Search

Refine Results
Type
Program
Status
Country
Province
City
Accreditation Sub-Programs
Program Specialty Area
GLP Area of Expertise
Field of Testing
Fields of Compliance
Period range

From

To

Displaying 3853 - 3864 of 6436
Notice of Intent

IT Security techniques - Hash-functions - Part...

This document specifies dedicated hash-functions, i.e. specially designed hash-functions. The hash- functions in this document are based on the iterative use of a round-function. Distinct round-functions are specified, giving...
Notice of Intent

IT Security techniques - Digital signatures with...

This document specifies digital signature mechanisms with appendix whose security is based on the discrete logarithm problem. This document provides — a general description of a digital signature with appendix mechanism, and...
Notice of Intent

IT Security techniques - Entity authentication...

This document specifies entity authentication mechanisms using authenticated encryption algorithms. Four of the mechanisms provide entity authentication between two entities where no trusted third party is involved; two of...
Notice of Intent

Information technology - Object oriented BioAPI...

This part of ISO/IEC 30106 specifies an architecture for a set of interfaces which define the OO BioAPI. Components defined in this part of ISO/IEC 30106 include a framework, Biometric Service Providers (BSPs), Biometric...
Notice of Intent

Information technology - Security techniques - ...

This document establishes commonly accepted control objectives, controls and guidelines for implementing measures to protect Personally Identifiable Information (PII) in line with the privacy principles in ISO/IEC 29100 for...
Notice of Intent

Information technology - High efficiency coding...

This document specifies technology that supports the efficient transmission of immersive audio signals and flexible rendering for the playback of immersive audio in a wide variety of listening scenarios. These include home...
Notice of Intent

Information technology - Security techniques - ...

This document defines key establishment mechanisms based on weak secrets, i.e. secrets that can be readily memorized by a human, and hence, secrets that will be chosen from a relatively small set of possibilities. It...
Notice of Intent

Identification cards - ICC-managed devices - ...

This document defines physical characteristics and test methods for cards with devices, including but not limited to, power supplying devices, displays, sensors, microphones, loudspeakers, buttons or keypads. This document...
Notice of Intent

Information security, cybersecurity and privacy...

This document gives guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1 for organizations intending to: a) implement ISO/IEC 27001 when ISO/IEC 20000-1 is already implemented, or vice versa; b)...