Electrotechincal

Electrotechincal



KS ISOIEC4922-2:2024

Information security-Secure multiparty computation-Part 2:Mechanisms based on secret sharing .

Specifies the processes for secure multiparty computation mechanisms based on the secret sharing techniques which are specified in ISO/IEC 19592-2...

Kes 3,862.00

KS ISO/IEC 23837-2:2023

Information security-Security requirements, test and evaluation methods for quantum key distribution-Part 2:Evaluation and testing methods.

Specifies test and evaluation methods for the security evaluation of quantum key distribution (QKD)...

Kes 9,115.00

KSISOIECTR24722:2015

Information technology Biometrics Multimodal and other multibiometric fusion

Contains descriptions of and analyses of current practices on multimodal and other multibiometric fusion, including (as appropriate) references to more detailed descriptions...

Kes 3,437.00

KSISO/IEC TS 20748-4

Information technology for learning, education and training Learning analytics interoperability - Part 4: Privacy and data protection policies

Specifies privacy and data protection requirements and attributes to inform design of learning analytics systems and learning analytics practices in schools, universities, workplace learning and blended learning settings...

Kes 3,437.00

KSISOIECTR30117:2021

Information technology Guide to on-card biometric comparison standards and applications.

Summarizes how the international standards, recommendations and technical reports dealing with identification cards, biometrics and/or information security relate to each other with regard to the joint use of biometrics and integrated circuit cards..

Kes 3,437.00

KS ISO/IEC 30105-8:2022

Information technology IT Enabled Services-Business Process Outsourcing (ITES-BPO) lifecycle processes Part 8: Continual performance improvement (CPI) of ITES-BPO

Specifies a continual performance improvement (CPI) methodology and its major elements, which extend the already-defined continual improvement process (TEN8) in ISO/IEC 30105-1...

Kes 3,605.00

KS 2416-3: 2014

Information technology learning, education and training- part 3: Network components to support eLearning

specifies the minimum network requirements to support in the effective use of IT for Learning, Education and Training (IT LET)...

Kes 3,167.00

KS ISO/IEC19772:2020

Information technology Security techniques Authenticated encryption

specifies six methods for authenticated encryption, i.e. defined ways of processing a data string with the following security objectives: o data confidentiality, i.e. protection against unauthorized disclosure of data,..

Kes 3,605.00

KS ISO/IEC18032:2020

Information technology Security techniques Prime number generation

specifies methods for generating and testing prime numbers as required in cryptographic protocols and algorithms..

Kes 3,167.00

Showing 841 to 850 of 913 (92 Pages)