybersecurity and Privacy Capabilities. (National Institute of Standards and Technology, Gaithersburg, MD). https://doi.org/10.6028/nist.cswp.36e.ipd
[11]
Licata J, McWhite R, Calloway L, Gilbert D (2025) Developing Security, Privacy, and Cybersecurity Supply Chain Risk Management Plans for Systems. (National Institute of Standards and Technology, Gaithersburg, MD). https://doi.org/10.6028/nist.sp.800-18r2.ipd
[12]
Eliot D (2025) Small Business Cybersecurity: Non-Employer Firms. (National Institute of Standards and Technology, Gaithersburg, MD), NIST IR 7621r2 ipd, p NIST IR 7621r2 ipd. https://doi.org/10.6028/NIST.IR.7621r2.ipd
[13]
Rose S (2025) Secure Domain Name System (DNS) Deployment Guide. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-81r3, p NIST SP 800-81r3. https://doi.org/10.6028/NIST.SP.800-81r3.ipd
[14]
Brandão L, Peralta R (2025) NIST First Call for Multi-Party Threshold Schemes. (National Institute of Standards and Technology, Gaithersburg, MD). https://doi.org/10.6028/nist.ir.8214c.2pd
[15]
Michael F (2025) Towards Automating IoT Security: Implementing Trusted Network-Layer Onboarding. (National Institute of Standards and Technology, Gaithersburg, MD). https://doi.org/10.6028/nist.cswp.42.ipd
[16]
National Institute of Standards and Technology (2025) NIST Privacy Framework 1.1. (National Institute of Standards and Technology, Gaithersburg, MD). https://doi.org/10.6028/nist.cswp.40.ipd
[17]
Quinn S (2025) Integrating Cybersecurity and Enterprise Risk Management (ERM). (National Institute of Standards and Technology, Gaithersburg, MD), NIST IR 8286r1 ipd, p NIST IR 8286r1 ipd. https://doi.org/10.6028/NIST.IR.8286r1.ipd
[18]
Lynn J (2025) Cybersecurity Framework Version 2.0 Semiconductor Manufacturing Profile. (National Institute of Standards and Technology, Gaithersburg, MD), NIST IR 8546 ipd, p NIST IR 8546 ipd. https://doi.org/10.6028/NIST.IR.8546.ipd
[19]
Quinn S (2025) Identifying and Estimating Cybersecurity Risk for Enterprise Risk Management. (National Institute of Standards and Technology, Gaithersburg, MD), NIST IR 8286Ar1 ipd, p NIST IR 8286Ar1 ipd. https://doi.org/10.6028/NIST.IR.8286Ar1.ipd
[20]
Quinn S (2025) Staging Cybersecurity Risks for Enterprise Risk Management and Governance Oversight. (National Institute of Standards and Technology, Gaithersburg, MD), NIST IR 8286Cr1 ipd, p NIST IR 8286Cr1 ipd. https://doi.org/10.6028/NIST.IR.8286Cr1.ipd
[21]
Takamura E (2025) Testable Controls and Security Capabilities for Continuous Monitoring: Volume 1 — Overview and Methodology. (National Institute of Standards and Technology, Gaithersburg, MD), NIST IR 8011v1r1 ipd, p NIST IR 8011v1r1 ipd. https://doi.org/10.6028/NIST.IR.8011v1r1.ipd
[22]
Souppaya M (2025) Ransomware Risk Management: A Cybersecurity Framework 2.0 Community Profile. (National Institute of Standards and Technology, Gaithersburg, MD), NIST IR 8374r1 ipd, p NIST IR 8374r1 ipd. https://doi.org/10.6028/NIST.IR.8374r1.ipd
[23]
Bartock M (2025) No SUPI-Based Paging: Applying 5G Cybersecurity and Privacy Capabilities. (National Institute of Standards and Technology, Gaithersburg, MD), NIST CSWP 36D ipd, p NIST CSWP 36D ipd. https://doi.org/10.6028/NIST.CSWP.36D.ipd
[24]
National Institute of Standards and Technology (2025) Managing Misuse Risk for Dual-Use Foundation Models. (National Institute of Standards and Technology, Gaithersburg, MD), NIST AI NIST AI 800-1 2pd, p NIST AI NIST AI 800-1 2pd. https://doi.org/10.6028/NIST.AI.800-1.2pd
