Search

Refine Results
Type
Program
Status
Country
Province
City
Accreditation Sub-Programs
Program Specialty Area
GLP Area of Expertise
Field of Testing
Fields of Compliance
Period range

From

To

Displaying 3349 - 3360 of 11332
Notice of Intent

Information technology - Security techniques - ...

This Standard gives guidelines for cryptographic algorithms and security mechanisms conformance testing methods. Conformance testing assures that an implementation of a cryptographic algorithm or security mechanism is correct...
Notice of Intent

Information technology -- Telecommunications ...

Port-based network access control allows a network administrator to restrict the use of IEEE 802 local area network (LAN) service access points (ports) to secure communication between authenticated and authorized devices. ISO...
Notice of Intent

Information technology - Telecommunications and...

This standard defines profiles that select features, options, configurations, defaults, protocols and procedures of bridges, stations and LANs that are necessary to build networks that are capable of transporting time...
Notice of Intent

Information technology - Biometric sample quality...

This Standard, for any or all biometric sample types as necessary, establishes the following: - terms and definitions that are useful in the specification and use of quality metrics; - purpose and interpretation of biometric...
Notice of Intent

Information technology - Security techniques - ...

This Standard defines the requirements for the use of ISO/IEC 27001 in any specific sector (field, application area or market sector). It explains how to include requirements additional to those in ISO/IEC 27001, how to...
Notice of Intent

Identification Cards - Integrated Circuit Cards...

This document specifies interindustry commands that may be used for cryptographic operations. The choice and conditions of use of cryptographic mechanisms may affect card exportability. The evaluation of the suitability of...