Refine Results
Displaying 49 - 60 of 423
Notice of Intent
Information technology - Security techniques - ...
This part of ISO/IEC 13888 specifies mechanisms for the provision of specific, communication related, non-repudiation services using asymmetric cryptographic techniques.
Notice of Intent
Information technology - Security techniques - ...
This part of ISO/IEC 11770 defines key management mechanisms based on asymmetric cryptographic techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals. 1) Establish a shared...
Notice of Intent
Information technology - Security techniques - ...
Scope This part of ISO/IEC 11770 defines key management mechanisms based on asymmetric cryptographic techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals. 1) Establish a shared...
Notice of Intent
Information technology - Security techniques - ...
This part of ISO/IEC 11770 defines key management mechanisms based on asymmetric cryptographic techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals. a) Establish a shared...
Notice of Intent
Information technology - Security techniques - ...
This part of ISO/IEC 11770 defines key management mechanisms based on asymmetric cryptographic techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals. a) Establish a shared...
Notice of Intent
Information security - Non-repudiation - Part...
This document specifies mechanisms for the provision of specific, communication-related, non-repudiation services using asymmetric cryptographic techniques.
Notice of Intent
Information technology - Security techniques - ...
The purpose of key management is to provide procedures for handling cryptographic keying material to be used in symmetric or asymmetric cryptographic algorithms according to the security policy in force. This part of ISO/IEC...
Notice of Intent
Information technology - Security techniques - ...
Scope The purpose of key management is to provide procedures for handling cryptographic keying material to be used in symmetric or asymmetric cryptographic algorithms according to the security policy in force. This part of...
Notice of Intent
Information security - Key management - Part ...
This document defines key management mechanisms based on asymmetric cryptographic techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals. a) Establish a shared secret key for use...
Notice of Intent
Molecular in vitro diagnostic examinations — ...
ISO Number Proposed Adoption ISO ED CSA ED Type Scope 20166-1:2018 Molecular in vitro diagnostic examinations — Specifications for pre-examination processes for formalin-fixed and paraffinembedded (FFPE) tissue — Part 1...
Notice of Intent
Molecular in vitro diagnostic examinations — ...
ISO Number Proposed Adoption ISO ED CSA ED Type Scope 20166-1:2018 Molecular in vitro diagnostic examinations — Specifications for pre-examination processes for formalin-fixed and paraffinembedded (FFPE) tissue — Part 1...
Notice of Intent
Molecular in vitro diagnostic examinations — ...
ISO Number Proposed Adoption ISO ED CSA ED Type Scope 20166-1:2018 Molecular in vitro diagnostic examinations — Specifications for pre-examination processes for formalin-fixed and paraffinembedded (FFPE) tissue — Part 1...