Commit History

Add Recommendation for Cryptographic Key Generation.pdf
5d43409
verified

ethanolivertroy commited on

Add Federal Cybersecurity Role-Based Training Approaches, Successes, and Challenges.pdf
61224ea
verified

ethanolivertroy commited on

Add Protecting Controlled Unclassified Information (CUI)_ NIST Special Publication 800-171, Revision 3. Small Business Primer.pdf
09fd1bb
verified

ethanolivertroy commited on

Add Report on the Design-A-Thon_ Designing Effective and Accessible Approaches for Digital Product Cybersecurity Education and Awareness.pdf
bb5fe28
verified

ethanolivertroy commited on

Add Multi-Factor Authentication for Criminal Justice Information Systems_ Implementation Considerations for Protecting Criminal Justice Information.pdf
1d6abe2
verified

ethanolivertroy commited on

Add Report_ Authentication Diary Study.pdf
3f674b7
verified

ethanolivertroy commited on

Add Sample Statement of Work for Federal Computer Security Services_ For use In-House or Contracting Out.pdf
9241256
verified

ethanolivertroy commited on

Add A Profile for U.S. Federal Cryptographic Key Management Systems (CKMS).pdf
0278c95
verified

ethanolivertroy commited on

Add Trusted Geolocation in the Cloud_ Proof of Concept Implementation.pdf
52a7bc5
verified

ethanolivertroy commited on

Add Annual Report 2018_ NIST_ITL Cybersecurity Program.pdf
c514714
verified

ethanolivertroy commited on

Add Verification and Test Methods for Access Control Policies_Models.pdf
9f66b81
verified

ethanolivertroy commited on

Add Discussion on the Full Entropy Assumption of the SP 800-90 Series.pdf
979a81f
verified

ethanolivertroy commited on

Add Interfaces for Personal Identity Verification_ Part 3 – PIV Client Application Programming Interface.pdf
f19e1b6
verified

ethanolivertroy commited on

Add Summary Report for the Virtual Workshop Addressing Public Comment on NIST Cybersecurity for IoT Guidance.pdf
bc5ceb5
verified

ethanolivertroy commited on

Add Recommendation for Obtaining Assurances for Digital Signature Applications.pdf
f1b5600
verified

ethanolivertroy commited on

Add Recommendations for Discrete Logarithm-based Cryptography_ Elliptic Curve Domain Parameters.pdf
4979339
verified

ethanolivertroy commited on

Add Guide to Information Technology Security Services.pdf
347c8ac
verified

ethanolivertroy commited on

Add Identifying and Estimating Cybersecurity Risk for Enterprise Risk Management.pdf
dce6519
verified

ethanolivertroy commited on

Add metadata with document information
38de876
verified

ethanolivertroy commited on