FIPS PUB 202 - SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions
August 1, 2015 - NIST

INTRODUCTION This Standard specifies a new family of functions that supplement SHA-1 and the SHA-2 family of hash functions specified in FIPS 180-4 [1]. This family, called SHA-3 (Secure Hash Algorithm-3), is based on KECCAK [2]-the algorithm1 that NIST selected as the winner of the public SHA-3...

WIRELESS CONTROL FOUNDATI - Wireless Control Foundation: Continuous and Discrete Control for the Process Industry
January 1, 2015 - ISA

In this book, the authors address the wireless communication concepts and terminology that are needed to apply wireless control in the process industry. The control system interfaces and wireless field devices described in this book are based on wireless standards for industrial settings and can be...

FIPS PUB 201 - Personal Identity Verification (PIV) of Federal Employees and Contractors
August 1, 2013 - NPFC

Homeland Security Presidential Directive-12 [HSPD-12], signed by President George W. Bush on August 27, 2004, established the requirements for a common identification standard for identity credentials issued by Federal departments and agencies to Federal employees and contractors (including...

FIPS PUB 180 - Secure Hash Standard (SHS)
March 1, 2012 - NPFC

This standard specifies hash algorithms that can be used to generate digests of messages. The digests are used to detect whether messages have been changed since the digests were generated.

FIPS PUB 186-3 - Digital Signature Standard (DSS)
June 1, 2009 - NTIS

Introduction This Standard defines methods for digital signature generation that can be used for the protection of binary data (commonly called a message), and for the verification and validation of those digital signatures. Three techniques are approved. (1) The Digital Signature Algorithm (DSA)...

FIPS PUB 198-1 - The Keyed-Hash Message Authentication Code (HMAC)
July 1, 2008 - NTIS

INTRODUCTION Providing a way to check the integrity of information transmitted over or stored in an unreliable medium is a prime necessity in the world of open computing and communications. Mechanisms that provide such integrity checks based on a secret key are usually called message authentication...

ISA WIRL NTWRK IND AUTO - Wireless Networks for Industrial Automation
January 1, 2008 - ISA
A description is not available for this item.
WIT-T:2008 - Welding inspection technology seminar reference text (AWS wit-t)
January 1, 2008 - AWS

In today's world there is increasing emphasis placed on the need for quality, and weld quality is an important part of the overall quality effort. This concern for product quality is due to several factors, including economics, safety, government regulations, global competition, and the use of less...

IEEE WIRELESSMAN - Inside the IEEE 802.16 Standard for Wireless Metropolitan Area Networks
January 1, 2006 - IEEE
A description is not available for this item.