Affiner les résultats
Affichage de 25 - 36 de 62
Avis d'intention
Amendment 1 - Technologies de l'information - ...
ISO/IEC 10118 (all parts) specifies hash-functions and is therefore applicable to the provision of authentication, integrity and non-repudiation services. Hash-functions map strings of bits of variable (but usually upper...
Avis d'intention
Technologies de l'information — Techniques de...
This part of ISO/IEC 18033 specifies several asymmetric ciphers. These specifications prescribe the functional interfaces and correct methods of use of such ciphers in general, as well as the precise functionality and cipher...
Avis d'intention
Technologies de l'information - Techniques de...
This part of ISO/IEC 18033 specifies several asymmetric ciphers. These specifications prescribe the functional interfaces and correct methods of use of such ciphers in general, as well as the precise functionality and cipher...
Avis d'intention
Sécurité de l'information - Gestion de clés - ...
This document specifies mechanisms to establish shared symmetric keys between groups of entities. It defines: — symmetric key-based key establishment mechanisms for multiple entities with a key distribution centre (KDC); and...
Avis d'intention
Technologies de l’information — Disposition des...
Within the general scope described in ISO/IEC 9995-1, ISO 9995-9:2016 defines the allocation on a keyboard of a set of graphic characters which, when used in combination with an existing national version keyboard layout...
Avis d'intention
AMENDEMENT 1 - Technologies de l'information...
Within the general scope described in ISO/IEC 9995-1, this part of ISO 9995 defines the allocation on a keyboard of a set of graphic characters which, when used in combination with an existing national version keyboard layout...
Avis d'intention
Technologie InInformation - Techniques de sécurité...
The purpose of key management is to provide procedures for handling cryptographic keying material to be used in symmetric or asymmetric cryptographic algorithms according to the security policy in force. This part of ISO/IEC...
Avis d'intention
Technologies de l'information - Techniques de...
This part of ISO/IEC 11770 defines key management mechanisms based on asymmetric cryptographic techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals. 1) Establish a shared...
Avis d'intention
Techniques de sécurité IT - Gestion de clés - ...
Scope The purpose of key management is to provide procedures for handling cryptographic keying material to be used in symmetric or asymmetric cryptographic algorithms according to the security policy in force. This part of...
Avis d'intention
Technologies de l'information - Techniques de...
Scope This part of ISO/IEC 11770 defines key management mechanisms based on asymmetric cryptographic techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals. 1) Establish a shared...
Avis d'intention
Sécurité de l'information - Gestion de clés - ...
This document defines key management mechanisms based on asymmetric cryptographic techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals. a) Establish a shared secret key for use...
Avis d'intention
Technologies de l'information — Techniques de...
This part of ISO/IEC 11770 defines key management mechanisms based on asymmetric cryptographic techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals. a) Establish a shared...
Spacer