[25]
Pulivarti R (2024) Cybersecurity Threat Modeling the Genomic Data Sequencing Workflow: An example threat model implementation for genomic data sequencing and analysis. (National Institute of Standards and Technology, Gaithersburg, MD), NIST CSWP 35 ipd, p NIST CSWP 35 ipd. https://doi.org/10.6028/NIST.CSWP.35.ipd
[26]
Sriram K (2025) Border Gateway Protocol Security and Resilience. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-189r1 ipd, p NIST SP 800-189r1 ipd. https://doi.org/10.6028/NIST.SP.800-189r1.ipd
[27]
Pulivarti R (2024) Genomic Data Cybersecurity and Privacy Frameworks Community Profile. (National Institute of Standards and Technology, Gaithersburg, MD), NIST IR 8467 2pd, p NIST IR 8467 2pd. https://doi.org/10.6028/NIST.IR.8467.2pd
[28]
Ferraiolo H (2024) Guidelines for Personal IdentityVerification (PIV) Federation. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-217 fpd, p NIST SP 800-217 fpd. https://doi.org/10.6028/NIST.SP.800-217.fpd
[29]
Ferraiolo H (2024) Guidelines for Derived Personal IdentityVerification (PIV) Credentials. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-157r1 fpd, p NIST SP 800-157r1 fpd. https://doi.org/10.6028/NIST.SP.800-157r1.fpd
[30]
Ross R (2024) Enhanced Security Requirements for Protecting Controlled Unclassified Information. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-172r3 ipd, p NIST SP 800-172r3 ipd. https://doi.org/10.6028/NIST.SP.800-172r3.ipd
[31]
Regenscheid A (2024) Transition to Post-Quantum Cryptography Standards. (National Institute of Standards and Technology, Gaithersburg, MD), NIST IR 8547 ipd, p NIST IR 8547 ipd. https://doi.org/10.6028/NIST.IR.8547.ipd
[32]
Bartock M (2024) Reallocation of Temporary Identities: Applying 5G Cybersecurity andPrivacy Capabilities. (National Institute of Standards and Technology, Gaithersburg, MD), NIST CSWP 36C ipd, p NIST CSWP 36C ipd. https://doi.org/10.6028/NIST.CSWP.36C.ipd
[33]
Barker E (2024) Transitioning the Use of Cryptographic Algorithms and Key Lengths. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-131Ar3 ipd, p NIST SP 800-131Ar3 ipd. https://doi.org/10.6028/NIST.SP.800-131Ar3.ipd
[34]
Galluzzo R (2023) Implementation Guidance for the VVSG 2.0: Multi-Factor Authentication. (National Institute of Standards and Technology, Gaithersburg, MD), NIST VTS 200-2 ipd, p NIST VTS 200-2 ipd. https://doi.org/10.6028/NIST.VTS.200-2.ipd
[35]
Tang C (2024) Cybersecurity for the Water and Wastewater Sector: Build Architecture: Operational Technology Remote Access. (National Institute of Standards and Technology, Gaithersburg, MD), NIST TN 2283 ipd, p NIST TN 2283 ipd. https://doi.org/10.6028/NIST.TN.2283.ipd
[36]
Scarfone K, Souppaya M (2023) Cybersecurity Log Management Planning Guide. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-92r1 ipd, p NIST SP 800-92r1 ipd. https://doi.org/10.6028/NIST.SP.800-92r1.ipd
[37]
Ferraiolo H, Regenscheid A, Gupta S, Ghadiali N (2023) Guidelines for the Authorization of PIV Card and Derived PIV Credential Issuers. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-79r3 ipd, p NIST SP 800-79r3 ipd. https://doi.org/10.6028/NIST.SP.800-79r3.ipd
[38]
National Institute of Standards and Technology (2024) Guide for Mapping Types of Information and Systems to Security Categories. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-60r2 iwd, p NIST SP 800-60r2 iwd. https://doi.org/10.6028/NIST.SP.800-60r2.iwd
