Search

Refine Results
Type
Program
Status
Country
Province
City
Accreditation Sub-Programs
Program Specialty Area
GLP Area of Expertise
Field of Testing
Fields of Compliance
Period range

From

To

Displaying 8857 - 8868 of 10416
Notice of Intent

IT Security techniques - Key management - Part...

This document defines key establishment mechanisms using symmetric cryptographic techniques. This document addresses three environments for the establishment of keys: Point-to-Point, Key Distribution Centre (KDC), and Key...
Notice of Intent

IT Security techniques - Digital signatures with...

This document specifies digital signature mechanisms with appendix whose security is based on the discrete logarithm problem. This document provides — a general description of a digital signature with appendix mechanism, and...
Notice of Intent

Preparation and quality management of fluids ...

This document specifies minimum requirements for water to be used in haemodialysis and related therapies. This document includes water to be used in the preparation of concentrates, dialysis fluids for haemodialysis...
Notice of Intent

Preparation and quality management of fluids ...

This document specifies minimum requirements for concentrates used for haemodialysis and related therapies. This document is addressed to the manufacturer of such concentrates. In several instances in this document, the...
Notice of Intent

Preparation and quality management of fluids ...

This document specifies minimum quality requirements for dialysis fluids used in haemodialysis and related therapies. This document includes dialysis fluids used for haemodialysis and haemodiafiltration, including...
Notice of Intent

Information technology - Security techniques - ...

This document establishes five modes of operation for applications of an n-bit block cipher (e.g. protection of data during transmission or in storage). The defined modes only provide protection of data confidentiality...
Notice of Intent

Information technology - Security techniques - ...

This document defines key establishment mechanisms based on weak secrets, i.e. secrets that can be readily memorized by a human, and hence, secrets that will be chosen from a relatively small set of possibilities. It...