Information technology - Security techniques - Cryptographic algorithms and security mechanisms conf...
ISO/IEC 18367:2016 gives guidelines for cryptographic algorithms and security mechanisms conformance testing methods.
Conformance testing assures that an implementation of a cryptographic algorithm or security mechanism is correct whether implemented in hardware, software or firmware. It also confirms that it runs correctly in a specific operating environment. Testing can consist of known-answer…
Matériaux magnétiques - Partie 8-6: Spécifications pour matériaux particuliers - Matériaux métalliqu...
L’IEC 60404-8-6:2016 spécifie les exigences générales, les propriétés magnétiques, les caractéristiques géométriques et leurs tolérances, ainsi que les modes de contrôle pour le fer pur, le fer-silicium, le fer-nickel et le fer-cobalt. Les matériaux se présentent sous forme de barres, billettes, tôles, bandes ou fils. Les alliages concernés correspondent à ceux définis par les classes A, C1, C2,…
Information technology — Security techniques — Cryptographic algorithms and security mechanisms conf...
ISO/IEC 18367:2016 gives guidelines for cryptographic algorithms and security mechanisms conformance testing methods.
Conformance testing assures that an implementation of a cryptographic algorithm or security mechanism is correct whether implemented in hardware, software or firmware. It also confirms that it runs correctly in a specific operating environment. Testing can consist of known-answer…
Automatic identification and data capture techniques — Bar code print quality test specification — L...
ISO/IEC 15416:2016:
- specifies the methodology for the measurement of specific attributes of bar code symbols;
- defines a method for evaluating these measurements and deriving an overall assessment of symbol quality; and
- provides information on possible causes of deviation from optimum grades to assist users in taking appropriate corrective action.
ISO/IEC 15416:2016 applies to…
Automatic identification and data capture techniques - Bar code print quality test specification - L...
ISO/IEC 15416:2016:
- specifies the methodology for the measurement of specific attributes of bar code symbols;
- defines a method for evaluating these measurements and deriving an overall assessment of symbol quality; and
- provides information on possible causes of deviation from optimum grades to assist users in taking appropriate corrective action.
ISO/IEC 15416:2016 applies to…
Information technology — Open distributed processing — Reference model — Enterprise language
This Recommendation | International Standard provides:
a) a language (the enterprise language) comprising concepts, structures, and rules for developing,
representing and reasoning about a specification of an ODP system from the enterprise viewpoint
(as defined in Rec. ITU-T X.903 | ISO/IEC 10746-3);
b) rules which establish correspondences between the enterprise language and the other viewpoint…
Information technology — Automatic identification and data capture techniques — Bar code verifier co...
This part of ISO/IEC 15426 defines test methods and minimum accuracy criteria applicable to verifiers
using the methodologies of ISO/IEC 15415 for multi-row bar code symbols and two-dimensional matrix
symbologies, and specifies reference calibration standards against which these should be tested. This
part of ISO/IEC 15426 provides for testing of representative samples of the equipment.
NOTE ISO/…
Information technology — Automatic identification and data capture techniques — QR Code bar code sym...
This International Standard defines the requirements for the symbology known as QR Code. It specifies
the QR Code symbology characteristics, data character encoding methods, symbol formats, dimensional
characteristics, error correction rules, reference decoding algorithm, production quality requirements,
and user-selectable application parameters.
Information technology — Automatic identification and data capture techniques — PDF417 bar code symb...
This International Standard specifies the requirements for the bar code symbology known as PDF417.
It specifies PDF417 symbology characteristics, data character encodation, symbol formats, dimensions,
error correction rules, reference decoding algorithm, and a number of application parameters.
Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric ...
This part of ISO/IEC 11770 defines key management mechanisms based on asymmetric cryptographic
techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals.
a) Establish a shared secret key for use in a symmetric cryptographic technique between two entities
A and B by key agreement. In a secret key agreement mechanism, the secret key is computed as
the…