Rechercher

Affiner les résultats
Code de la Classification internationale pour les normes (ICS)
Source
Code de l’organisme d’élaboration de normes (OEN)
Langue
Statut
Code de la Norme nationale du Canada (NNC)
Date de publication

De

à

Affichage 1341 - 1350 de 1727
Information technology - MPEG audio technologies - Part 1: MPEG Surround
ISO/IEC 23003-1:2007 (MPEG Surround) is efficient technology for multi-channel audio compression. Rather than performing a discrete coding of the individual audio input channels, MPEG Surround captures the spatial image of a multi-channel audio signal into a compact set of parameters that are used to synthesize a high quality multi-channel representation from a transmitted downmix signal. MPEG…
Éditeur :
IEC
Statut :
Publié
Date de publication :
2007-01-28
Code(s) de l'ICS :
35.040.40
Information technology — MPEG audio technologies — Part 1: MPEG Surround
ISO/IEC 23003-1:2007 (MPEG Surround) is efficient technology for multi-channel audio compression. Rather than performing a discrete coding of the individual audio input channels, MPEG Surround captures the spatial image of a multi-channel audio signal into a compact set of parameters that are used to synthesize a high quality multi-channel representation from a transmitted downmix signal. MPEG…
Éditeur :
ISO
Statut :
Publié
Date de publication :
2007-01-28
Code(s) de l'ICS :
35.040.40
Systems and software engineering - Life cycle processes - Risk management
ISO/IEC 16085:2006 defines a process for the management of risk in the life cycle. It can be added to the existing set of system and software life cycle processes defined by ISO/IEC 15288 and ISO/IEC 12207, or it can be used independently. ISO/IEC 16085:2006 can be applied equally to systems and software. Risk management is a key discipline for making effective decisions and communicating the…
Éditeur :
IEC
Statut :
Remplacé
Date de publication :
2006-12-07
Code(s) de l'ICS :
35.080
Systems and software engineering — Life cycle processes — Risk management
ISO/IEC 16085:2006 defines a process for the management of risk in the life cycle. It can be added to the existing set of system and software life cycle processes defined by ISO/IEC 15288 and ISO/IEC 12207, or it can be used independently. ISO/IEC 16085:2006 can be applied equally to systems and software. Risk management is a key discipline for making effective decisions and communicating the…
Éditeur :
ISO
Statut :
Annulée
Date de publication :
2006-12-07
Code(s) de l'ICS :
35.080
Information technology - Telecommunications and information exchange between systems - Corporate Tel...
ISO/IEC TR 26927:2006 identifies key mobility issues for access to IP-based enterprise information and communications services. It defines a taxonomy of mobility terms and then explores use cases and connectivity scenarios involving mobile enterprise users. From these, it derives requirements for mobility management, architecture and security. Mobility for enterprise communication is about making…
Éditeur :
IEC
Statut :
Révisé
Date de publication :
2006-11-30
Code(s) de l'ICS :
35.110
Information Technology - Security Techniques - Encryption Algorithms - Part 2: Asymmetric Ciphers
This National Standard of Canada is equivalent to International Standard ISO/IEC 18033-2:2006. 1 Scope This part of ISO/IEC 18033 specifies several asymmetric ciphers. These specifications prescribe the functional interfaces and correct methods of use of such ciphers in general, as well as the precise functionality and cipher text format for several specific asymmetric ciphers (although…
Éditeur :
CSA
Statut :
Norme
Date de publication :
2006-11-30
Code(s) de l'ICS :
35.040; 35.030
Information Technology - Security Techniques - Encryption Algorithms - Part 3: Block Ciphers
This National Standard of Canada is equivalent to International Standard ISO/IEC 18033-3:2005. 1 Scope This part of ISO/IEC 18033 specifies block ciphers. A block cipher maps blocks of n bits to blocks of n bits, under the control of a key of k bits. A total of six different block ciphers are defined. They are categorized in Table 1. The algorithms specified in this part of ISO/IEC 18033…
Éditeur :
CSA
Statut :
Annulée
Date de publication :
2006-11-30
Code(s) de l'ICS :
35.040
Information Technology - Security Techniques - Encryption Algorithms - Part 4: Stream Ciphers
This National Standard of Canada is equivalent to International Standard ISO/IEC 18033-4:2005. 1 Scope This part of ISO/IEC 18033 specifies stream cipher algorithms. A stream cipher is an encryption mechanism that uses a keystream to encrypt a plaintext in bitwise or block-wise manner. There are two types of stream cipher: a synchronous stream cipher, in which the keystream is only generated…
Éditeur :
CSA
Statut :
Annulée
Date de publication :
2006-11-30
Code(s) de l'ICS :
35.040
Information Technology - Security Techniques - Entity Authentication - Part 6: Mechanisms using Manu...
This National Standard of Canada is equivalent to International Standard ISO/IEC 9798-6:2005. 1 Scope This part of ISO/IEC 9798 specifies four entity authentication mechanisms based on manual data transfer between authenticating devices. As described in Annexes A and B, these mechanisms may be used to support key management functions; guidance on secure choice of parameters for the mechanisms…
Éditeur :
CSA
Statut :
Annulée
Date de publication :
2006-11-30
Code(s) de l'ICS :
35.040
Information technology — Telecommunications and information exchange between systems — Corporate Tel...
ISO/IEC TR 26927:2006 identifies key mobility issues for access to IP-based enterprise information and communications services. It defines a taxonomy of mobility terms and then explores use cases and connectivity scenarios involving mobile enterprise users. From these, it derives requirements for mobility management, architecture and security. Mobility for enterprise communication is about making…
Éditeur :
ISO
Statut :
Annulée
Date de publication :
2006-11-30
Code(s) de l'ICS :
35.110

Spacer