Search results

Search list

Results in:

1-10 of 15 results

Biotechnology - General requirements and considerations for cell line authentication

Information security - Message authentication codes (MACs) - Part 2: Mechanisms using a dedicated hash-function - Technical Corrigendum 1

Information technology - Security techniques - Anonymous entity authentication - Part 4: Mechanisms based on weak secrets - Amendment 1

Information technology - Security techniques - Entity authentication - Part 5: Mechanisms using zero-knowledge techniques

Personal identification - ISO-compliant driving licence - Part 3: Access control, authentication and integrity validation

Cards and security devices for personal identification - Interindustry mechanism of data credibility enhancement with personal identification and authentication

Cards and security devices for personal identification - ISO UAS license and drone/UAS security module - Part 3: Logical data structure, access control, authentication and integrity validation for drone license

IT Security and Privacy - A framework for identity management - Part 4: Authenticators, Credentials and Authentication

Qi Specification version 2.0 - Part 9: Authentication Protocol

Information security, cybersecurity and privacy protection - Entity authentication assurance framework

TOP