Rechercher

Affiner les résultats
Code de la Classification internationale pour les normes (ICS)
Source
Code de l’organisme d’élaboration de normes (OEN)
Langue
Statut
Code de la Norme nationale du Canada (NNC)
Date de publication

De

à

Affichage 581 - 590 de 5305
Information security — Prime number generation
This document specifies methods for generating and testing prime numbers as required in cryptographic protocols and algorithms. Firstly, this document specifies methods for testing whether a given number is prime. The testing methods included in this document are divided into two groups: — probabilistic primality tests, which have a small error probability. All probabilistic tests described…
Éditeur :
ISO
Statut :
Publié
Date de publication :
2020-12-01
Code(s) de l'ICS :
35.030
Information security - Prime number generation
This document specifies methods for generating and testing prime numbers as required in cryptographic protocols and algorithms. Firstly, this document specifies methods for testing whether a given number is prime. The testing methods included in this document are divided into two groups: — probabilistic primality tests, which have a small error probability. All probabilistic tests described…
Éditeur :
IEC
Statut :
Publié
Date de publication :
2020-12-01
Code(s) de l'ICS :
35.030
Information technology — Open systems interconnection — Part 9: The Directory: Replication
This document specifies a shadow service which Directory system agents (DSAs) may use to replicate Directory information. The service allows Directory information to be replicated among DSAs to improve service to Directory users. The shadowed information is updated, using the defined protocol, thereby improving the service provided to users of the Directory.
Éditeur :
ISO
Statut :
Publié
Date de publication :
2020-11-30
Code(s) de l'ICS :
35.100.70
Information technology — Open systems interconnection — Part 5: The Directory: Protocol specificatio...
This document specifies the Directory Access Protocol, the Directory System Protocol, the Directory Information Shadowing Protocol, and the Directory Operational Binding Management Protocol which fulfil the abstract services specified in Rec. ITU-T X.511 | ISO/IEC 9594-3, Rec. ITU-T X.518 | ISO/IEC 9594-4, Rec. ITU‑T X.525 | ISO/IEC 9594-9, and Rec. ITU-T X.501 | ISO/IEC 9594-2.
Éditeur :
ISO
Statut :
Publié
Date de publication :
2020-11-30
Code(s) de l'ICS :
35.100.70
Information technology - Open systems interconnection - Part 5: The Directory: Protocol specificatio...
This document specifies the Directory Access Protocol, the Directory System Protocol, the Directory Information Shadowing Protocol, and the Directory Operational Binding Management Protocol which fulfil the abstract services specified in Rec. ITU-T X.511 | ISO/IEC 9594-3, Rec. ITU-T X.518 | ISO/IEC 9594-4, Rec. ITU‑T X.525 | ISO/IEC 9594-9, and Rec. ITU-T X.501 | ISO/IEC 9594-2.
Éditeur :
IEC
Statut :
Publié
Date de publication :
2020-11-30
Code(s) de l'ICS :
35.100.70
Information technology - Open systems interconnection - Part 9: The Directory: Replication
This document specifies a shadow service which Directory system agents (DSAs) may use to replicate Directory information. The service allows Directory information to be replicated among DSAs to improve service to Directory users. The shadowed information is updated, using the defined protocol, thereby improving the service provided to users of the Directory.
Éditeur :
IEC
Statut :
Publié
Date de publication :
2020-11-30
Code(s) de l'ICS :
35.100.70
Information security — Authenticated encryption
This document specifies five methods for authenticated encryption, i.e. defined ways of processing a data string with the following security objectives: — data confidentiality, i.e. protection against unauthorized disclosure of data; — data integrity, i.e. protection that enables the recipient of data to verify that it has not been modified; — data origin authentication, i.e.…
Éditeur :
ISO
Statut :
Publié
Date de publication :
2020-11-26
Code(s) de l'ICS :
35.030
Information security - Authenticated encryption
This document specifies five methods for authenticated encryption, i.e. defined ways of processing a data string with the following security objectives: — data confidentiality, i.e. protection against unauthorized disclosure of data; — data integrity, i.e. protection that enables the recipient of data to verify that it has not been modified; — data origin authentication, i.e.…
Éditeur :
IEC
Statut :
Publié
Date de publication :
2020-11-26
Code(s) de l'ICS :
35.030
Industrial automation systems and integration — Product data representation and exchange — Part 238:...
This document specifies an application interpreted model (AIM) based on the application reference model for machining defined by ISO 14649-10, ISO 14649-11, ISO 14649-12, ISO 14649-111 and ISO 14649-121, augmented with ISO 10303 product geometry, geometric dimensioning and tolerancing and product data management information.
Éditeur :
ISO
Statut :
Annulée
Date de publication :
2020-11-25
Code(s) de l'ICS :
25.040.40
Fire safety engineering — Verification and validation protocol for building fire evacuation models
This document describes a protocol for the verification and validation of building fire evacuation models. This document mostly addresses evacuation model components as they are in microscopic (agent-based) models. Nevertheless, it can be adopted (entirely or partially) for macroscopic models if the model is able to represent the components under consideration. The area of application of the…
Éditeur :
ISO
Statut :
Publié
Date de publication :
2020-11-18
Code(s) de l'ICS :
13.220.01

Spacer