Refine Results
Displaying 8689 - 8700 of 8894
Notice of Intent
Information technology — Security techniques — ...
Note: The ICS code of this Notice of Intent (originally published on October 16, 2024) was updated by the responsible SDO on November 5, 2024. This part of ISO/IEC 20009 specifies anonymous entity authentication mechanisms...
Notice of Intent
Information technology — Conformance testing ...
This part of ISO/IEC 29109 specifies elements of conformance testing methodology, test assertions, and test procedures as applicable to ISO/IEC 19794-7. ISO/IEC 19794-7 defines two data interchange formats for signature/sign...
Notice of Intent
Information technology — Conformance testing ...
Note: The ICS code of this Notice of Intent (originally published on October 16, 2024) was updated by the responsible SDO on November 5, 2024. This part of ISO/IEC 29109 specifies elements of conformance testing methodology...
Notice of Intent
Information technology — Conformance testing ...
Note: The ICS code of this Notice of Intent (originally published on October 16, 2024) was updated by the responsible SDO on November 5, 2024. This part of ISO/IEC 29109 specifies elements of conformance testing methodology...
Notice of Intent
Information technology — Conformance testing ...
Note: The ICS code of this Notice of Intent (originally published on October 16, 2024) was updated by the responsible SDO on November 5, 2024. This part of ISO/IEC 29109 specifies elements of conformance testing methodology...
Notice of Intent
Information technology — Security techniques — ...
Note: The ICS code of this Notice of Intent (originally published on October 16, 2024) was updated by the responsible SDO on November 5, 2024. This part of ISO/IEC 18370 specifies blind digital signature mechanisms, together...
Notice of Intent
Information technology — Conformance testing ...
Note: The ICS code of this Notice of Intent (originally published on October 16, 2024) was updated by the responsible SDO on November 5, 2024. This part of ISO/IEC 29109 specifies elements of conformance testing methodology...
Information technology - Security techniques - Key management - Part 2: Mechanisms using symmetric techniques
The purpose of key management is to provide procedures for handling cryptographic keying material to be used in symmetric or asymmetric cryptographic algorithms according to the security policy in force. This part of ISO/IEC...
Information technology - Security techniques - Key management - Part 3: Mechanisms using asymmetric techniques
This part of ISO/IEC 11770 defines key management mechanisms based on asymmetric cryptographic techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals. 1) Establish a shared...
Notice of Intent
Information Technology - Generic Digital Audio...
This part of ISO/IEC 16500 on .Contours: Technology Domain. describes the system functions and DAVIC tools relevant to the Contours defined in ISO/IEC TR 165001. A goal of this part of ISO/IEC 16500 is to guide implementers...
Notice of Intent
Information Technology - Generic Digital Audio...
This part of ISO/IEC 16500 provides a toolbox consisting of lower layer protocols and physical interfaces. Each tool is applicable at one or more of the reference points within the delivery system. The physical delivery media...
Notice of Intent
Information Technology - Generic Digital Audio...
This part of ISO/IEC 16500 describes the management architecture and protocol for managing the DAVIC System. The DAVIC system management architecture is the TMN-based (Telecommunication Management Network) architecture...