Search

Refine Results
Type
Program
Status
Country
Province
City
Accreditation Sub-Programs
Program Specialty Area
GLP Area of Expertise
Field of Testing
Fields of Compliance
Period range

From

To

Displaying 937 - 948 of 12084
Information technology - Security techniques - Key management - Part 2: Mechanisms using symmetric techniques
The purpose of key management is to provide procedures for handling cryptographic keying material to be used in symmetric or asymmetric cryptographic algorithms according to the security policy in force. This part of ISO/IEC...
Notice of Intent

Information Technology - Personal Identification...

This part of ISO/IEC 18013 establishes guidelines for the design format and data content of an ISO compliant driving licence (IDL) in regard to both visual human-readable features and ISO machine-readable technologies. It...
Notice of Intent

Information technology - Security techniques - ...

Scope The purpose of key management is to provide procedures for handling cryptographic keying material to be used in symmetric or asymmetric cryptographic algorithms according to the security policy in force. This part of...