Search

Refine Results
Type
Program
Status
Country
Province
City
Program Specialty Area
Field of Testing
Period range

From

To

Displaying 1717 - 1728 of 3649
Notice of Intent

Information Technology - Generic Digital Audio...

This part of ISO/IEC 16500 covers the high and mid layer protocols for DAVIC systems. It defines a set of protocol components ("tools") which are referenced by ISO/IEC 16500-2 ("System Dynamics, Scenarios, and Protocol...
Notice of Intent

Information Technology - JPEG 2000 Image Coding...

This Recommendation | International Standard defines a set of lossless (bit-preserving) and lossy compression methods for coding bi-level, continuous-tone grey-scale, palletized color, or continuous-tone colour digital still...
Notice of Intent

Industrial communication networks - Network and...

This Standard defines the elements necessary to establish a cyber security management system (CSMS) for industrial automation and control systems (IACS) and provides guidance on how to develop those elements. This standard...
Notice of Intent

Information technology - Security techniques - ...

This Standard defines the requirements for the use of ISO/IEC 27001 in any specific sector (field, application area or market sector). It explains how to include requirements additional to those in ISO/IEC 27001, how to...
Notice of Intent

Information technology - Security techniques - ...

This part of ISO/IEC 18033 specifies block ciphers. A block cipher maps blocks of n bits to blocks of n bits, under the control of a key of k kits. A total of seven different block ciphers are defined. They are categorized in...
Notice of Intent

Cardiac Defibrillators - Cardiac Defibrillators...

This technical report contains guidelines regarding the safe and effective operation and maintenance on CARDIAC DEFIBRILLATORS, as defined in clause 3 below, to be performed by medical and nursing personnel. This report does...
Notice of Intent

IT Security techniques - Entity authentication...

This document specifies entity authentication mechanisms using digital signatures based on asymmetric techniques. A digital signature is used to verify the identity of an entity. Ten mechanisms are specified in this document...