Rechercher

Affiner les résultats
Code de la Classification internationale pour les normes (ICS)
Source
Code de l’organisme d’élaboration de normes (OEN)
Langue
Statut
Code de la Norme nationale du Canada (NNC)
Date de publication

De

à

Affichage 1101 - 1110 de 2984
Information technology - Automatic identification and data capture techniques - Reading and display ...
ISO/IEC 16480:2015 specifies a method to assess the symbol quality rendered on electronic displays (i.e. the symbol produces its own light) when the reading device is a two-dimensional bar code imager. In addition, this international standard specifies a method to assess the quality of symbols that are intended to be read with general-purpose cameras in ambient lighting conditions. Further, this…
Éditeur :
IEC
Statut :
Publié
Date de publication :
2015-08-13
Code(s) de l'ICS :
35.040.50
Space data and information transfer systems — CCSDS Space Link Protocols over ETSI DVB-S2 Standard
The DVB-S2 standard (reference [1]) proposes advanced modulation techniques (QPSK, 8PSK, 16APSK, and 32APSK) and a wide range of coding rates (from 1/4 to 9/10) with near-Shannon coding schemes (LDPC codes). This high number of modulation and coding schemes allows a wide range of possibilities to satisfy specific mission constraints. Moreover, to maximize the telemetry system throughput, it…
Éditeur :
ISO
Statut :
Publié
Date de publication :
2015-08-10
Code(s) de l'ICS :
49.140
Space data and information transfer systems — Delta-DOR Raw Data Exchange Format
Delta-DOR (Delta Differential One-Way Ranging) is a Very Long Baseline Interferometry (VLBI) technique that can be used in conjunction with Doppler and ranging data to improve spacecraft navigation by more efficiently determining spacecraft angular position in the plane of sky. It involves the use of multiple ground stations, possibly belonging to different agencies, for simultaneous acquisition…
Éditeur :
ISO
Statut :
Publié
Date de publication :
2015-08-10
Code(s) de l'ICS :
49.140
Information technology — Security techniques — Network security — Part 1: Overview and concepts
ISO/IEC 27033-1:2015 provides an overview of network security and related definitions. It defines and describes the concepts associated with, and provides management guidance on, network security. (Network security applies to the security of devices, security of management activities related to the devices, applications/services, and end-users, in addition to security of the information being…
Éditeur :
ISO
Statut :
Publié
Date de publication :
2015-08-09
Code(s) de l'ICS :
35.030
Technologies de l'information — Techniques automatiques d'identification et de capture des...
Éditeur :
ISO
Statut :
Annulée
Date de publication :
2015-08-09
Code(s) de l'ICS :
35.040.50
Information technology — Automatic identification and data capture techniques — Bar code verifier co...
ISO/IEC 15426-2:2015 defines test methods and minimum accuracy criteria applicable to verifiers using the methodologies of ISO/IEC 15415 for multi-row bar code symbols and two-dimensional matrix symbologies, and specifies reference calibration standards against which these should be tested. It provides for testing of representative samples of the equipment. NOTE ISO/IEC 15426‑1 applies…
Éditeur :
ISO
Statut :
Annulée
Date de publication :
2015-08-09
Code(s) de l'ICS :
35.040.50
Information technology - Security techniques - Network security - Part 1: Overview and concepts
ISO/IEC 27033-1:2015 provides an overview of network security and related definitions. It defines and describes the concepts associated with, and provides management guidance on, network security. (Network security applies to the security of devices, security of management activities related to the devices, applications/services, and end-users, in addition to security of the information being…
Éditeur :
IEC
Statut :
Publié
Date de publication :
2015-08-09
Code(s) de l'ICS :
35.030
Information technology - Automatic identification and data capture techniques - Bar code verifier co...
ISO/IEC 15426-2:2015 defines test methods and minimum accuracy criteria applicable to verifiers using the methodologies of ISO/IEC 15415 for multi-row bar code symbols and two-dimensional matrix symbologies, and specifies reference calibration standards against which these should be tested. It provides for testing of representative samples of the equipment. NOTE ISO/IEC 15426‑1 applies…
Éditeur :
IEC
Statut :
Révisé
Date de publication :
2015-08-09
Code(s) de l'ICS :
35.040.50
Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric ...
ISO/IEC 11770-3:2015 defines key management mechanisms based on asymmetric cryptographic techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals: a) establish a shared secret key for use in a symmetric cryptographic technique between two entities A and B by key agreement. In a secret key agreement mechanism, the secret key is computed as the result of…
Éditeur :
ISO
Statut :
Annulée
Date de publication :
2015-08-03
Code(s) de l'ICS :
35.030
Information technology - Security techniques - Key management - Part 3: Mechanisms using asymmetric ...
ISO/IEC 11770-3:2015 defines key management mechanisms based on asymmetric cryptographic techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals: a) establish a shared secret key for use in a symmetric cryptographic technique between two entities A and B by key agreement. In a secret key agreement mechanism, the secret key is computed as the result of…
Éditeur :
IEC
Statut :
Révisé
Date de publication :
2015-08-03
Code(s) de l'ICS :
35.030