Refine Results
Displaying 4045 - 4056 of 11740
Notice of Intent
Information technology - Security techniques - ...
This part of ISO/IEC 18033 specifies block ciphers. A block cipher maps blocks of n bits to blocks of n bits, under the control of a key of k kits. A total of seven different block ciphers are defined. They are categorized in...
Notice of Intent
Information technology - Automatic identification...
This International Standard defines the requirements for the GS1 Composite symbology. It specifies the GS1 Composite symbology characteristics, data character encodation, symbol formats, dimensions and print quality...
Notice of Intent
Information technology - Open terminal architecture...
This International Standard provides the specifications for the standard Open Terminal Architecture (OTA) kernel in several layers: - definition of the virtual machine (VM); - description of the services provided by the VM to...
Notice of Intent
Information technology - Security techniques - ...
This part of ISO/IEC 11770 a) establishes the general model on which key management mechanisms are based, b) defines the basic concepts of key management which are common to all the parts of ISO/IEC 11770, c) specifies the...
Notice of Intent
Information technology - Automatic identification...
This International Standard specifies the requirements and test methods for physical and related attributes of a bar code master. It covers all forms of bar code master, irrespective of the mode of origination of the initial...
Notice of Intent
Information technology - Radio frequency identification...
This part of ISO/IEC 18000 provides physical layer, collision management system and protocol values for RFID systems for item identification operating at 13,56 MHz in accordance with the requirements of ISO/IEC 18000-1. This...
Notice of Intent
Information technology - Security techniques...
This part of ISO/IEC 9797 specifies six MAC algorithms that use a secret key and an n-bit block cipher to calculate an m-bit MAC. This part of ISO/IEC 9797 can be applied to the security services of any security architecture...
Notice of Intent
Information technology - Security techniques - ...
This part of ISO/IEC 9798 specifies eight entity authentication mechanisms based on manual data transfer between authenticating devices. It indicates how these mechanisms can be used to support key management functions, and...
Notice of Intent
Information technology - Security techniques - ...
This part of ISO/IEC 10118 specifies hash-functions which make use of an n-bit block cipher algorithm. They are therefore suitable for an environment in which such an algorithm is already implemented. Four hash-functions are...
Notice of Intent
Information technology - Programming languages...
This Technical Report specifies the syntax and semantics for object finalization in COBOL. The purpose of this Technical Report is to promote a high degree of portability in implementations of object finalization, even though...
Notice of Intent
Information technology - Programming languages...
This Technical Report specifies the syntax and semantics for XML support in COBOL. The purpose of this Technical Report is to promote a high degree of portability in implementations, even though some elements are subject to...
Notice of Intent
Information technology - Programming languages...
This Technical Report specifies the interfaces and behavior of a common class library for managing sets of object references in COBOL. The purpose of this Technical Report is to promote a high degree of portability in...