Search

Refine Results
Type
Status
Period range

From

To

Displaying 49 - 60 of 298
Information technology - Security techniques - Key management - Part 3: Mechanisms using asymmetric techniques
This part of ISO/IEC 11770 defines key management mechanisms based on asymmetric cryptographic techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals. 1) Establish a shared...
Notice of Intent

Risk management - Risk assessment techniques

This International Standard is a supporting standard for ISO 31000 and provides guidance on selection and application of systematic techniques for risk assessment. Risk assessment carried out in accordance with this standard...
Notice of Intent

Information technology - Security techniques - ...

Scope This part of ISO/IEC 11770 defines key management mechanisms based on asymmetric cryptographic techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals. 1) Establish a shared...
Notice of Intent

Information technology - Security techniques - ...

This part of ISO/IEC 11770 defines key management mechanisms based on asymmetric cryptographic techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals. a) Establish a shared...
Notice of Intent

Information technology - Security techniques - ...

This part of ISO/IEC 11770 defines key management mechanisms based on asymmetric cryptographic techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals. a) Establish a shared...
Information technology - Security techniques - Key management - Part 2: Mechanisms using symmetric techniques
The purpose of key management is to provide procedures for handling cryptographic keying material to be used in symmetric or asymmetric cryptographic algorithms according to the security policy in force. This part of ISO/IEC...
Notice of Intent

Information technology - Security techniques - ...

Scope The purpose of key management is to provide procedures for handling cryptographic keying material to be used in symmetric or asymmetric cryptographic algorithms according to the security policy in force. This part of...
Notice of Intent

IT Security techniques - Test tool requirements...

This document provides specifications for non-invasive attack test tools and provides information about how to operate such tools. The purpose of the test tools is the collection of signals (i.e. side-channel leakage) and...
Notice of Intent

Molecular in vitro diagnostic examinations — ...

ISO Number Proposed Adoption ISO ED CSA ED Type Scope 20166-1:2018 Molecular in vitro diagnostic examinations — Specifications for pre-examination processes for formalin-fixed and paraffinembedded (FFPE) tissue — Part 1...
Notice of Intent

Information security - Key management - Part ...

This document defines key management mechanisms based on asymmetric cryptographic techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals. a) Establish a shared secret key for use...