Search

Refine Results
Type
Program
Status
Country
Province
City
Program Specialty Area
Field of Testing
Period range

From

To

Displaying 7081 - 7092 of 9886
Notice of Intent

Standard for Lightning Protection Components

These requirements cover lightning protection components for use in the installation of complete systems of lightning protection on buildings and structures. These requirements do not cover the installation of lightning...
Notice of Intent

Identification cards - Integrated circuit cards...

This document aims to normalize privacy-enhancing protocols and services by — using the mechanisms from parts of ISO/IEC 7816 and parts of ISO/IEC 18328 that contribute to security and privacy, — providing discoverability...
Notice of Intent

Personal identification - ISO-compliant driving...

The purpose of storing IDL data on machine-readable media on the IDL is to: increase productivity (of data and IDL use), facilitate electronic data exchange, and assist in authenticity and integrity validation. This document...
Notice of Intent

IT Security techniques - Entity authentication...

This document specifies entity authentication mechanisms using authenticated encryption algorithms. Four of the mechanisms provide entity authentication between two entities where no trusted third party is involved; two of...
Notice of Intent

Software and systems engineering - Tools and ...

This document, within the context of methods and tools for architecture design for software and systems product lines: — defines processes and their subprocesses performed during domain and application architecture design...
Notice of Intent

Software and systems engineering - Tools and ...

This document, within the context of methods and tools for product line product management: — defines product line-specific processes and their subprocesses for product management of software and systems product lines. Those...
Notice of Intent

Programming languages - Guidance to avoiding ...

This document specifies software programming language vulnerabilities to be avoided in the development of systems where assured behaviour is required for security, safety, mission-critical and business-critical software. In...