Search

Refine Results
Type
Program
Status
Country
Province
City
Program Specialty Area
Field of Testing
Period range

From

To

Displaying 1885 - 1896 of 9886
Notice of Intent

Information security - Cryptographic techniques...

The ISO/IEC 15946 series specifies public-key cryptographic techniques based on elliptic curves described in ISO/IEC 15946-1. This document defines elliptic curve generation techniques useful for implementing the elliptic...
Notice of Intent

Information technology - ASN.1 encoding rules...

This Recommendation | International Standard specifies a set of Basic Octet Encoding Rules (BASIC-OER) that may be used to derive a transfer syntax for values of the types defined in Rec. ITU-T X.680 | ISO/IEC 8824-1, Rec...
Notice of Intent

Information technology - Service management - ...

Scope: CSA ISO/IEC 20000-2:20 1.1 General This document provides guidance on the application of a service management system (SMS) based on ISO/IEC 20000-1. It provides examples and recommendations to enable organizations to...
Notice of Intent

Information technology - Security techniques - ...

Scope: CAN/CSA-ISO/IEC 18033-4:13 (R2017) This part of ISO/IEC 18033 specifies a) output functions to combine a keystream with plaintext, b) keystream generators for producing keystream, and c) object identifiers assigned to...
Notice of Intent

Information security, cybersecurity and privacy...

This document specifies the requirements for creating sector-specific standards that extend ISO/IEC 27001, and complement or amend ISO/IEC 27002 to support a specific sector (domain, application area or market). This document...
Notice of Intent

Information security - Message authentication...

This document specifies MAC algorithms that use a secret key and a hash-function (or its round-function or sponge function) to calculate an m-bit MAC. These mechanisms can be used as data integrity mechanisms to verify that...
Notice of Intent

Information technology - Guidance for the use...

This document describes the regular expression support in SQL (ISO/IEC 9075-2) adopted from the regular expression syntax of XQuery and XPath Functions and Operators 3.1, which is derived from Perl. This document discusses...
Notice of Intent

Information technology - Guidance for the use...

This document discusses the syntax and semantics for recognizing patterns in rows of a table, as defined in ISO/IEC 9075-2, commonly called “SQL/RPR”. SQL/RPR defines two features regarding row pattern recognition: Feature...
Notice of Intent

Information technology - Guidance for the use...

This document describes the definition and use of polymorphic table functions in SQL. The Report discusses the following features of the SQL Language: The processing model of polymorphic table functions in the context of SQL...