Refine Results
Displaying 12145 - 12156 of 12218
Notice of Intent
IT Security techniques — Entity authentication...
This document specifies entity authentication mechanisms using authenticated encryption algorithms. Four of the mechanisms provide entity authentication between two entities where no trusted third party is involved; two of...
Notice of Intent
IT Security techniques — Entity authentication...
This document specifies entity authentication mechanisms using digital signatures based on asymmetric techniques. A digital signature is used to verify the identity of an entity. Ten mechanisms are specified in this document...
Notice of Intent
Information security — Lightweight cryptography...
This document specifies broadcast authentication protocols, which are protocols that provide data integrity and entity authentication in a broadcast setting, i.e. a setting with one sender transmitting messages to many...
Notice of Intent
Information technology — Lightweight cryptography...
This document specifies MAC algorithms suitable for applications requiring lightweight cryptographic mechanisms. These mechanisms can be used as data integrity mechanisms to verify that data has not been altered in an...
Notice of Intent
Information technology — Telecommunications and...
This standard defines an extensible IEEE 802® media access independent services framework (i.e., function and protocol) that enables the optimization of services including handover service when performed between heterogeneous...
Notice of Intent
Information technology — Development of user ...
This document takes a holistic approach to the accessibility of information and communications technology (ICT) by combining guidance on implementing the accessibility of ICT systems (ICT accessibility) both at organizational...
Notice of Intent
Information technology — Conformance testing ...
This part of ISO/IEC 29109 specifies the concepts, test types and conformance testing methodologies to test biometric data interchange records, as specified in ISO/IEC 19794, or computer algorithms that create biometric data...
Notice of Intent
Security techniques — Extension to ISO/IEC 27001...
This document specifies requirements and provides guidance for establishing, implementing, maintaining and continually improving a Privacy Information Management System (PIMS) in the form of an extension to ISO/IEC 27001 and...
Notice of Intent
Software and systems engineering — Certification...
This document is part one of the ISO/IEC 24773 series. It contains the requirements which will be common to all other parts of the ISO/IEC 24773 series, for certifications (schemes and bodies) in the domain of software and...
Notice of Intent
IT Security and Privacy — A framework for identity...
This document defines terms for identity management, and specifies core concepts of identity and identity management and their relationships. It is applicable to any information system that processes identity information.
Notice of Intent
Information security management — Guidelines ...
This document provides guidelines when considering purchasing cyber-insurance as a risk treatment option to manage the impact of a cyber-incident within the organization’s information security risk management framework. This...
Notice of Intent
Information technology — Security techniques — ...
This document establishes commonly accepted control objectives, controls and guidelines for implementing measures to protect Personally Identifiable Information (PII) in line with the privacy principles in ISO/IEC 29100 for...