No products
INCITS/ISO/IEC 18032 5th Edition, August 29, 2005 Information technology — Security techniques — Prime number generation
INCITS/ISO/IEC 18033-1 5th Edition, November 3, 2005 Information technology — Security techniques — Encryption algorithms — Part 1: General
INCITS/ISO/IEC 18033-2 6th Edition, January 1, 2006 Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers
INCITS/ISO/IEC 18033-3 2005 Edition, October 7, 2005 Information technology — Security techniques — Encryption algorithms — Part 3: Block ciphers
INCITS/ISO/IEC 18033-4 2005 Edition, October 7, 2005 Information technology — Security techniques — Encryption algorithms — Part 4: Stream ciphers
INCITS/ISO/IEC 18035 3rd Edition, February 1, 2003 Information technology Icon symbols and functions for controlling multimedia software applications
INCITS/ISO/IEC 18043 6th Edition, January 1, 2006 Information technology — Security techniques — Selection, deployment and operations of intrusion detection systems
INCITS/ISO/IEC 18045 8th Edition, July 1, 2008 Information technology — Security techniques — Methodology for IT security evaluation
INCITS/ISO/IEC 18050 6th Edition, January 1, 2006 Information technology — Office equipment — Print quality attributes for machine readable Digital Postage Marks
INCITS/ISO/IEC 18092 13th Edition, January 1, 2013 Information technology - Telecommunications and information exchange between systems - Near Field Communication - Interface and Protocol (NFCIP-1)
INCITS/ISO/IEC 18093 1999 Edition, December 15, 1999 Information technology Data interchange on 130 mm optical disk cartridges of type WORM (Write Once Read Many) using irreversible effects Capacity: 5,2 Gbytes per cartridge
INCITS/ISO/IEC 18809 December 15, 2000 Information technology - 8 mm wide magnetic tape cartridge for information interchange - Helical scan recording AIT-1 with MIC format