[39]
Schaffer K (2021) CMVP Approved Non-Invasive Attack Mitigation Test Metrics: CMVP Validation Authority Updates to ISO/IEC 24759. (National Institute of Standards and Technology). https://doi.org/10.6028/NIST.SP.800-140Fr1-draft
[40]
Dunaway M (2024) Global Community Technology Challenge (GCTC) Strategic Plan 2024-2026: Smart City Infrastructure Program. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 1900-207 ipd, p NIST SP 1900-207 ipd. https://doi.org/10.6028/NIST.SP.1900-207.ipd
[41]
Pillitteri V (2024) NIST Cybersecurity Framework 2.0: Risk Management Framework. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 1308 ipd, p NIST SP 1308 ipd. https://doi.org/10.6028/NIST.SP.1308.ipd
[42]
Schwartz R, Down L, Jonas A, Tabassi E (2021) A Proposal for Identifying and Managing Bias in Artificial Intelligence. (National Institute of Standards and Technology). https://doi.org/10.6028/NIST.SP.1270-draft
[43]
Falco J, Van Wyk K, Messina E (2018) Proposed Standard Terminology for Robotic Hands and Associated Performance Metrics. https://doi.org/10.6028/NIST.SP.1229-draft
[44]
Falco J, Van Wyk K, Messina E (2018) Performance Metrics and Test Methods for Robotic Hands. https://doi.org/10.6028/NIST.SP.1227-draft
[45]
Newhouse W, Souppaya M, Kent J, Sandlin K, Scarfone K (2023) Data Classification Concepts and Considerations for Improving Data Protection. (National Institute of Standards and Technology, Gaithersburg, MD), NIST IR 8496 ipd, p NIST IR 8496 ipd. https://doi.org/10.6028/NIST.IR.8496.ipd
[46]
LaSalle C, Howell G, Martinez L (2023) Cybersecurity for Research: Findings and Possible Paths Forward. (National Institute of Standards and Technology, Gaithersburg, MD), NIST IR 8481 ipd, p NIST IR 8481 ipd. https://doi.org/10.6028/NIST.IR.8481.ipd
[47]
Pulivarti R (2023) Cybersecurity Framework Profile for Genomic Data. (National Institute of Standards and Technology, Gaithersburg, MD), NIST IR 8467 ipd, p NIST IR 8467 ipd. https://doi.org/10.6028/NIST.IR.8467.ipd
[48]
McCarthy J, Grayson N, Brule J, Cottle T, Dinerman A, Dombrowski J, Long J, Quigg K, Thompson M, Townsend A, Tran H, Urlaub N (2023) Cybersecurity Framework Profile for Electric Vehicle Extreme Fast Charging Infrastructure. (National Institute of Standards and Technology, Gaithersburg, MD), NIST IR 8473 ipd, p NIST IR 8473 ipd. https://doi.org/10.6028/NIST.IR.8473.ipd
[49]
Davidson M (2023) State Machine Replication and Consensus with Byzantine Adversaries. (National Institute of Standards and Technology, Gaithersburg, MD), NIST IR 8460 ipd, p NIST IR 8460 ipd. https://doi.org/10.6028/NIST.IR.8460.ipd
[50]
McCarthy J, Mamula D, Brule J, Meldorf K, Jennings R, Wiltberger J, Thorpe C, Dombrowski J, Lattin O (2023) Cybersecurity Framework Profile for Hybrid Satellite Networks (HSN). (National Institute of Standards and Technology, Gaithersburg, MD), NIST IR 8441 ipd, p NIST IR 8441 ipd. https://doi.org/10.6028/NIST.IR.8441.ipd
[51]
Pulivarti R, Martin N, Byers F, Wagner J, Zook J, Maragh S, Wilson K, Wojtyniak M, Kreider B, France A-M, Edwards S, Morris T, Shelton J, Ross S, Whitlow P (2023) Cybersecurity of Genomic Data. (National Institute of Standards and Technology, Gaithersburg, MD), NIST IR 8432 ipd, p NIST IR 8432 ipd. https://doi.org/10.6028/NIST.IR.8432.ipd
[52]
