Affiner les résultats
Affichage de 2161 - 2172 de 2728
Avis d'intention
Télécommunications et échange entre systèmes ...
1.1 Scope This standard specifies Bridges that interconnect individual LANs, each supporting the IEEE 802 MAC Service using a different or identical media access control method, to provide Bridged Networks and VLANs.
Avis d'intention
Technologies de l'information - Contrôle et contexte...
This document specifies the conformance and reference software implementing the normative clauses of all parts of the ISO/IEC 23005 series. The information provided is applicable for determining the reference software modules...
Avis d'intention
Cartes d´identification - Cartes à circuit intégré...
This document specifies interindustry commands which can be used for security operations. This document also provides informative directives on how to construct security mechanisms with commands defined in ISO/IEC 7816-4. The...
Avis d'intention
Techniques de sécurité IT - Authentification ...
This document specifies entity authentication mechanisms using authenticated encryption algorithms. Four of the mechanisms provide entity authentication between two entities where no trusted third party is involved; two of...
Avis d'intention
Technologies de l'information - Codage des objets...
This document specifies the storage format for streams of video that is structured AVC (ISO/IEC 14496-10) and HEVC (ISO/IEC 23008-2) video streams
Avis d'intention
Technologies de l'information - Objet orienté...
This part of ISO/IEC 30106 specifies an architecture for a set of interfaces which define the OO BioAPI. Components defined in this part of ISO/IEC 30106 include a framework, Biometric Service Providers (BSPs), Biometric...
Avis d'intention
Technologies de l'information - Codage des objets...
This document specifies the Open Font Format (OFF) specification, including the TrueType and Compact Font Format (CFF) outline formats. Many references to both TrueType and PostScript exist throughout this document, as Open...
Avis d'intention
Techniques de sécurité IT - Authentification ...
This document specifies entity authentication mechanisms using digital signatures based on asymmetric techniques. A digital signature is used to verify the identity of an entity. Ten mechanisms are specified in this document...
Avis d'intention
Technologies de l´information - Télécommunications...
This standard defines Ethernet local area, access and metropolitan area networks. Ethernet is specified at selected speeds of operation; and uses a common media access control (MAC) specification and management information...
Avis d'intention
Technologies de l´information - Télécommunications...
This standard defines Ethernet local area, access and metropolitan area networks. Ethernet is specified at selected speeds of operation; and uses a common media access control (MAC) specification and management information...
Avis d'intention
Technologies de l´information - Télécommunications...
This standard defines Ethernet local area, access and metropolitan area networks. Ethernet is specified at selected speeds of operation; and uses a common media access control (MAC) specification and management information...
Avis d'intention
Technologies de l´information - Télécommunications...
This standard defines Ethernet local area, access and metropolitan area networks. Ethernet is specified at selected speeds of operation; and uses a common media access control (MAC) specification and management information...