Electrotechincal

Electrotechincal



KSISO IEC/TR 33015:2019

Information Technology - Process assessment - Guidance for process risk determination

Provides guidance on the application of the results of a process assessment for process risk determination...

Kes 3,862.00

KSISO/IEC 21472:2021

Information technology - Scenario evaluation methodology for user interaction influence in biometric system performance

Addresses requirements for planning, executing and reporting the influence of user interaction on biometric system performance based on scenario test methodologies,..

Kes 3,167.00

KSISO/IEC 24761:2019

Information technology - Security techniques Authentication context for biometrics

Defines the structure and the data elements of Authentication Context for Biometrics (ACBio), which is used for checking the validity of the result of a biometric enrolment and verification process executed at a remote site..

Kes 5,685.00

KSISO/IEC TR 27550:2019

Information technology - Security techniques Privacy engineering for system life cycle processes

Provides privacy engineering guidelines that are intended to help organizations integrate recent advances in privacy engineering into system life cycle processes..

Kes 4,820.00

KSISO/IEC 20543:2019

Information technology - Security techniques Test and analysis methods for random bit generators within ISO/IEC 19790 and ISO/IEC 15408

Specifies a methodology for the evaluation of non-deterministic or deterministic random bit generators intended to be used for cryptographic applications..

Kes 5,562.00

KS ISO IEC/TS 20540

Information technology - Security techniques - Testing cryptographic modules in their operational environment

Provides recommendations and checklists which can be used to support the specification and operational testing of cryptographic modules in their operational environment within an organizations security system..

Kes 5,407.00

KS ISO/IEC30111:2019

Information technology - Security techniques - Vulnerability handling processes.

Gives guidelines for how to process and resolve potential vulnerability information in a product or online service...

Kes 3,167.00

Showing 881 to 890 of 918 (92 Pages)