Rechercher

Affiner les résultats
Taper
Program
Status
Country
Province
City
Accreditation Sub-Programs
Program Specialty Area
GLP Area of Expertise
Field of Testing
Fields of Compliance
Date de publication

Di

à

Affichage de 3565 - 3576 de 11924
Avis d'intention

Technologies de l'information - Techniques de...

This part of ISO/IEC 9797 specifies six MAC algorithms that use a secret key and an n-bit block cipher to calculate an m-bit MAC. This part of ISO/IEC 9797 can be applied to the security services of any security architecture...
Avis d'intention

Technologies de l'information - Techniques de...

This part of ISO/IEC 9798 specifies an authentication model and general requirements and constraints for entity authentication mechanisms which use security techniques. These mechanisms are used to corroborate that an entity...
Avis d'intention

Technologies de l'information - Architecture ...

This part of ISO/IEC 14543 defines the mandatory and optional requirements for the mediumspecific Physical and Data Link Layers of radio frequency for network based control of HES Class 1 products and systems. It describes a...