Search

Refine Results
Type
Program
Status
Country
Province
City
Accreditation Sub-Programs
Program Specialty Area
GLP Area of Expertise
Field of Testing
Fields of Compliance
Period range

From

To

Displaying 3685 - 3696 of 11740
Notice of Intent

Steel Framework for Chain Link Fence

1.1 This standard applies to steel framework for chain link fence used in commercial and industrial applications. 1.2 The testing and evaluation of a product against this standard may require the use of materials and/or...
Notice of Intent

Installation of Chain Link Fence

1.1 This standard applies to the installation of chain link fence used in commercial and industrial applications. It gives the requirements for chain link fence installation in earth, rock, or rock with overburden of earth. 1...
Notice of Intent

Gates for Chain Link Fence

1.1 This standard applies to gates used in conjunction with chain link fence used in commercial and industrial applications. 1.2 The testing and evaluation of a product against this standard may require the use of materials...
Notice of Intent

Information technology - Security techniques - ...

This part of ISO/IEC 18033 specifies block ciphers. A block cipher maps blocks of n bits to blocks of n bits, under the control of a key of k kits. A total of seven different block ciphers are defined. They are categorized in...
Notice of Intent

Information technology - Security techniques - ...

This part of ISO/IEC 11770 a) establishes the general model on which key management mechanisms are based, b) defines the basic concepts of key management which are common to all the parts of ISO/IEC 11770, c) specifies the...
Notice of Intent

Information technology - Automatic identification...

This International Standard specifies the requirements and test methods for physical and related attributes of a bar code master. It covers all forms of bar code master, irrespective of the mode of origination of the initial...
Notice of Intent

Information technology - Security techniques...

This part of ISO/IEC 9797 specifies six MAC algorithms that use a secret key and an n-bit block cipher to calculate an m-bit MAC. This part of ISO/IEC 9797 can be applied to the security services of any security architecture...
Notice of Intent

Information technology - Security techniques - ...

This part of ISO/IEC 9798 specifies eight entity authentication mechanisms based on manual data transfer between authenticating devices. It indicates how these mechanisms can be used to support key management functions, and...