Search

Refine Results
Type
Program
Status
Country
Province
City
Accreditation Sub-Programs
Program Specialty Area
GLP Area of Expertise
Field of Testing
Fields of Compliance
Period range

From

To

Displaying 8617 - 8628 of 10417
Notice of Intent

Information Technology - Multimedia Framework...

This part of ISO/IEC 21000 specifies how to include IPMP information and protected parts of Digital Items in a DIDL document. It purposely does not specify protection measures, keys, key management, trust management...
Notice of Intent

Information Technology - Multimedia Framework...

This Technical Report specifies a test bed that is designed to assist in performance assessment of MPEG-21, Scalable Video Coding (SVC) for streaming applications and for the evaluation of resource delivery technologies over...
Notice of Intent

Information Technology - Multimedia Framework...

This part of ISO/IEC 21000 specifies the ISO/IEC 21000 binary format which is an alternative serialization format of descriptions as specified within other ISO/IEC 21000 parts, e.g. ISO/IEC 21000-2. This enables the efficient...
Notice of Intent

VME64bus - Specification

The VMEbus specification defines an interfacing system used to interconnect microprocessors, data storage, and peripheral control devices in a closely coupled hardware configuration. The system has been conceived with the...
Notice of Intent

Pullout switches

1 Scope 1.1 This covers construction, marking and test requirements for pullout switches of the detachable type, rated up to 600 V and 400A. 1.2 These requirements apply to non-enclosed and enclosed pullout switches of the...
Notice of Intent

Information technology - Security techniques - ...

This part of ISO/IEC 18033 specifies block ciphers. A block cipher maps blocks of n bits to blocks of n bits, under the control of a key of k kits. A total of seven different block ciphers are defined. They are categorized in...
Notice of Intent

Information technology - Security techniques - ...

This part of ISO/IEC 11770 a) establishes the general model on which key management mechanisms are based, b) defines the basic concepts of key management which are common to all the parts of ISO/IEC 11770, c) specifies the...