Coating powders — Part 16: Determination of density by liquid displacement in a measuring cylinder
This document specifies a method for determining the density of coating powders by liquid displacement in a measuring cylinder. The method is based on a determination of the mass and the volume of a test portion. It can be used for all types of coating powders.
NOTE If the powder does not swell in contact with the displacement liquid used and if the displacement liquid replaces the air…
Poudres pour revêtement — Partie 16: Détermination de la masse volumique par déplacement d’un liquid...
Le présent document spécifie une méthode de détermination de la masse volumique de poudres pour revêtement, par déplacement d’un liquide dans une éprouvette graduée. Cette méthode repose sur la détermination de la masse et du volume d’une prise d’essai. Elle peut être utilisée pour tous les types de poudres pour revêtement.
NOTE Si la poudre ne gonfle pas au contact du liquide…
Information technology — Conformance test methods for security service crypto suites — Part 11: Cryp...
This document specifies methods for determining conformance to the security crypto suite defined in ISO/IEC 29167-11.
This document contains conformance tests for all mandatory functions.
The conformance parameters are the following:
— parameters that apply directly affecting system functionality and inter-operability;
— protocol including commands and replies;
— nominal values and…
Textiles — Détermination de la teneur en phtalates — Méthode au tétrahydrofurane
Le présent document spécifie une méthode de dosage de phtalates dans les textiles par chromatographie en phase gazeuse et spectrométrie de masse (GC-MS).
Le présent document s’applique aux produits textiles susceptibles de contenir certains phtalates.
Textiles — Determination of the phthalate content — Tetrahydrofuran method
This document specifies a method of determining phthalates in textiles with gas chromatography–mass spectrometry (GC-MS).
This document is applicable to textile products where there is a risk of the presence of some phthalates.
Information technology - Conformance test methods for security service crypto suites - Part 11: Cryp...
This document specifies methods for determining conformance to the security crypto suite defined in ISO/IEC 29167-11.
This document contains conformance tests for all mandatory functions.
The conformance parameters are the following:
— parameters that apply directly affecting system functionality and inter-operability;
— protocol including commands and replies;
— nominal values and…
Information security — Key management — Part 3: Mechanisms using asymmetric techniques
1 Scope
This document defines key management mechanisms based on asymmetric cryptographic techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals.
a) Establish a shared secret key for use in a symmetric cryptographic technique between two entities A and B by key agreement. In a secret key agreement mechanism, the secret key is computed as the result…
Systems and software engineering — High-level Petri nets — Part 3: Extensions and structuring mechan...
1 Scope
This document defines enrichments, extensions and structuring mechanisms of Petri nets, applied on the definitions proposed in ISO/IEC 15909-1. This document facilitates the definitions of new kinds of Petri nets and their interoperability, while remaining compatible with those defined in ISO/IEC 15909-1.
This document is written as a reference for designers of new Petri net variants,…
Information technology — Data protocol for radio frequency identification (RFID) for item management...
1 Scope
This document focuses on the abstract interface between an application and the data processor and includes the specification and definition of application commands and responses. It allows data and commands to be specified in a standardised way, independent of the ISO/IEC 18000 series air interfaces.
This document:
— provides guidelines on presenting data as objects;
— defines the…
Information technology — Radio frequency identification (RFID) for item management — Data protocol: ...
1 Scope
This document focuses on encoding the transfer syntax of the application commands defined in ISO/IEC 15961-1. The encodation is in a Logical Memory as a software analogue of the physical memory of the RFID tag being addressed by the interrogator.
This document
— defines the encoded structure of object identifiers;
— specifies the data compaction rules that apply to the encoded data…