8 results
Skip to content
Toggle navigation
VuFind
Keyword
-- Title
-- Author
-- Subject
-- Call Number
-- ISBN/ISSN
-- OCLC Number
Title A-Z
Author A-Z
Subject A-Z
Call Number A-Z
Prospector
Find
Advanced
0
items
(Full)
Your Account
Log Out
Login
Language
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Keyword
-- Title
-- Author
-- Subject
-- Call Number
-- ISBN/ISSN
-- OCLC Number
Title A-Z
Author A-Z
Subject A-Z
Call Number A-Z
Prospector
Find
Advanced
Author
Burr, William E.
Showing
1
-
8
of
8
for search:
'Burr, William E.'
, query time: 0.05s
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
Select Page | with selected:
1
Planning for the fiber distributed data interface (FDDI)
by
Burr
,
William
E
.
Published: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1993
Description: v, 102 pages : illustrations ; 28 cm.
Located:
Loading...
Call Number:
Loading...
Microfilm
Loading...
Place Hold
Save to List
Saved in:
2
Electronic authentication guideline recommendations of the National Institute of Standards and Technology
Version 1.0.2.
by
Burr
,
William
E
.
Published: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 2006
Description: x, 54 pages : digital, PDF file.
Located:
Loading...
Call Number:
Loading...
Get full text
Electronic
Save to List
Saved in:
3
Electronic authentication guideline : recommendations of the National Institute of Standards and Technology
Draft.
by
Burr
,
William
E
.
Published: U.S. Dept. of Commerce, National Institute of Standards and Technology, 2008
Description: 1 online resource (xi, 97 pages) : color illustrations.
Located:
Loading...
Call Number:
Loading...
Get full text
Get full text
eBook
Save to List
Saved in:
4
Security in ISDN
by
Burr
,
William
E
.
Published: U.S. Dept. of Commerce, National Institute of Standards and Technology ; For sale by the Supt. of Docs., U.S. G.P.O., 1991
Description: iv, 70 pages : illustrations ; 28 cm.
Located:
Loading...
Call Number:
Loading...
Microfilm
Loading...
Place Hold
Save to List
Saved in:
5
Minimum interoperability specification for PKI components (MISPC)
Version 1.
Published: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1998
Description: 1 volume (various pagings) ; 28 cm.
Located:
Loading...
Call Number:
Loading...
Get full text
Microfilm
Place Hold
Save to List
Saved in:
6
Cryptographic algorithms and key sizes for personal identity verification
by
Polk, Tim, 1962-
Published: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 2005
Description: 103 unnumbered pages : digital, PDF file.
Located:
Loading...
Call Number:
Loading...
Get full text
Electronic
Save to List
Saved in:
7
Cryptographic algorithms and key sizes for Personal Identity Verification
Draft.
by
Polk, Tim, 1962-
Published: U.S. Dept. of Commerce, National Institute of Standards and Technology, 2006
Description: v, 17 pages : digital, PDF file.
Located:
Loading...
Call Number:
Loading...
Get full text
Electronic
Save to List
Saved in:
8
NIST Workshop on the Computer Interface to Flat Panel Displays January 13-14, 1994; San Jose Hilton and Towers; San Jose, California
Published: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology ; For sale by the Supt. of Docs., U.S. G.P.O., 1994
Description: v, 18 pages, 206 unnumbered pages : illustrations.
Located:
Loading...
Call Number:
Loading...
Microfilm
Loading...
Place Hold
Save to List
Saved in:
Select Page | with selected:
In Prospector
Request items from other Prospector libraries to be delivered to your local library for pickup.
Search Tools:
Get RSS Feed
—
Email this Search
—
Save Search
Related Subjects
Computer security Standards
Data encryption (Computer science)
Electronic commerce Security measures Standards
Electronic data interchange
Public key infrastructure (Computer security)
Biometric identification
Computer interfaces Standards
Computer networks Security measures
Computer security
Cryptography
Fiber Distributed Data Interface (Computer network standard)
Information display systems
Integrated services digital networks Security measures
Internetworking (Telecommunication)
Local area networks (Computer networks) Planning
×
Loading...