Search

Refine Results
Type
Program
Status
Country
Province
City
Accreditation Sub-Programs
Program Specialty Area
GLP Area of Expertise
Field of Testing
Fields of Compliance
Period range

From

To

Displaying 3445 - 3456 of 6124
Notice of Intent

Information technology - Security techniques - ...

This document specifies security guidelines for the design and implementation of VSs. Design considerations focusing on identifying and mitigating risks, and implementation recommendations with respect to typical VSs are...
Notice of Intent

Information technology - Security techniques - ...

This document: — gives guidelines for the identity proofing of a person; — specifies levels of identity proofing, and requirements to achieve these levels. This document is applicable to identity management systems.
Notice of Intent

Information technology - Security techniques - ...

This document specifies anonymous entity authentication mechanisms based on weak secrets. The precise operation of each mechanism is specified, together with details of all inputs and outputs. This document is applicable to...
Notice of Intent

Information technology - Security techniques - ...

This document specifies key derivation functions, i.e. functions which take secret information and other (public) parameters as input and output one or more “derived” secret keys. Key derivation functions based on MAC...
Notice of Intent

Information technology - Security techniques - ...

This part of ISO/IEC 18033 specifies identity-based encryption mechanisms. For each mechanism the functional interface, the precise operation of the mechanism, and the ciphertext format are specified. However, conforming...
Notice of Intent

IT Security techniques - Encryption algorithms...

This document specifies the following mechanisms for homomorphic encryption. — Exponential ElGamal encryption; — Paillier encryption. For each mechanism, this document specifies the process for: — generating parameters and...
Notice of Intent

Information technology - Security techniques - ...

This document specifies principles, including a general model, a set of entities, a number of processes, and general requirements for blind digital signature mechanisms, as well as the following variants of blind digital...