Search

Refine Results
Type
Program
Status
Country
Province
City
Accreditation Sub-Programs
Program Specialty Area
GLP Area of Expertise
Field of Testing
Fields of Compliance
Period range

From

To

Displaying 8497 - 8508 of 8696
Notice of Intent

Information technology — Conformance testing ...

Note: The ICS code of this Notice of Intent (originally published on October 16, 2024) was updated by the responsible SDO on November 5, 2024. This part of ISO/IEC 29109 specifies elements of conformance testing methodology...
Notice of Intent

Information technology — Conformance testing ...

This part of ISO/IEC 29109 specifies elements of conformance testing methodology, test assertions, and test procedures as applicable to ISO/IEC 19794-7. ISO/IEC 19794-7 defines two data interchange formats for signature/sign...
Notice of Intent

Information technology — Conformance testing ...

Note: The ICS code of this Notice of Intent (originally published on October 16, 2024) was updated by the responsible SDO on November 5, 2024. This part of ISO/IEC 29109 specifies elements of conformance testing methodology...
Notice of Intent

Information technology — Conformance testing ...

Note: The ICS code of this Notice of Intent (originally published on October 16, 2024) was updated by the responsible SDO on November 5, 2024. This part of ISO/IEC 29109 specifies elements of conformance testing methodology...
Notice of Intent

Information technology — Conformance testing ...

Note: The ICS code of this Notice of Intent (originally published on October 16, 2024) was updated by the responsible SDO on November 5, 2024. This part of ISO/IEC 29109 specifies elements of conformance testing methodology...
Notice of Intent

Information technology - Security techniques - ...

The purpose of key management is to provide procedures for handling cryptographic keying material to be used in symmetric or asymmetric cryptographic algorithms according to the security policy in force. This part of ISO/IEC...
Notice of Intent

Information technology - Security techniques - ...

This part of ISO/IEC 11770 defines key management mechanisms based on asymmetric cryptographic techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals. 1) Establish a shared...