Search

Refine Results
Type
Program
Status
Country
Province
City
Period range

From

To

Displaying 5377 - 5388 of 5449
Notice of Intent

Information Technology - Coding of Multimedia...

1.1 Context of the scope ISO/IEC 13522 specifies the coded representation of multimedia/hypermedia information objects (MHEG objects) for interchange as final form units within or across services and applications, by any...
Notice of Intent

Information technology - Coding of audio-visual...

This part of ISO/IEC TR 14496 describes the desired joint behavior of MPEG-4 Systems (MPEG-4 File Format) and MPEG-4 Audio codecs. It is desired that MPEG-4 Audio encoders and decoders permit finite length signals to be...
Notice of Intent

Information technology - Security techniques - ...

This document provides recommendations and checklists which can be used to support the specification and operational testing of cryptographic modules in their operational environment within an organization’s security system...
Notice of Intent

Information technology - Security techniques - ...

Scope The purpose of key management is to provide procedures for handling cryptographic keying material to be used in symmetric or asymmetric cryptographic algorithms according to the security policy in force. This part of...
Notice of Intent

Information Technology - Coding of Multimedia...

1.1 Context of the Scope ISO/IEC 13522 specifies the coded representation of multimedia/hypermedia information objects (MHEG objects) for interchange as final form units within or across services and applications, by any...
Notice of Intent

Safety of machinery - Safety distances to prevent...

This document establishes values for safety distances in both industrial and non-industrial environments to prevent machinery hazard zones being reached. The safety distances are appropriate for protective structures. It also...
Notice of Intent

Systems and software engineering — Information...

This part of ISO/IEC 29155 provides general requirements and guidance for reporting processes and contents of typical reports within benchmarking activities of the information technology (IT) project performance benchmarking...
Notice of Intent

Information technology - Security techniques - ...

This part of ISO/IEC 11770 defines key management mechanisms based on asymmetric cryptographic techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals. a) Establish a shared...