Refine Results
Displaying 8857 - 8868 of 10416
Notice of Intent
IT Security techniques - Key management - Part...
This document defines key establishment mechanisms using symmetric cryptographic techniques. This document addresses three environments for the establishment of keys: Point-to-Point, Key Distribution Centre (KDC), and Key...
Notice of Intent
IT Security techniques - Digital signatures with...
This document specifies digital signature mechanisms with appendix whose security is based on the discrete logarithm problem. This document provides — a general description of a digital signature with appendix mechanism, and...
Notice of Intent
Preparation and quality management of fluids ...
This document is addressed to the manufacturer and/or supplier of water treatment systems and/or devices used for the express purpose of providing water for haemodialysis or related therapies
Notice of Intent
Preparation and quality management of fluids ...
This document specifies minimum requirements for water to be used in haemodialysis and related therapies. This document includes water to be used in the preparation of concentrates, dialysis fluids for haemodialysis...
Notice of Intent
Preparation and quality management of fluids ...
This document specifies minimum requirements for concentrates used for haemodialysis and related therapies. This document is addressed to the manufacturer of such concentrates. In several instances in this document, the...
Notice of Intent
Preparation and quality management of fluids ...
This document specifies minimum quality requirements for dialysis fluids used in haemodialysis and related therapies. This document includes dialysis fluids used for haemodialysis and haemodiafiltration, including...
Notice of Intent
Information Technology - International Standardized...
1.1 General This part of ISO/IEC ISP 12062 covers access to a message store (MS) in an Interpersonal Messaging (IPM) environment using the P7 MS Access Protocol (see also figure 1). These specifications form part of the...
Notice of Intent
Cards and security devices for personal identification...
This document describes the following: — polling for proximity cards or objects (PICCs) entering the field of a proximity coupling device (PCD); — the byte format, the frames and timing used during the initial phase of...
Notice of Intent
Electric motor-operated hand-held tools, transportable...
This clause of Part 1 is applicable, except as follows: Addition: This part of IEC 62841 applies to hand-held routers intended for cutting slots into or shaping the edge of wood and analogous materials, plastics and non...
Notice of Intent
Information technology - Security techniques - ...
This document establishes five modes of operation for applications of an n-bit block cipher (e.g. protection of data during transmission or in storage). The defined modes only provide protection of data confidentiality...
Notice of Intent
Information technology - Security techniques - ...
1 Scope This document establishes five modes of operation for applications of an n-bit block cipher (e.g. protection of data during transmission or in storage). The defined modes only provide protection of data...
Notice of Intent
Information technology - Security techniques - ...
This document defines key establishment mechanisms based on weak secrets, i.e. secrets that can be readily memorized by a human, and hence, secrets that will be chosen from a relatively small set of possibilities. It...