Refine Results
Displaying 73 - 84 of 404
Notice of Intent
Information technology - Security techniques - ...
This document provides recommendations and checklists which can be used to support the specification and operational testing of cryptographic modules in their operational environment within an organization’s security system...
Notice of Intent
Information technology - Security techniques - ...
This document provides recommendations and checklists which can be used to support the specification and operational testing of cryptographic modules in their operational environment within an organization’s security system...
Notice of Intent
Information Technology - Computer Graphics and...
This part of ISO/IEC 12087 facilitates the interchange of digital images. For this purpose, conceptual, architectural, and functional definitions of the Image Interchange Facility (IPI- IIF) are established. ISO/IEC 12087-3...
Notice of Intent
Information Technology - Computer Graphics and...
Scope This part of ISO/IEC 12087 facilitates the interchange of digital images. For this purpose, conceptual, architectural, and functional definitions of the Image Interchange Facility (IPI- IIF) are established. ISO/IEC...
Notice of Intent
Information Technology - Security Techniques...
This part of ISO/IEC 11770 defines key establishment mechanisms based on weak secrets, i.e., secrets that can be readily memorized by a human, and hence secrets that will be chosen from a relatively small set of possibilities...
Notice of Intent
Information Technology - Computer Graphics and...
This part of ISO/IEC 12087 facilitates the interchange of digital images. For this purpose, conceptual, architectural, and functional definitions of the Image Interchange Facility (IPI-IIF) are established. ISO/IEC 12087-3...
Publications
National Technical Specifications
The Standards Council of Canada (SCC) has released a faster and cost-competitive path to standardization that helps support cutting-edge innovators. The new National Technical Specifications (TS) tool was developed with the...
Notice of Intent
Information Technology - Security Techniques - ...
The scope of this Recommendation International Standard is: a) the definition of guidelines for specifying the abstract syntax of generic and specific Security Information Objects (SIOs) for Access Control; b) the...
Notice of Intent
Information Technology - Security Techniques - ...
The scope of this Recommendation | International Standard is: a) the definition of guidelines for specifying the abstract syntax of generic and specific Security Information Objects (SIOs) for Access Control; b) the...
Notice of Intent
Information Technology - Security Techniques...
1. Scope This part of ISO/IEC 18033 specifies several asymmetric ciphers. These specifications prescribe the functional interfaces and correct methods of use of such ciphers in general, as well as the precise functionality...
Notice of Intent
Information Technology - Security Techniques - ...
This part of ISO/IEC 18033 specifies several asymmetric ciphers. These specifications prescribe the functional interfaces and correct methods of use of such ciphers in general, as well as the precise functionality and cipher...
Notice of Intent
Information technology - Security techniques - ...
This part of ISO/IEC 18033 specifies several asymmetric ciphers. These specifications prescribe the functional interfaces and correct methods of use of such ciphers in general, as well as the precise functionality and cipher...