Rechercher

Affiner les résultats
Taper
Program
Status
Country
Province
City
Accreditation Sub-Programs
Program Specialty Area
Field of Testing
Date de publication

Di

à

Affichage de 1501 - 1512 de 5205
Technologies de l'information - Techniques de sécurité - Gestion de clés - Partie 3: Mécanismes utilisant des techniques asymétriques
This part of ISO/IEC 11770 defines key management mechanisms based on asymmetric cryptographic techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals. 1) Establish a shared...
Avis d'intention

Technologies de l'information - Registres de ...

This part of ISO/IEC 11179 provides the means for understanding and associating the individual parts of ISO/IEC 11179 and is the foundation for a conceptual understanding of metadata and metadata registries. This part of ISO...

Spacer