Grother P (2022) Face Recognition Vendor Test (FRVT) Part 8: Summarizing Demographic Differentials. (National Institute of Standards and Technology, Gaithersburg, MD), NIST IR 8429 ipd, p NIST IR 8429 ipd. https://doi.org/10.6028/NIST.IR.8429.ipd
[53]
Newhouse W, Long J, Weitzel D, Warren J, Thompson M, Yates C, Tran H, Mink A, Herriott A, Cottle T (2022) Cybersecurity Framework Profile for Liquefied Natural Gas. (National Institute of Standards and Technology, Gaithersburg, MD), NIST IR 8406 ipd, p NIST IR 8406 ipd. https://doi.org/10.6028/NIST.IR.8406.ipd
[54]
Barker WC, Scarfone K, Fisher W, Souppaya M (2021) Cybersecurity Framework Profile for Ransomware Risk Management. (National Institute of Standards and Technology). https://doi.org/10.6028/NIST.IR.8374-draft
[55]
Hu VC (2021) Machine Learning for Access Control Policy Verification. https://doi.org/10.6028/NIST.IR.8360-draft
[56]
Lyle JR, Guttman B, Butler JM, Sauerwein K, Reed C, Lloyd CE (2022) Digital Investigation Techniques: A NIST Scientific Foundation Review. https://doi.org/10.6028/NIST.IR.8354-draft
[57]
Butler JM (2022) Bitemark Analysis: A NIST Scientific Foundation Review. (National Institute of Standards and Technology, Gaithersburg, MD), NIST IR 8352-draft, p NIST IR 8352-draft. https://doi.org/10.6028/NIST.IR.8352-draft
[58]
Butler JM (2021) (Draft) DNA Mixture Interpretation: A NIST Scientific Foundation Review. https://doi.org/10.6028/NIST.IR.8351-draft
[59]
Watrobski P, Souppaya M, Klosterman J, Barker W (2022) Methodology for Characterizing Network Behavior of Internet of Things Devices. (National Institute of Standards and Technology). https://doi.org/10.6028/NIST.IR.8349-draft
[60]
Schaffer K (2021) Ontology for Authentication. https://doi.org/10.6028/NIST.IR.8344-draft
[61]
Fisher W (2021) (Draft) Background on Identity Federation Technologies for the Public Safety Community. https://doi.org/10.6028/NIST.IR.8336-draft
[62]
Fisher W (2021) (Draft) Identity as a Service for Public Safety Organizations. https://doi.org/10.6028/NIST.IR.8335-draft
[63]
Fisher W (2021) (Draft) Using Mobile Device Biometrics for Authenticating First Responders. https://doi.org/10.6028/NIST.IR.8334-draft
[64]
Bartock M (2022) Foundational PNT Profile: Applying the Cybersecurity Framework for the Responsible Use of Positioning, Navigation, and Timing (PNT) Services. (National Institute of Standards and Technology, Gaithersburg, MD), NIST IR 8323r1 ipd, p NIST IR 8323r1 ipd. https://doi.org/10.6028/NIST.IR.8323r1.ipd
[65]
Bartock M, Souppaya M, Wheeler J, Knoll T, Ramalingam M, Righi S (2023) Hardware Enabled Security: Hardware-Based Confidential Computing. (National Institute of Standards and Technology, Gaithersburg, MD), NIST IR 8320D ipd, p NIST IR 8320D ipd. https://doi.org/10.6028/NIST.IR.8320D.ipd
[66]
Bartock M (2022) Hardware Enabled Security: Machine Identity Management and Protection. (National Institute of Standards and Technology, Gaithersburg, MD), NIST IR 8320C.ipd, p NIST IR 8320C.ipd. https://doi.org/10.6028/NIST.IR.8320C.ipd
[67]
Bartock M, Souppaya M, Xia H, Yeluri R, Shetty U, Lum B, Sabath M, Singh H, Youssef A, Steinder G, Cao Y, Ramanathan J (2021) Hardware-Enabled Security: Policy-Based Governance in Trusted Container Platforms. (National Institute of Standards and Technology). https://doi.org/10.6028/NIST.IR.8320B-draft
[68]
National Institute of Standards and Technology (2020) Hardware-Enabled Security: Container Platform Security Prototype. https://doi.org/10.6028/NIST.IR.8320A-draft
