Search

Refine Results
Type
Program
Status
Country
Province
City
Accreditation Sub-Programs
Program Specialty Area
GLP Area of Expertise
Field of Testing
Fields of Compliance
Period range

From

To

Displaying 4429 - 4440 of 10859
Notice of Intent

Information technology - Security techniques - ...

This part of ISO/IEC 18033 specifies block ciphers. A block cipher maps blocks of n bits to blocks of n bits, under the control of a key of k kits. A total of seven different block ciphers are defined. They are categorized in...
Notice of Intent

Information technology - Security techniques - ...

This part of ISO/IEC 11770 a) establishes the general model on which key management mechanisms are based, b) defines the basic concepts of key management which are common to all the parts of ISO/IEC 11770, c) specifies the...
Notice of Intent

Information technology - Automatic identification...

This International Standard specifies the requirements and test methods for physical and related attributes of a bar code master. It covers all forms of bar code master, irrespective of the mode of origination of the initial...
Notice of Intent

Information technology - Security techniques...

This part of ISO/IEC 9797 specifies six MAC algorithms that use a secret key and an n-bit block cipher to calculate an m-bit MAC. This part of ISO/IEC 9797 can be applied to the security services of any security architecture...
Notice of Intent

Information technology - Security techniques - ...

This part of ISO/IEC 9798 specifies an authentication model and general requirements and constraints for entity authentication mechanisms which use security techniques. These mechanisms are used to corroborate that an entity...
Notice of Intent

Information technology - Security techniques - ...

This part of ISO/IEC 9798 specifies eight entity authentication mechanisms based on manual data transfer between authenticating devices. It indicates how these mechanisms can be used to support key management functions, and...
Notice of Intent

Information technology - Security techniques - ...

This part of ISO/IEC 10118 specifies hash-functions which make use of an n-bit block cipher algorithm. They are therefore suitable for an environment in which such an algorithm is already implemented. Four hash-functions are...
Notice of Intent

Cardiac Defibrillators - Cardiac Defibrillators...

This technical report contains guidelines regarding the safe and effective operation and maintenance on CARDIAC DEFIBRILLATORS, as defined in clause 3 below, to be performed by medical and nursing personnel. This report does...
Notice of Intent

Cardiac Defibrillators - Cardiac Defibrillators...

This technical report contains guidelines regarding maintenance to be performed on CARDIAC DEFIBRILLATORS, as defined in clause 3 below, by clinical engineering personnel. This report does not apply to automatic implantable...