Search

Refine Results
Type
Program
Status
Country
Province
City
Program Specialty Area
Field of Testing
Period range

From

To

Displaying 2449 - 2460 of 9886
Notice of Intent

Information technology - Security techniques - ...

This part of ISO/IEC 11770 defines key management mechanisms based on asymmetric cryptographic techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals. a) Establish a shared...
Notice of Intent

Information Technology - Intelligent Peripheral...

This part of ISO/IEC 9318 describes the logical level (generic level) interface for tape drives and it provides a definition of the device-generic portion of a family of standards called the Intelligent Peripheral Interface...
Notice of Intent

Information Technology - Intelligent Peripheral...

This part of ISO/IEC 9318 describes the logical level (generic level) interface for tape drives and it provides a definition of the device-generic portion of a family of standards called the Intelligent Peripheral Interface...
Notice of Intent

Information security, cybersecurity and privacy...

This document provides high-level security and privacy requirements and recommendations for authentication using biometrics on mobile devices, including security and privacy requirements and recommendations for functional...
Notice of Intent

Information technology - High efficiency coding...

This document provides accompanying reference software for Rec. ITU-T H.265 | ISO/IEC 23008-2 as an electronic attachment. The software is an integral part of this document. The use of this reference software is not required...
Notice of Intent

Information technology - Multimedia application...

This part of ISO/IEC 23000, also known as "photo player MAF", specifies a file format for digital photo library applications. It establishes a standardized solution for the carriage of images and associated metadata, to...
Notice of Intent

Information technology - IT Enabled Services-...

ISO/IEC 30105-3:2016 specifies the lifecycle process requirements performed by the IT enabled business process outsourcing service provider for the outsourced business processes. It defines the processes to plan, establish...