Refine Results
Displaying 97 - 108 of 423
Notice of Intent
Information technology — Security techniques — ...
Note: The ICS code of this Notice of Intent (originally published on October 16, 2024) was updated by the responsible SDO on November 5, 2024. This part of ISO/IEC 18370 specifies blind digital signature mechanisms, together...
Notice of Intent
Information technology - Security techniques - ...
This document provides usage examples of ASCs for specific applications. NOTE Herein specified ASCs are provided for explanation purposes only and the audience is encouraged to create their own ASCs to assure the application...
Notice of Intent
Information technology - Security techniques - ...
This part of ISO/IEC 18033 specifies a) output functions to combine a keystream with plaintext, b) keystream generators for producing keystream, and c) object identifiers assigned to dedicated keystream generators in...
Notice of Intent
Information technology - Security techniques - ...
This part of ISO/IEC 18033 specifies block ciphers. A block cipher maps blocks of n bits to blocks of n bits, under the control of a key of k kits. A total of seven different block ciphers are defined. They are categorized in...
Notice of Intent
Information technology - Security techniques - ...
This Standard defines the requirements for the use of ISO/IEC 27001 in any specific sector (field, application area or market sector). It explains how to include requirements additional to those in ISO/IEC 27001, how to...
Notice of Intent
Information technology - Security techniques - ...
This part of ISO/IEC 18014 describes: -a general model for time-stamping services producing linked tokens, -describes the basic components used to construct a time-stamping service producing linked tokens, -defines the data...
Notice of Intent
Information technology - Security techniques - ...
This part of ISO/IEC 18014 describes: a general model for time-stamping services producing linked tokens, describes the basic components used to construct a time-stamping service producing linked tokens, defines the data...
Notice of Intent
Information technology - Security techniques - ...
This Standard gives guidelines for cryptographic algorithms and security mechanisms conformance testing methods. Conformance testing assures that an implementation of a cryptographic algorithm or security mechanism is correct...
Notice of Intent
Information technology - Security techniques...
This Technical Report provides guidance relating to the construction of Protection Profiles (PPs) and Security Targets (STs) that are intended to be compliant with the third edition of ISO/IEC 15408. It is also applicable to...
Notice of Intent
Information technology - Security techniques - ...
Scope This International Standard provides guidelines in addition to guidance given in the ISO/IEC 27000 family of standards for implementing information security management within information sharing communities. This...
Notice of Intent
Information technology - Automatic identification...
This International Standard defines the test equipment and procedures to be used to determine the performance of bar code scanning and decoding equipment. It deals with bar code scanning and decoding equipment both as...
Notice of Intent
Information technology - Security techniques - ...
This part of ISO/IEC 18033 specifies block ciphers. A block cipher maps blocks of n bits to blocks of n bits, under the control of a key of k kits. A total of seven different block ciphers are defined. They are categorized in...