Refine Results
Displaying 8557 - 8568 of 8753
Notice of Intent
Information technology — Conformance testing ...
Note: The ICS code of this Notice of Intent (originally published on October 16, 2024) was updated by the responsible SDO on November 5, 2024. This part of ISO/IEC 29109 specifies elements of conformance testing methodology...
Notice of Intent
Information technology — Security techniques — ...
Note: The ICS code of this Notice of Intent (originally published on October 16, 2024) was updated by the responsible SDO on November 5, 2024. This part of ISO/IEC 18370 specifies blind digital signature mechanisms, together...
Notice of Intent
Information technology — Security techniques — ...
This document establishes commonly accepted control objectives, controls and guidelines for implementing measures to protect Personally Identifiable Information (PII) in line with the privacy principles in ISO/IEC 29100 for...
Notice of Intent
Information technology — Security techniques — ...
This document specifies a methodology for the evaluation of non-deterministic or deterministic random bit generators intended to be used for cryptographic applications. The provisions given in this document enable the vendor...
Notice of Intent
Information technology — Biometric data interchange...
Note: The ICS code of this Notice of Intent (originally published on October 16, 2024) was updated by the responsible SDO on November 5, 2024. For the purpose of biometric comparison, this part of ISO/IEC 19794 specifies a...
Information technology - Security techniques - Key management - Part 2: Mechanisms using symmetric techniques
The purpose of key management is to provide procedures for handling cryptographic keying material to be used in symmetric or asymmetric cryptographic algorithms according to the security policy in force. This part of ISO/IEC...
Information technology - Security techniques - Key management - Part 3: Mechanisms using asymmetric techniques
This part of ISO/IEC 11770 defines key management mechanisms based on asymmetric cryptographic techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals. 1) Establish a shared...
Notice of Intent
Information Technology - 8-Bit Single-Byte Coded...
1. Scope This part of ISO/IEC 8859 specifies a set of 191 coded graphic characters identified as Latin alphabet No. 10. This set of coded graphic characters is intended for use in data and text processing applications and...
Notice of Intent
Information Technology - Generic Digital Audio...
This part of ISO/IEC 16500 on .Contours: Technology Domain. describes the system functions and DAVIC tools relevant to the Contours defined in ISO/IEC TR 165001. A goal of this part of ISO/IEC 16500 is to guide implementers...
Notice of Intent
Information Technology - Generic Digital Audio...
This part of ISO/IEC 16500 provides a toolbox consisting of lower layer protocols and physical interfaces. Each tool is applicable at one or more of the reference points within the delivery system. The physical delivery media...
Notice of Intent
Information Technology - Generic Digital Audio...
This part of ISO/IEC 16500 describes the management architecture and protocol for managing the DAVIC System. The DAVIC system management architecture is the TMN-based (Telecommunication Management Network) architecture...
Notice of Intent
Information Technology - 8-Bit Single-Byte Coded...
This part of ISO/IEC 8859 specifies a set of 191 coded graphic characters identified as Latin alphabet No. 1. This set of coded graphic characters is intended for use in data and text processing applications and also for...