Nanomanufacturing - Key control characteristics - Part 6-22: Graphene-based material - Ash content: ...
IEC TS 62607-6-22:2022 establishes a standardized method to determine the key control characteristic
ash content
of powder and dispersion of graphene-based material by
incineration.
The ash content is derived by residue obtained after incineration under the operating conditions specified in this document, being divided by the mass of the dried test portion.
The method is…
Information security, cybersecurity and privacy protection — Security techniques — Security properti...
This document introduces security properties and provides best practices on the test and evaluation of white box cryptography (WBC). WBC is a cryptographic algorithm specialized for a key or secret, but where the said key cannot be extracted.
The WBC implementation can consist of plain source code for the cryptographic algorithm and/or of a device implementing the algorithm. In both cases,…
Information security, cybersecurity and privacy protection - Security techniques - Security properti...
This document introduces security properties and provides best practices on the test and evaluation of white box cryptography (WBC). WBC is a cryptographic algorithm specialized for a key or secret, but where the said key cannot be extracted.
The WBC implementation can consist of plain source code for the cryptographic algorithm and/or of a device implementing the algorithm. In both cases,…
Universal Serial Bus interfaces for data and power - Part 4-1: Universal Serial Bus 4 â„¢ Specificatio...
IEC 62680-4-1:2022 provides Universal Serial Bus 4â„¢ Specification.
USB 3.1 and USB 3.2 were evolutionary steps to increase bandwidth. The goal for USB4 remains the same with the added goal of helping to converge the USB Type-C® connector ecosystem and minimize end-user confusion. Several key design areas to meet this goal are listed below:
• Offer display, data, and load/store functionality…
Universal Serial Bus interfaces for data and power - Part 4-1: Universal Serial Bus 4 â„¢ Specificatio...
IEC 62680-4-1:2022 provides Universal Serial Bus 4â„¢ Specification.
USB 3.1 and USB 3.2 were evolutionary steps to increase bandwidth. The goal for USB4 remains the same with the added goal of helping to converge the USB Type-C® connector ecosystem and minimize end-user confusion. Several key design areas to meet this goal are listed below:
• Offer display, data, and load/store functionality…
Nanomanufacturing - Key control characteristics - Part 6-20: Graphene-based material - Metallic impu...
IEC TS 62607-6-20:2022 (EN) IEC TS 62607 establishes a standardized method to determine the chemical key control characteristic
- metallic impurity content
for powders of graphene-based materials by
- inductively coupled plasma mass spectrometry (ICP-MS).
The metallic impurity content is derived by the signal intensity of measured elements through MS spectrum of ICP-MS.
- The method is…
Intelligent transport systems — Roadside modules SNMP data interface — Part 7: Support features
Field devices are a key component in intelligent transport systems (ITS). Field devices include traffic signals, message signs, weather stations, traffic sensors, roadside equipment for connected ITS (C-ITS) environments, etc.
Field devices often need to exchange information with other external entities (managers). Field devices can be quite complex, necessitating the standardization of many data…
Intelligent transport systems — Roadside modules SNMP data interface — Part 5: Logs
Field devices are a key component in intelligent transport systems (ITS). Field devices include traffic signals, message signs, weather stations, traffic sensors, roadside equipment for connected ITS (C-ITS) environments, etc.
Field devices often need to exchange information with other external entities (managers). Field devices can be quite complex, necessitating the standardization of many data…
Intelligent transport systems — Roadside modules SNMP data interface — Part 4: Notifications
Field devices are a key component in intelligent transport systems (ITS). Field devices include traffic signals, message signs, weather stations, traffic sensors, roadside equipment for connected ITS (C-ITS) environments, etc.
Field devices often need to exchange information with other external entities (managers). Field devices can be quite complex, necessitating the standardization of many data…
Information security — Key management — Part 3: Mechanisms using asymmetric techniques
1 Scope
This document defines key management mechanisms based on asymmetric cryptographic techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals.
a) Establish a shared secret key for use in a symmetric cryptographic technique between two entities A and B by key agreement. In a secret key agreement mechanism, the secret key is computed as the result…