Search

Refine Results
Type
Program
Status
Country
Province
City
Accreditation Sub-Programs
Program Specialty Area
GLP Area of Expertise
Field of Testing
Fields of Compliance
Period range

From

To

Displaying 3097 - 3108 of 5517
Notice of Intent

Information security - Key management - Part ...

This document specifies mechanisms to establish shared symmetric keys between groups of entities. It defines: — symmetric key-based key establishment mechanisms for multiple entities with a key distribution centre (KDC); and...
Notice of Intent

Information technology - Security techniques - ...

This part of ISO/IEC 18033 specifies several asymmetric ciphers. These specifications prescribe the functional interfaces and correct methods of use of such ciphers in general, as well as the precise functionality and cipher...
Notice of Intent

Cybersecurity - Supplier relationships - Part...

This document provides guidance for product and service acquirers, as well as suppliers of hardware, software and services, regarding: a) gaining visibility into and managing the information security risks caused by...
Notice of Intent

Information technology - High efficiency coding...

This document specifies the Image File Format, an interoperable storage format for a single image, a collection of images, and sequences of images. The format defined in this document is built on tools defined in ISO/IEC...
Notice of Intent

Amendment 2 - Information technology - Security...

Scope for CSA ISO/IEC 20008-2:21 This part of ISO/IEC 20008 specifies anonymous digital signature mechanisms, in which a verifier makes use of a group public key to verify a digital signature. It provides — a general...
Notice of Intent

Wrought steel enclosures for gas-filled high-...

Via EN 50068:2018 1 Scope This document applies to wrought steel enclosures and their welding. These enclosures are pressurized with dry air, inert gases, for example sulphur hexafluoride or nitrogen or a mixture of such...