Information technology - Telecommunications and information exchange between systems - NFC Security ...
ISO/IEC 13157-5:2016 specifies the message contents and the cryptographic mechanisms for PID 04.
ISO/IEC 13157-5:2016 specifies key agreement and confirmation mechanisms providing mutual authentication, using symmetric cryptography.
ISO/IEC 13157-5:2016 adds entity authentication to the services provided by ISO/IEC 13157-3 (ECMA‑409) NFC-SEC-02.
Information technology — Telecommunications and information exchange between systems — NFC Security ...
ISO/IEC 13157-4:2016 specifies the message contents and the cryptographic mechanisms for PID 03.
ISO/IEC 13157-4:2016 specifies key agreement and confirmation mechanisms providing mutual authentication, using asymmetric cryptography, and the transport protocol requirements for the exchange between Sender and TTP.
NOTE ISO/IEC 13157-4:2016 adds entity authentication to the services provided by…
Information technology — Telecommunications and information exchange between systems — NFC Security ...
ISO/IEC 13157-5:2016 specifies the message contents and the cryptographic mechanisms for PID 04.
ISO/IEC 13157-5:2016 specifies key agreement and confirmation mechanisms providing mutual authentication, using symmetric cryptography.
ISO/IEC 13157-5:2016 adds entity authentication to the services provided by ISO/IEC 13157-3 (ECMA‑409) NFC-SEC-02.
Household and similar electrical appliances - Safety - Part 2-29: Particular requirements for batter...
IEC 60335-2-29:2016 RLV contains both the official IEC International Standard and its Redline version. The Redline version is available in English only and provides you with a quick and easy way to compare all the changes between the official IEC Standard and its previous edition.
IEC 60335-2-29:2016 deals with the safety of electric battery chargers for household and similar use having an…
Household and similar electrical appliances - Safety - Part 2-23: Particular requirements for applia...
IEC 60335-2-23:2016 RLV contains both the official IEC International Standard and its Redline version. The Redline version is available in English only and provides you with a quick and easy way to compare all the changes between the official IEC Standard and its previous edition.
IEC 60335-2-23:2016 deals with the safety of electric appliances for the care of skin or hair of persons or animals…
Household and similar electrical appliances - Safety - Part 2-23: Particular requirements for applia...
IEC 60335-2-23:2016 deals with the safety of electric appliances for the care of skin or hair of persons or animals and intended for household and similar purposes, their rated voltage being not more than 250 V. Examples of appliances that are within the scope of this standard are:
- curling combs;
- curling irons;
- curling rollers with separate heaters;
- facial saunas;
- hairdryers;
-…
Household and similar electrical appliances - Safety - Part 2-29: Particular requirements for batter...
IEC 60335-2-29:2016 deals with the safety of electric battery chargers for household and similar use having an output not exceeding 120 V ripple-free direct current, their rated voltage being not more than 250 V. Battery chargers intended for charging batteries in a household end use application outside the scope of the IEC 60335 series of standards are within the scope of this standard.…
Information technology - Message Queuing Telemetry Transport (MQTT) v3.1.1
ISO/IEC 20922:2016 is a Client Server publish/subscribe messaging transport protocol. It is light weight, open, simple, and designed so as to be easy to implement. These characteristics make it ideal for use in many situations, including constrained environments such as for communication in Machine to Machine (M2M) and Internet of Things (IoT) contexts where a small code footprint is required and…
Information technology — Message Queuing Telemetry Transport (MQTT) v3.1.1
ISO/IEC 20922:2016 is a Client Server publish/subscribe messaging transport protocol. It is light weight, open, simple, and designed so as to be easy to implement. These characteristics make it ideal for use in many situations, including constrained environments such as for communication in Machine to Machine (M2M) and Internet of Things (IoT) contexts where a small code footprint is required and…