Search

Refine Results
Type
Program
Status
Country
Province
City
Program Specialty Area
Field of Testing
Period range

From

To

Displaying 1705 - 1716 of 3785
Notice of Intent

Standard for Smoke Alarms

1.1 These requirements cover electrically operated single and multiple station smoke alarms intended for open area protection in indoor locations and portable smoke alarms used as "travel" alarms in accordance with: a)...
Notice of Intent

Terrestrial photovoltaic (PV) modules - Design...

This Standard lays down requirements for the design qualification and type approval of terrestrial photovoltaic modules suitable for long-term operation in general open-air climates, as defined in IEC 60721-2-1. This document...
Notice of Intent

Information technology - Security techniques - ...

This part of ISO/IEC 18033 specifies block ciphers. A block cipher maps blocks of n bits to blocks of n bits, under the control of a key of k kits. A total of seven different block ciphers are defined. They are categorized in...
Notice of Intent

Software, systems and enterprise - Architecture...

This document establishes a set of process descriptions for the governance and management of a collection of architectures and the architecting of entities. This document also establishes an enablement process description...
Notice of Intent

IT Security techniques - Entity authentication...

This document specifies entity authentication mechanisms using authenticated encryption algorithms. Four of the mechanisms provide entity authentication between two entities where no trusted third party is involved; two of...
Notice of Intent

Information technology - Telecommunications and...

1.1 Scope Based on the protocol defined in IEEE Std 1888™1, IEEE Standard for Ubiquitous Green Community Control Network Protocol, this standard extends component and data type definitions, message formats, and communication...
Notice of Intent

Information technology - IT Enabled Services-...

ISO/IEC 30105 specifies the lifecycle process requirements performed by the IT-enabled business process outsourcing service provider for the outsourced business processes. It defines the processes to plan, establish...
Notice of Intent

IT Security techniques — Entity authentication...

This document specifies entity authentication mechanisms using digital signatures based on asymmetric techniques. A digital signature is used to verify the identity of an entity. Ten mechanisms are specified in this document...
Notice of Intent

IT Security techniques — Entity authentication...

This document specifies entity authentication mechanisms using authenticated encryption algorithms. Four of the mechanisms provide entity authentication between two entities where no trusted third party is involved; two of...
Notice of Intent

Information technology - Security techniques - ...

This document provides the overview of information security management systems (ISMS). It also provides terms and definitions commonly used in the ISMS family of standards. This document is applicable to all types and sizes...