Refine Results
Displaying 8509 - 8520 of 9293
Notice of Intent
Information technology - Programming languages...
1 This document specifies the form and establishes the interpretation of programs written in the C programming language.1) It specifies — the representation of C programs; — the syntax and constraints of the C language; — the...
Notice of Intent
IT Security techniques - Hash-functions - Part...
This document specifies dedicated hash-functions, i.e. specially designed hash-functions. The hash- functions in this document are based on the iterative use of a round-function. Distinct round-functions are specified, giving...
Notice of Intent
IT Security techniques - Digital signatures with...
This document specifies digital signature mechanisms with appendix whose security is based on the discrete logarithm problem. This document provides — a general description of a digital signature with appendix mechanism, and...
Notice of Intent
Information technology - Security techniques - ...
This document establishes five modes of operation for applications of an n-bit block cipher (e.g. protection of data during transmission or in storage). The defined modes only provide protection of data confidentiality...
Notice of Intent
Information technology - Security techniques - ...
1 Scope This document establishes five modes of operation for applications of an n-bit block cipher (e.g. protection of data during transmission or in storage). The defined modes only provide protection of data...
Notice of Intent
Information technology - Security techniques - ...
This document defines key establishment mechanisms based on weak secrets, i.e. secrets that can be readily memorized by a human, and hence, secrets that will be chosen from a relatively small set of possibilities. It...
Notice of Intent
Information security, cybersecurity and privacy...
This document provides guidance on concepts, objectives and processes for the governance of information security, by which organizations can evaluate, direct, monitor and communicate the information security-related processes...
Notice of Intent
Information technology - Security techniques - ...
This document establishes commonly accepted control objectives, controls and guidelines for implementing measures to protect Personally Identifiable Information (PII) in line with the privacy principles in ISO/IEC 29100 for...
Notice of Intent
Information technology - High efficiency coding...
This document specifies technology that supports the efficient transmission of immersive audio signals and flexible rendering for the playback of immersive audio in a wide variety of listening scenarios. These include home...
Notice of Intent
Information technology - JPEG XS low-latency ...
This document defines a syntax (and an accompanying decompression process) that is capable to represent continuous-tone grey-scale, or continuous-tone colour digital images without visual loss at moderate compression rates...
Notice of Intent
Identification cards - Integrated circuit cards...
This document specifies interindustry commands which can be used for security operations. This document also provides informative directives on how to construct security mechanisms with commands defined in ISO/IEC 7816-4. The...
Notice of Intent
IT Security techniques - Entity authentication...
This document specifies entity authentication mechanisms using authenticated encryption algorithms. Four of the mechanisms provide entity authentication between two entities where no trusted third party is involved; two of...