Rechercher

Affiner les résultats
Code de la Classification internationale pour les normes (ICS)
Source
Code de l’organisme d’élaboration de normes (OEN)
Langue
Statut
Code de la Norme nationale du Canada (NNC)
Date de publication

De

à

Affichage 1371 - 1380 de 1727
Road vehicles — Security certificate management
ISO 20828:2006 establishes a uniform practice for the issuing and management of security certificates for use in Public Key Infrastructure applications. Assuming that all entities, intending to set up a secure data exchange to other entities based on private and public keys, are able to provide their own certificate, the certificate management scheme guarantees that the entities get all…
Éditeur :
ISO
Statut :
Annulée
Date de publication :
2006-06-27
Code(s) de l'ICS :
43.020
Information technology - Coding of audio-visual objects - Part 20: Lightweight Application Scene Rep...
ISO/IEC 14496-20:2006 defines a scene description format (LASeR) and an aggregation format (SAF) suitable for representing and delivering rich-media services to resource-constrained devices such as mobile phones. A rich media service is a dynamic, interactive collection of multimedia data such as audio, video, graphics, and text. Services range from movies enriched with vector graphic overlays…
Éditeur :
IEC
Statut :
Révisé
Date de publication :
2006-06-14
Code(s) de l'ICS :
35.040.40
Information technology — Coding of audio-visual objects — Part 20: Lightweight Application Scene Rep...
ISO/IEC 14496-20:2006 defines a scene description format (LASeR) and an aggregation format (SAF) suitable for representing and delivering rich-media services to resource-constrained devices such as mobile phones. A rich media service is a dynamic, interactive collection of multimedia data such as audio, video, graphics, and text. Services range from movies enriched with vector graphic overlays…
Éditeur :
ISO
Statut :
Annulée
Date de publication :
2006-06-14
Code(s) de l'ICS :
35.040.40
Modular order for the development of mechanical structures for electronic equipment practices - Part...
IEC 60917-2-3:2006 Provides additional dimensions for a modular range of subracks and associated plug-in units based on IEC 60917-2-2. A typical subrack consists of a frame design with mounting dimensions for installation into racks or cabinets in accordance with IEC 60917-2-1. The aperture dimensions of a subrack are specified in order to meet the mounting dimensions of front plug-in units. This…
Éditeur :
IEC
Statut :
Publié
Date de publication :
2006-05-08
Code(s) de l'ICS :
31.240
Modular order for the development of mechanical structures for electronic equipment practices - Part...
IEC 60917-2-3:2006 Provides additional dimensions for a modular range of subracks and associated plug-in units based on IEC 60917-2-2. A typical subrack consists of a frame design with mounting dimensions for installation into racks or cabinets in accordance with IEC 60917-2-1. The aperture dimensions of a subrack are specified in order to meet the mounting dimensions of front plug-in units. This…
Éditeur :
IEC
Statut :
Publié
Date de publication :
2006-05-08
Code(s) de l'ICS :
31.240
Information technology - Security techniques - Encryption algorithms - Part 2: Asymmetric ciphers
ISO/IEC 18033-2:2006 specifies encryption systems (ciphers) for the purpose of data confidentiality. The primary purpose of encryption (or encipherment) techniques is to protect the confidentiality of stored or transmitted data. An encryption algorithm is applied to data (often called plaintext or cleartext) to yield encrypted data (or ciphertext); this process is known as encryption. The…
Éditeur :
IEC
Statut :
Publié
Date de publication :
2006-05-07
Code(s) de l'ICS :
35.030
Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers
ISO/IEC 18033-2:2006 specifies encryption systems (ciphers) for the purpose of data confidentiality. The primary purpose of encryption (or encipherment) techniques is to protect the confidentiality of stored or transmitted data. An encryption algorithm is applied to data (often called plaintext or cleartext) to yield encrypted data (or ciphertext); this process is known as encryption. The…
Éditeur :
ISO
Statut :
Publié
Date de publication :
2006-05-07
Code(s) de l'ICS :
35.030
Information technology - Security techniques - Key management - Part 4: Mechanisms based on weak sec...
ISO/IEC 11770-4:2006 defines key establishment mechanisms based on weak secrets, i.e., secrets that can be readily memorized by a human, and hence secrets that will be chosen from a relatively small set of possibilities. It specifies cryptographic techniques specifically designed to establish one or more secret keys based on a weak secret derived from a memorized password, while preventing off-…
Éditeur :
IEC
Statut :
Révisé
Date de publication :
2006-05-03
Code(s) de l'ICS :
35.030
Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak sec...
ISO/IEC 11770-4:2006 defines key establishment mechanisms based on weak secrets, i.e., secrets that can be readily memorized by a human, and hence secrets that will be chosen from a relatively small set of possibilities. It specifies cryptographic techniques specifically designed to establish one or more secret keys based on a weak secret derived from a memorized password, while preventing off-…
Éditeur :
ISO
Statut :
Annulée
Date de publication :
2006-05-03
Code(s) de l'ICS :
35.030
Public key infrastructure for financial services — Practices and policy framework
ISO 21188:2006 sets out a framework of requirements to manage a PKI through certificate policies and certification practice statements and to enable the use of public key certificates in the financial services industry. It also defines control objectives and supporting procedures to manage risks. ISO 21188:2006 draws a distinction between PKI systems used in open, closed and contractual…
Éditeur :
ISO
Statut :
Annulée
Date de publication :
2006-04-20
Code(s) de l'ICS :
35.240.40

Spacer