Refine Results
Displaying 1885 - 1896 of 9886
Notice of Intent
Information security - Cryptographic techniques...
The ISO/IEC 15946 series specifies public-key cryptographic techniques based on elliptic curves described in ISO/IEC 15946-1. This document defines elliptic curve generation techniques useful for implementing the elliptic...
Notice of Intent
Information security, cybersecurity and privacy...
This document defines the minimum actions to be performed by an evaluator in order to conduct an ISO/IEC 15408 series evaluation, using the criteria and evaluation evidence defined in the ISO/IEC 15408 series.
Notice of Intent
Information technology - ASN.1 encoding rules...
This Recommendation | International Standard specifies a set of Basic Octet Encoding Rules (BASIC-OER) that may be used to derive a transfer syntax for values of the types defined in Rec. ITU-T X.680 | ISO/IEC 8824-1, Rec...
Notice of Intent
Information technology - Automatic identification...
This document specifies a transfer structure, syntax, and coding of messages and data formats when using high-capacity ADC media between trading partners (specifically between suppliers and recipients) and, where applicable...
Notice of Intent
Information technology - Common Biometric Exchange...
This document specifies and publishes registered Common Biometric Exchange Formats Framework (CBEFF) patron formats defined by the CBEFF patron ISO/IEC JTC 1/SC 37, and specifies their registered CBEFF patron format types...
Notice of Intent
Information technology - Service management - ...
Scope: CSA ISO/IEC 20000-2:20 1.1 General This document provides guidance on the application of a service management system (SMS) based on ISO/IEC 20000-1. It provides examples and recommendations to enable organizations to...
Notice of Intent
Information technology - Security techniques - ...
Scope: CAN/CSA-ISO/IEC 18033-4:13 (R2017) This part of ISO/IEC 18033 specifies a) output functions to combine a keystream with plaintext, b) keystream generators for producing keystream, and c) object identifiers assigned to...
Notice of Intent
Information security, cybersecurity and privacy...
This document specifies the requirements for creating sector-specific standards that extend ISO/IEC 27001, and complement or amend ISO/IEC 27002 to support a specific sector (domain, application area or market). This document...
Notice of Intent
Information security - Message authentication...
This document specifies MAC algorithms that use a secret key and a hash-function (or its round-function or sponge function) to calculate an m-bit MAC. These mechanisms can be used as data integrity mechanisms to verify that...
Notice of Intent
Information technology - Guidance for the use...
This document describes the regular expression support in SQL (ISO/IEC 9075-2) adopted from the regular expression syntax of XQuery and XPath Functions and Operators 3.1, which is derived from Perl. This document discusses...
Notice of Intent
Information technology - Guidance for the use...
This document discusses the syntax and semantics for recognizing patterns in rows of a table, as defined in ISO/IEC 9075-2, commonly called “SQL/RPR”. SQL/RPR defines two features regarding row pattern recognition: Feature...
Notice of Intent
Information technology - Guidance for the use...
This document describes the definition and use of polymorphic table functions in SQL. The Report discusses the following features of the SQL Language: The processing model of polymorphic table functions in the context of SQL...