[69]
Phillips PJ, Hahn CA, Fontana PC, Broniatowski DA, Przybocki MA (2020) Four Principles of Explainable Artificial Intelligence. https://doi.org/10.6028/NIST.IR.8312-draft
[70]
Marron J (2021) Draft Election Infrastructure Profile. https://doi.org/10.6028/NIST.IR.8310-draft
[71]
Fagan M, Yang M, Tan A, Randolph L, Scarfone K (2019) Security Review of Consumer Home 16 Internet of Things (IoT) Products. https://doi.org/10.6028/NIST.IR.8267-draft
[72]
National Institute of Standards and Technology (2020) Foundational Cybersecurity Activities for IoT Device Manufacturers C. https://doi.org/10.6028/NIST.IR.8259C-draft
[73]
Butler JM (2018) NIST Scientific Foundation Reviews. https://doi.org/10.6028/NIST.IR.8225-draft
[74]
Brandao L, Davidson M (2022) Notes on Threshold EdDSA/Schnorr Signatures. (National Institute of Standards and Technology, Gaithersburg, MD), NIST IR 8214B ipd, p NIST IR 8214B ipd. https://doi.org/10.6028/NIST.IR.8214B.ipd
[75]
National Institute of Standards and Technology (2019) Randomness Beacon Format 2.0. https://doi.org/10.6028/NIST.IR.8213-draft
[76]
Fagan M (2024) Product Development Cybersecurity Handbook: Concepts and Considerations for IoT Product Manufacturers. (National Institute of Standards and Technology, Gaithersburg, MD), NIST CSWP 33 ipd, p NIST CSWP 33 ipd. https://doi.org/10.6028/NIST.CSWP.33.ipd
[77]
Pascoe C, Nethery Snyder J, Scarfone K (2024) A Guide to Creating CSF 2.0 Community Profiles. (National Institute of Standards and Technology, Gaithersburg, MD), NIST CSWP 32 ipd, p NIST CSWP 32 ipd. https://doi.org/10.6028/NIST.CSWP.32.ipd
[78]
McCarthy J, Mamula D, Brule J, Meldorf K (2022) Cybersecurity Profile for the Hybrid Satellite Networks (HSN) Cybersecurity DRAFT Annotated Outline. (National Institute of Standards and Technology, Gaithersburg, MD), NIST CSWP 27 ipd, p NIST CSWP 27 ipd. https://doi.org/10.6028/NIST.CSWP.27.ipd
[79]
Kuhn DR, Raunak MS, Kacker RN (2021) Combination Frequency Differencing. https://doi.org/10.6028/NIST.CSWP.22.ipd
[80]
Kuhn DR, Raunak MS, Kacker RN (2021) Combinatorial Coverage Difference Measurement. https://doi.org/10.6028/NIST.CSWP.19.ipd
[81]
Megas KN, Cuthill B, Gupta S (2021) Establishing Confidence in IoT Device Security: How do we get there? https://doi.org/10.6028/NIST.CSWP.18.ipd
[82]
Cawthra J (2020) Securing Data Integrity Against Ransomware Attacks: Using the NIST Cybersecurity Framework and NIST Cybersecurity Practice Guides. https://doi.org/10.6028/NIST.CSWP.17.ipd
[83]
Symington S, Polk W, Souppaya M (2020) Trusted Internet of Things (IoT) Device Network-Layer Onboarding and Lifecycle Management (Draft). https://doi.org/10.6028/NIST.CSWP.16.ipd
[84]
National Institute of Standards and Technology (2023) Building a Metrology Exchange to Innovate in Semiconductors (METIS): A Vision for the CHIPS Metrology Program Data Exchange. (National Institute of Standards and Technology, Gaithersburg, MD), error: NIST CHIPS 1000-2 ipd, p error: NIST CHIPS 1000-2 ipd. https://doi.org/10.6028/NIST.CHIPS.1000-2.ipd
[85]
Bartock M (2024) Using Hardware-Enabled Security to Ensure 5G System Platform Integrity: Applying 5G Cybersecurity and Privacy Capabilities. (National Institute of Standards and Technology, Gaithersburg, MD), NIST CSWP 36B ipd, p NIST CSWP 36B ipd. https://doi.org/10.6028/NIST.CSWP.36B.ipd
[86]
