| NIST IR 7219
 | "Computer 
          Security Division - 2004 Annual Report", April 2005
  - pdf 
            file (5,114 KB)- zipped file (4,378 KB)
 
 | 
       
        | NIST IR 7200
 | "Proximity 
          Beacons and Mobile Handheld Devices: Overview and Implementation", June 2005
  - pdf 
            file (734 KB) 
 | 
       
        | NIST IR 7111
 | "Computer 
          Security Division - 2003 Annual Report", April 2004
  - pdf 
            file (4,220 KB) 
 | 
       
        | NIST IR 7100
 | "PDA 
          Forensic Tools:An Overview and Analysis", August 2004
  - pdf 
            file (2,509 KB) 
 | 
       
        | NIST IR 7056
 | "Card 
          Technology Development and Gap Analysis Interagency Report", March 2004
  - pdf 
            file (832 KB) 
 | 
       
        | NIST IR 7046
 | "A Framework 
          for Multi-Mode Authentication: Overview and Implementation Guide", August 2003
  - pdf 
            file (712 KB) 
 | 
       
        | NIST IR 7030
 | "Picture 
          Password: A Visual Login Technique for Mobile Devices", July 2003
  - pdf 
            file (652 KB) 
 | 
       
        | NIST IR 7007
 | "An Overview 
          of Issues in Testing Intrusion Detection Systems", June 2003
  - pdf 
            file (77.5 KB) 
 | 
       
        | NIST IR 6985
 | "COTS 
          Security Protection Profile - Operating Systems (CSPP-OS) (Worked Example 
          Applying Guidance of NISTIR-6462, CSPP)", April 2003
  - pdf 
            file (580 KB)- Word file in Rich Text format (.rtf) 
            (4.84 MB)
 
 | 
       
        | NIST IR 6981
 | "Policy Expression 
          and Enforcement for Handheld Devices",
 April 2003
 - .pdf 
            version (622 KB)
 | 
       
        | NIST IR 6887
 | "Government Smart Card Interoperability 
          Specification (GSC-IS), v2.1", July 2003
 - .pdf version 
            (1.57 MB)
 | 
       
        | NIST IR 6529-A
 
 | Common 
          Biometric Exchange File Format (CBEFF) April 5, 2004
 - 
            .pdf version (228 KB)
 | 
       
        | NIST IR 6483
 | "Randomness Testing of the Advanced Encryption 
          Standard Finalist Candidates1", March 2000
 - MS Word (235 
            KB)- .pdf version (545 KB)
 
 | 
       
        | NIST IR 6462
 | "CSPP - Guidance for COTS 
          Security Protection Profiles", December 1999
 4 different 
            file formats: - Word 
            rich text (.rtf) format (3.96 MB)
 - Adobe 
            Reader (.pdf) (559 KB)
 - zipped 
            .rtf format (271 KB)
 - zipped 
            .pdf format (467 KB)
 
 | 
       
        | NIST IR 6416
 | "Applying Mobile Agents to Intrusion 
          Detection and Response", October 1999
 - .pdf format (141 
            KB)
 | 
       
        | NIST IR 6390
 | "Randomness Testing of the Advanced Encryption 
          Standard Candidate Algorithms", September 1999
 - MS Word (69.0 
            KB)- .pdf version (37.2 KB)
 
 | 
       
        | NIST IR 6068
 | "Report on the TMACH Experiment", July 1997
 No 
            electronic version available.
 | 
       
        | NIST IR 5810
 | "The TMACH Experiment Phase 1 - Preliminary 
          Developmental Evaluation", June 1996
 No 
            electronic version available.
 | 
       
        | NIST IR 5788
 | "Public Key Infrastructure Invitational 
          Workshop September 28, 1995, MITRE Corporation, McLean, Virginia", November 1995
 No 
            electronic version available.
 | 
       
        | NIST IR 5590
 | "Proceedings Report of the International 
          Invitation Workshop on Developmental Assurance", January 1995
 No 
            electronic version available.
 | 
       
        | NIST IR 5540
 | "Multi-Agency Certification and Accreditation 
          (C&A) Process: A Worked Example", December 1994
 No 
            electronic version available.
 | 
       
        | NIST IR 5570
 | "An Assessment of the DOD Goal Security 
          Architecture (DGSA) for Non-Military Use", November 1994
 No 
            electronic version available.
 | 
       
        | NIST IR 5495
 | "Computer Security Training & Awareness 
          Course Compendium", 1994
 - Text File (276 
            KB)
 | 
       
        | NIST IR 5472
 | "A Head Start on Assurance Proceedings 
          of an Invitational Workshop on Information Technology (IT) Assurance 
          and Trustworthiness", March 1994
 - Text File (163 
            KB)
 | 
       
        | NIST IR 5308
 | "General Procedures for Registering 
          Computer Security Objects", December 1993
 - Text File (34 
            KB)
 | 
       
        | NIST IR 5283
 | "Security of SQL-Based Implementations 
          of Product Data Exchange Using Step", October 1993
 No 
            electronic version available.
 | 
       
        | NIST IR 5234
 | "Report of the NIST Workshop on Digital 
          Signature Certificate Management, December 10-11, 1992", August 1993
 No 
            electronic version available.
 | 
       
        | NIST IR 5232
 | "Report of the NSF/NIST Workshop on NSFNET/NREN 
          Security, July 6-7, 1992", May 1993
 No 
            electronic version available.
 | 
       
        | NIST IR 5153
 | "Minimum Security Requirements for Multi-User 
          Operating Systems", March 1993
 - Text File (103 
            KB)
 | 
       
        | NIST IR 4976
 | "Assessing Federal and Commercial Information 
          Security Needs", November 1992
 - Text File (97 
            KB)
 | 
       
        | NIST IR 4939
 | "Threat Assessment 
          of Malicious Code and External Attacks", October 1992
 3 different file formats: - threats/ HTML
 - ir4939.txt (38 KB)
 - ir4939.ps (225 KB)
 
 | 
       
        | NIST IR 4774
 | "A Review of U.S. and European Security 
          Evaluation Criteria", March 1992
 No 
            electronic version available.
 | 
       
        | NIST IR 4734
 | "Foundations of a Security Policy for 
          use of the National Research and Educational Network", February 1992
 .pdf file 
            (1,357 KB)
 | 
       
        | NIST IR 4749
 | "Sample Statements of Work for Federal 
          Computer Security Services: For use In-House or Contracting Out", June 1992
 - Text File (178 
            KB)
 |