Search

Refine Results
Type
Program
Status
Country
Province
City
Accreditation Sub-Programs
Program Specialty Area
GLP Area of Expertise
Field of Testing
Fields of Compliance
Period range

From

To

Displaying 3169 - 3180 of 5829
Notice of Intent

Information technology - Electronic discovery...

This document provides requirements and recommendations on activities in electronic discovery, including, but not limited to, identification, preservation, collection, processing, review, analysis and production of...
Notice of Intent

Information technology - Multimedia application...

This document specifies the CMAF multimedia format, which contains segmented media objects optimized for streaming delivery and decoding on end user devices in adaptive multimedia presentations. CMAF specifies a track format...
Notice of Intent

Information technology — Advanced image coding...

ISO/IEC 29170-2:2015 normalizes evaluation and grading of a light coding system used for displays and display systems, but is independent of the display technology. This procedure measures whether an observer can distinguish...
Notice of Intent

Information technology - IT Enabled Services-...

ISO/IEC 30105-3:2016 specifies the lifecycle process requirements performed by the IT enabled business process outsourcing service provider for the outsourced business processes. It defines the processes to plan, establish...
Notice of Intent

Information technology - Programming languages...

This specification describes the form and establishes the interpretation of programs written in the C# programming language. It describes • The representation of C# programs; • The syntax and constraints of the C# language; •...
Notice of Intent

Information technology - Programming languages...

1 This document specifies the form and establishes the interpretation of programs written in the C programming language.1) It specifies — the representation of C programs; — the syntax and constraints of the C language; — the...
Notice of Intent

IT Security techniques - Hash-functions - Part...

This document specifies dedicated hash-functions, i.e. specially designed hash-functions. The hash- functions in this document are based on the iterative use of a round-function. Distinct round-functions are specified, giving...
Notice of Intent

IT Security techniques - Key management - Part...

This document defines key establishment mechanisms using symmetric cryptographic techniques. This document addresses three environments for the establishment of keys: Point-to-Point, Key Distribution Centre (KDC), and Key...
Notice of Intent

IT Security techniques - Digital signatures with...

This document specifies digital signature mechanisms with appendix whose security is based on the discrete logarithm problem. This document provides — a general description of a digital signature with appendix mechanism, and...
Notice of Intent

IT Security techniques - Entity authentication...

This document specifies entity authentication mechanisms using authenticated encryption algorithms. Four of the mechanisms provide entity authentication between two entities where no trusted third party is involved; two of...