Search

Refine Results
Type
Program
Status
Country
Province
City
Accreditation Sub-Programs
Program Specialty Area
GLP Area of Expertise
Field of Testing
Fields of Compliance
Period range

From

To

Displaying 5725 - 5736 of 6119
Notice of Intent

Information technology - Security techniques - ...

This document defines key establishment mechanisms based on weak secrets, i.e. secrets that can be readily memorized by a human, and hence, secrets that will be chosen from a relatively small set of possibilities. It...
Notice of Intent

Information technology - Home electronic system...

This part of ISO/IEC 14543 defines the mandatory and optional requirements for the medium specific Physical and Data Link Layer of Powerline Class 1 in its two variations PL110 and PL132. NOTE Data Link Layer interface and...
Notice of Intent

Information technology - Home electronic system...

This part of ISO/IEC 14543-5 specifies the core protocol of IGRS user and device remote access, including intelligent grouping and resource sharing. The protocol features are: a) IGRS RA user and IGRS RA device concepts and...
Notice of Intent

Information technology - Home electronic system...

This part of ISO/IEC 14543-5 specifies the basic functionalities, module structures and interfaces in an IGRS RA service platform (IRSP). The service interaction flow and the request/response message formats are also...
Notice of Intent

Information technology - MPEG video technologies...

This document describes: — what is meant by conformance of what is specified in ISO/IEC 23002-4 — the structure of the reference software related to what is specified in ISO/IEC 23002-4. Currently the following profiles are...
Notice of Intent

Information technology - High efficiency coding...

The formats defined in this document enable the interchange, editing, and display of images, as well as the carriage of metadata associated with those images. The Image File Format builds on tools defined in ISO/IEC 14496-12...
Notice of Intent

Information technology - Security techniques - ...

This document specifies the methods to be used by testing laboratories to test whether the cryptographic module conforms to the requirements specified in ISO/IEC 19790:2012. The methods are developed to provide a high degree...