Refine Results
Displaying 6241 - 6252 of 6358
Notice of Intent
Information technology - Programming languages...
1 This document specifies the form and establishes the interpretation of programs expressed in the base Fortran language. The purpose of this document is to promote portability, reliability, maintainability, and efficient...
Notice of Intent
Information technology - Security techniques - ...
This part of ISO/IEC 14888 specifies digital signatures with appendix whose security is based on the difficulty of factoring the modulus in use. For each signature scheme, it specifies: a) the relationships and constraints...
Notice of Intent
Medical suction equipment - Part 3: Suction equipment...
This part of ISO 10079 specifies safety and performance requirements for medical suction equipment powered from a vacuum or positive pressure gas source generating venture suction. It applies to equipment connected to medical...
Notice of Intent
Safety requirements for electrical equipment ...
This clause of Part 1 is applicable except as follows: 1.1 Scope 1.1.1 Equipment included in scope Replacement: Replace the text, except the first paragraph, with the following new text: This part of IEC 61010 applies to...
Notice of Intent
Information technology - Security techniques - ...
This document provides recommendations and checklists which can be used to support the specification and operational testing of cryptographic modules in their operational environment within an organization’s security system...
Information technology - Security techniques - Key management - Part 2: Mechanisms using symmetric techniques
The purpose of key management is to provide procedures for handling cryptographic keying material to be used in symmetric or asymmetric cryptographic algorithms according to the security policy in force. This part of ISO/IEC...
Information technology - Security techniques - Key management - Part 3: Mechanisms using asymmetric techniques
This part of ISO/IEC 11770 defines key management mechanisms based on asymmetric cryptographic techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals. 1) Establish a shared...
Notice of Intent
Information Technology - Metadata Registries (...
1. Scope This part of ISO/IEC 11179 provides instruction for naming and identification of the following administered items: data element c oncept, conceptual domain, data element, and value domain. It describes the parts and...
Notice of Intent
Information Technology - Generic Digital Audio...
This part of ISO/IEC 16500 on .Contours: Technology Domain. describes the system functions and DAVIC tools relevant to the Contours defined in ISO/IEC TR 165001. A goal of this part of ISO/IEC 16500 is to guide implementers...
Notice of Intent
Information Technology - Generic Digital Audio...
This part of ISO/IEC 16500 describes the management architecture and protocol for managing the DAVIC System. The DAVIC system management architecture is the TMN-based (Telecommunication Management Network) architecture...
Notice of Intent
Information Technology - 8-Bit Single-Byte Coded...
This part of ISO/IEC 8859 specifies a set of 191 coded graphic characters identified as Latin alphabet No. 1. This set of coded graphic characters is intended for use in data and text processing applications and also for...
Notice of Intent
Information Technology - 8-Bit Single-Byte Coded...
This part of ISO/IEC 8859 specifies a set of 184 coded graphic characters identified as Latin alphabet No. 3. This set of coded graphic characters is intended for use in data and text processing applications and also for...