Refine Results
Displaying 3613 - 3624 of 6496
Notice of Intent
Information technology - User interface component...
This document gives guidance on how to create text alternatives and what information to put in text alternatives. This document applies to all static images that are used in any type of electronic document. It also applies to...
Notice of Intent
Software and systems engineering - Tools and ...
This document, within the context of methods and tools for product line product management: — defines product line-specific processes and their subprocesses for product management of software and systems product lines. Those...
Notice of Intent
Information security management - Guidelines ...
This document provides guidelines when considering purchasing cyber-insurance as a risk treatment option to manage the impact of a cyber-incident within the organization’s information security risk management framework. This...
Notice of Intent
Information technology - Security techniques - ...
This document provides privacy engineering guidelines that are intended to help organizations integrate recent advances in privacy engineering into system life cycle processes. It describes: — the relationship between privacy...
Notice of Intent
Information technology - Lightweight cryptography...
This document specifies MAC algorithms suitable for applications requiring lightweight cryptographic mechanisms. These mechanisms can be used as data integrity mechanisms to verify that data has not been altered in an...
Notice of Intent
Information technology - Conformance test methods...
This document describes methods for determining conformance to the security crypto suite defined in ISO/IEC 29167-22. This document contains conformance tests for all mandatory functions. The conformance parameters are the...
Notice of Intent
Cards and security devices for personal identification...
This document describes the following: — polling for proximity cards or objects (PICCs) entering the field of a proximity coupling device (PCD); — the byte format, the frames and timing used during the initial phase of...
Notice of Intent
IT Security techniques - Entity authentication...
This document specifies entity authentication mechanisms using authenticated encryption algorithms. Four of the mechanisms provide entity authentication between two entities where no trusted third party is involved; two of...
Notice of Intent
Information technology - Media context and control...
The technologies specified in this document are description languages and vocabularies which describe sensorial effects. The adaptation engine is not within the scope of this document (or the ISO/IEC 23005 series). This...
Notice of Intent
Information technology - Programming languages...
1 This document specifies the form and establishes the interpretation of programs written in the C programming language.1) It specifies — the representation of C programs; — the syntax and constraints of the C language; — the...
Notice of Intent
IT Security techniques - Hash-functions - Part...
This document specifies dedicated hash-functions, i.e. specially designed hash-functions. The hash- functions in this document are based on the iterative use of a round-function. Distinct round-functions are specified, giving...
Notice of Intent
IT Security techniques - Key management - Part...
This document defines key establishment mechanisms using symmetric cryptographic techniques. This document addresses three environments for the establishment of keys: Point-to-Point, Key Distribution Centre (KDC), and Key...