Search

Refine Results
Type
Program
Status
Country
Province
City
Accreditation Sub-Programs
Program Specialty Area
GLP Area of Expertise
Field of Testing
Fields of Compliance
Period range

From

To

Displaying 7669 - 7680 of 9326
Notice of Intent

Information technology - Application security...

This document defines XML Schemas that implement the minimal set of information requirements and essential attributes of ASCs and the activities and roles of the Application Security Life Cycle Reference Model (ASLCRM) from...
Notice of Intent

Information technology - Distributed application...

This document specifies a framework for a distributed real-time Access system. It includes: 1) an ID triggered modular system architecture, the functions of the modules, the semantics of messages those modules exchange, and...
Notice of Intent

Information technology - Identification cards...

This document establishes — architectures of biometric comparison using an ICC, — on-card biometric comparison, both in sensor-off-card systems and as part of biometric system-on-card, — work-sharing on-card biometric...
Notice of Intent

Information technology - Security techniques - ...

This document specifies key derivation functions, i.e. functions which take secret information and other (public) parameters as input and output one or more “derived” secret keys. Key derivation functions based on MAC...
Notice of Intent

Information technology - Coding of audio-visual...

This document describes the carriage of some forms of timed text and subtitle streams in files based on ISO/IEC 14496-12 (the ISO base media file format). The documentation of these forms does not preclude other definition of...
Notice of Intent

Information technology - Security techniques - ...

This part of ISO/IEC 18033 specifies identity-based encryption mechanisms. For each mechanism the functional interface, the precise operation of the mechanism, and the ciphertext format are specified. However, conforming...
Notice of Intent

IT Security techniques - Encryption algorithms...

This document specifies the following mechanisms for homomorphic encryption. — Exponential ElGamal encryption; — Paillier encryption. For each mechanism, this document specifies the process for: — generating parameters and...
Notice of Intent

Information technology - Security techniques - ...

This document specifies principles, including a general model, a set of entities, a number of processes, and general requirements for blind digital signature mechanisms, as well as the following variants of blind digital...