Refine Results
Displaying 49 - 60 of 412
Notice of Intent
Information technology - Security techniques - ...
This document provides recommendations and checklists which can be used to support the specification and operational testing of cryptographic modules in their operational environment within an organization’s security system...
Notice of Intent
Information technology - Security techniques - ...
This document provides recommendations and checklists which can be used to support the specification and operational testing of cryptographic modules in their operational environment within an organization’s security system...
Notice of Intent
Information technology - Security techniques...
This part of ISO/IEC 13888 specifies mechanisms for the provision of specific, communication related, non-repudiation services using asymmetric cryptographic techniques.
Notice of Intent
Information technology - Security techniques - ...
This part of ISO/IEC 13888 specifies mechanisms for the provision of specific, communication related, non-repudiation services using asymmetric cryptographic techniques.
Information technology - Security techniques - Key management - Part 3: Mechanisms using asymmetric techniques
This part of ISO/IEC 11770 defines key management mechanisms based on asymmetric cryptographic techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals. 1) Establish a shared...
Notice of Intent
Risk management - Risk assessment techniques
This International Standard is a supporting standard for ISO 31000 and provides guidance on selection and application of systematic techniques for risk assessment. Risk assessment carried out in accordance with this standard...
Notice of Intent
Information technology - Security techniques - ...
Scope This part of ISO/IEC 11770 defines key management mechanisms based on asymmetric cryptographic techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals. 1) Establish a shared...
Notice of Intent
Information technology - Security techniques - ...
This part of ISO/IEC 11770 defines key management mechanisms based on asymmetric cryptographic techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals. a) Establish a shared...
Notice of Intent
Information technology - Security techniques - ...
This part of ISO/IEC 11770 defines key management mechanisms based on asymmetric cryptographic techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals. a) Establish a shared...
Publications
SCC Requirements and Guidance for the Presentation...
This document provides guidance in the preparation of the Scope of Testing or Proficiency Testing Providers to be presented for submission to the SCC Program for Accreditation of Laboratories with an application for...
Information technology - Security techniques - Key management - Part 2: Mechanisms using symmetric techniques
The purpose of key management is to provide procedures for handling cryptographic keying material to be used in symmetric or asymmetric cryptographic algorithms according to the security policy in force. This part of ISO/IEC...
Publications
SCC Requirements and Guidance for the Accreditation...
The purpose of this document is to amplify, where appropriate, generic technical and organizational criteria as stated in ISO/IEC 17025 for SCC accreditation of facilities that could perform ITS evaluation and testing. In...