Search

Refine Results
Type
Status
Period range

From

To

Displaying 61 - 72 of 298
Notice of Intent

Information security - Key management - Part ...

This document defines key management mechanisms based on asymmetric cryptographic techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals. a) Establish a shared secret key for use...
Notice of Intent

Molecular in vitro diagnostic examinations — ...

ISO Number Proposed Adoption ISO ED CSA ED Type Scope 20166-1:2018 Molecular in vitro diagnostic examinations — Specifications for pre-examination processes for formalin-fixed and paraffinembedded (FFPE) tissue — Part 1...
Notice of Intent

Information Processing Systems - Open Systems...

This International Standard defines the syntax and semantics of the Formal Description Technique LOTOS. LOTOS is in general used for the formal description of distributed, concurrent information processing systems. In...
Notice of Intent

Information Processing Systems - Open Systems...

This International Standard defines the syntax and semantics of the Formal Description Technique LOTOS. LOTOS is in general used for the formal description of distributed, concurrent information processing systems. In...
Notice of Intent

Information technology - Security techniques - ...

This document defines key establishment mechanisms based on weak secrets, i.e. secrets that can be readily memorized by a human, and hence, secrets that will be chosen from a relatively small set of possibilities. It...
Notice of Intent

Information technology - Security techniques - ...

This document defines key establishment mechanisms based on weak secrets, i.e. secrets that can be readily memorized by a human, and hence, secrets that will be chosen from a relatively small set of possibilities. It...
Notice of Intent

Amendment 1 - Information technology - Security...

This document defines key establishment mechanisms based on weak secrets, i.e. secrets that can be readily memorized by a human, and hence, secrets that will be chosen from a relatively small set of possibilities. It...
Notice of Intent

Amendment 2 - Information technology - Security...

This document defines key establishment mechanisms based on weak secrets, i.e. secrets that can be readily memorized by a human, and hence, secrets that will be chosen from a relatively small set of possibilities. It...
Notice of Intent

Information technology - Biometric application...

This document defines the Application Programming Interface (API) and Service Provider Interface (SPI) for standard interfaces within a biometric system that support the provision of that biometric system using components...
Notice of Intent

Information technology - Biometric application...

This document defines the Application Programming Interface (API) and Service Provider Interface (SPI) for standard interfaces within a biometric system that support the provision of that biometric system using components...
Notice of Intent

Information technology -- Security techniques...

This International Standard provides detailed technical guidance on how organizations can define an appropriate level of risk mitigation by employing a well-proven and consistent approach to the planning, design...