Refine Results
Displaying 2869 - 2880 of 5449
Notice of Intent
Cards and security devices for personal identification...
This document describes the following: — polling for proximity cards or objects (PICCs) entering the field of a proximity coupling device (PCD); — the byte format, the frames and timing used during the initial phase of...
Notice of Intent
Information technology - Security techniques - ...
This document establishes commonly accepted control objectives, controls and guidelines for implementing measures to protect Personally Identifiable Information (PII) in line with the privacy principles in ISO/IEC 29100 for...
Notice of Intent
Information technology - High efficiency coding...
This document specifies technology that supports the efficient transmission of immersive audio signals and flexible rendering for the playback of immersive audio in a wide variety of listening scenarios. These include home...
Notice of Intent
Information technology - Security techniques - ...
1 Scope This document establishes five modes of operation for applications of an n-bit block cipher (e.g. protection of data during transmission or in storage). The defined modes only provide protection of data...
Notice of Intent
Information technology - Security techniques - ...
This document defines key establishment mechanisms based on weak secrets, i.e. secrets that can be readily memorized by a human, and hence, secrets that will be chosen from a relatively small set of possibilities. It...
Notice of Intent
Identification cards - ICC-managed devices - ...
This document defines physical characteristics and test methods for cards with devices, including but not limited to, power supplying devices, displays, sensors, microphones, loudspeakers, buttons or keypads. This document...
Notice of Intent
Information security, cybersecurity and privacy...
This document gives guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1 for organizations intending to: a) implement ISO/IEC 27001 when ISO/IEC 20000-1 is already implemented, or vice versa; b)...
Notice of Intent
Software and systems engineering - Software testing...
This document defines test design techniques that can be used during the test design and implementation process that is defined in ISO/IEC/IEEE 29119-2. Each technique follows the test design and implementation process that...
Notice of Intent
Amendment 1 - Information technology - Security...
This document specifies the requirements of competence for ISMS professionals leading or involved in establishing, implementing, maintaining and continually improving one or more information security management system...
Notice of Intent
Personal identification - ISO-compliant driving...
The purpose of storing IDL data on machine-readable media on the IDL is to: increase productivity (of data and IDL use), facilitate electronic data exchange, and assist in authenticity and integrity validation. This document...
Notice of Intent
Cards and security devices for personal identification...
Scope: CSA ISO/IEC 14443-4:19 This document specifies a half-duplex block transmission protocol featuring the special needs of a contactless environment and defines the activation and deactivation sequence of the protocol...
Notice of Intent
Information technology - Security techniques - ...
Scope: CAN/CSA-ISO/IEC 18033-4:13 (R2017) This part of ISO/IEC 18033 specifies a) output functions to combine a keystream with plaintext, b) keystream generators for producing keystream, and c) object identifiers assigned to...