Barker E (2024) Recommendation for Random Bit Generator (RBG) Constructions. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-90C 4pd, p NIST SP 800-90C 4pd. https://doi.org/10.6028/NIST.SP.800-90C.4pd
[87]
Temoshok D (2024) Digital Identity Guidelines: Identity Proofing and Enrollment. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-63A-4 2pd, p NIST SP 800-63A-4 2pd. https://doi.org/10.6028/NIST.SP.800-63A-4.2pd
[88]
McWhite R (2024) NIST Cybersecurity Supply Chain Risk Management: Quick-Start Guide for Due Diligence Assessments. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 1326 ipd, p NIST SP 1326 ipd. https://doi.org/10.6028/NIST.SP.1326.ipd
[89]
Pease M (2024) Supply Chain Traceability: Manufacturing Meta-Framework. (National Institute of Standards and Technology, Gaithersburg, MD), NIST IR 8536 ipd, p NIST IR 8536 ipd. https://doi.org/10.6028/NIST.IR.8536.ipd
[90]
National Institute of Standards and Technology (2024) NIST Privacy Workforce Taxonomy. (National Institute of Standards and Technology, Gaithersburg, MD), NIST CSWP 38 ipd, p NIST CSWP 38 ipd. https://doi.org/10.6028/NIST.CSWP.38.ipd
[91]
Temoshok D (2024) Digital Identity Guidelines. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-63-4 2pd, p NIST SP 800-63-4 2pd. https://doi.org/10.6028/NIST.SP.800-63-4.2pd
[92]
Pulivarti R (2024) Mitigating Cybersecurity Risk in Telehealth Smart Home Integration. (National Institute of Standards and Technology, Gaithersburg, MD), NIST CSWP 34 ipd, p NIST CSWP 34 ipd. https://doi.org/10.6028/NIST.CSWP.34.ipd
[93]
Bartock M (2024) Protecting Subscriber Identifiers with Subscription Concealed Identifier (SUCI): Applying 5G Cybersecurity and Privacy Capabilities. (National Institute of Standards and Technology, Gaithersburg, MD), NIST CSWP 36A ipd, p NIST CSWP 36A ipd. https://doi.org/10.6028/NIST.CSWP.36A.ipd
[94]
Bartock M (2024) Applying 5G Cybersecurity and Privacy Capabilities: Introduction to the White Paper Series. (National Institute of Standards and Technology, Gaithersburg, MD), NIST CSWP 36 ipd, p NIST CSWP 36 ipd. https://doi.org/10.6028/NIST.CSWP.36.ipd
[95]
Temoshok D (2024) Digital Identity Guidelines: Authentication and Authenticator Management. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-63B-4 2pd, p NIST SP 800-63B-4 2pd. https://doi.org/10.6028/NIST.SP.800-63B-4.2pd
[96]
Sonmez Turan M (2024) ASCON Family for Constrained Environments. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-232 ipd, p NIST SP 800-232 ipd. https://doi.org/10.6028/NIST.SP.800-232.ipd
[97]
Celi C (2024) Automation of the NIST Cryptographic Module Validation Program and the NIST. (National Institute of Standards and Technology, Gaithersburg, MD), NIST CSWP 37 ipd, p NIST CSWP 37 ipd. https://doi.org/10.6028/NIST.CSWP.37.ipd
[98]
Guo Y (2024) High-Performance Computing Security Control Overlay. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-234 ipd, p NIST SP 800-234 ipd. https://doi.org/10.6028/NIST.SP.800-234.ipd
[99]
National Institute of Standards and Technology (2024) Managing Misuse Risk for Dual-Use Foundation Models. (National Institute of Standards and Technology, Gaithersburg, MD), NIST AI NIST AI 800-1 ipd, p NIST AI NIST AI 800-1 ipd. https://doi.org/10.6028/NIST.AI.800-1.ipd
[100]
Temoshok D (2024) Digital Identity Guidelines: Federation and Assertions. (National Institute of Standards and Technology, Gaithersburg, MD), NIST SP 800-63C-4 2pd, p NIST SP 800-63C-4 2pd. https://doi.org/10.6028/NIST.SP.800-63C-4.2pd