Affiner les résultats
Affichage de 37 - 48 de 62
Avis d'intention
Technologies de l'information - Techniques de...
This part of ISO/IEC 11770 defines key management mechanisms based on asymmetric cryptographic techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals. a) Establish a shared...
Avis d'intention
Amendement 1 - Technologies de l'information - ...
This part of ISO/IEC 23001 specifies common encryption formats for use in any file format based on ISO/IEC 14496-12. File, track, and track fragment metadata is specified to enable multiple digital rights and key management...
Avis d'intention
Sécurité de l'information - Génération de nombres...
This document specifies mechanisms to establish shared symmetric keys between groups of entities. It defines: — symmetric key-based key establishment mechanisms for multiple entities with a key distribution centre (KDC); and...
Avis d'intention
Technologies de l’information - Techniques de...
This document specifies key derivation functions, i.e. functions which take secret information and other (public) parameters as input and output one or more “derived” secret keys. Key derivation functions based on MAC...
Avis d'intention
Technologies de l'information - Classement international...
This document defines the following. — A reference comparison method. This method is applicable to two character strings to determine their collating order in a sorted list. The method can be applied to strings containing...
Avis d'intention
Techniques de sécurité IT - Algorithmes de chiffrement...
This document specifies the following mechanisms for homomorphic encryption. — Exponential ElGamal encryption; — Paillier encryption. For each mechanism, this document specifies the process for: — generating parameters and...
Avis d'intention
Technologies de l'information Classement international...
This document defines the following. — A reference comparison method. This method is applicable to two character strings to determine their collating order in a sorted list. The method can be applied to strings containing...
Avis d'intention
Technologies de l'information - Ordre et comparaison...
This International Standard defines the following. - A reference comparison method. This method is applicable to two character strings to determine their collating order in a sorted list. The method can be applied to strings...
Avis d'intention
Technologies de l'information - Ordre et comparaison...
This International Standard defines the following. - A reference comparison method. This method is applicable to two character strings to determine their collating order in a sorted list. The method can be applied to strings...
Avis d'intention
Cartes d’identification — Integrated circuit ...
This Standard provides an authentication protocol suitable for use in physical and logical access control systems based on ICCs and related systems which support standards based AES-128 and RSA-2048 ciphers and the SHA-256...
Avis d'intention
Technologies de l'information - Cadre multimédia...
This part of ISO/IEC 21000 specifies how to include IPMP information and protected parts of Digital Items in a DIDL document. It purposely does not specify protection measures, keys, key management, trust management...
Avis d'intention
Technologies de l'information — Classement international...
This International Standard defines the following. — A reference comparison method. This method is applicable to two character strings to determine their collating order in a sorted list. The method can be applied to strings...
Spacer