No products
INCITS/ISO/IEC 9637-1 94th Edition, August 18, 1994 Information Technology - Computer Graphics - Interfacing Techniques for Dialogues with Graphical Devices (CGI) - Data Stream Binding Part 1: Character Encoding
INCITS/ISO/IEC 9637-2 92nd Edition, January 1, 1992 Information Technology - Computer Graphics - Interfacing Techniques for Dialogues with Graphical Devices (CGI) - Data Stream Binding - Part 2: Binary Encoding
INCITS/ISO/IEC 9638-3 94th Edition, January 1, 1994 Information Technology - Computer Graphics - Interfacing Techniques for Dialogues with Graphical Devices (CGI) - Language Bindings - Part 3: Ada
INCITS/ISO/IEC 9796 1991 Edition, September 15, 1991 Information Technology - Security Techniques - Digital Signature Scheme Giving Message Recovery
INCITS/ISO/IEC 9796-2 2nd Edition, 2008 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DIGITAL SIGNATURE SCHEMES GIVING MESSAGE RECOVERY - PART 2: MECHANISMS USING A HASH-FUNCTION
INCITS/ISO/IEC 9796-3 April 15, 2000 Information technology Security techniques Digital signature schemes giving message recovery Part 3: Discrete logarithm based mechanisms
INCITS/ISO/IEC 9797 1994 Edition, April 15, 1994 Information Technology - Security Techniques - Data Integrity Mechanism Using a Cryptographic Check function Employing a Block Cipher Algorithm
INCITS/ISO/IEC 9797-1 1999 Edition, December 15, 1999 Information technology Security techniques Message Authentication Codes (MACs) Part 1: Mechanisms using a block cipher
INCITS/ISO/IEC 9797-2 2002 Edition, June 1, 2002 Information technology Security techniques Message Authentication Codes (MACs) Part 2: Mechanisms using a dedicated hash-function
INCITS/ISO/IEC 9798-1 97th Edition, January 1, 1997 Information technology — Security techniques — Entity authentication — Part 1: General
INCITS/ISO/IEC 9798-2 8th Edition, January 1, 2008 Information technology - Security techniques - Entity authentication - Part 2: Mechanisms using symmetric encipherment algorithms
INCITS/ISO/IEC 9798-4 2nd Edition, 2005 Information technology Security techniques Entity authentication Part 4: Mechanisms using a cryptographic check function