Search

Refine Results
Type
Program
Status
Country
Province
City
Accreditation Sub-Programs
Program Specialty Area
GLP Area of Expertise
Field of Testing
Fields of Compliance
Period range

From

To

Displaying 2401 - 2412 of 10736
Notice of Intent

Manually Operated Electric Gas Ignition Systems...

Details test criteria for manually-operated electric gas ignition systems and ignitions system components which are intended to form an integral part of a gas appliance. An ignition system shall ignite gas at the main or...
Notice of Intent

Gas Appliance Pressure Regulators

1.1.1 Types of Regulators. This standard applies to individual gas appliance pressure regulators, which are not a part of a combination control (see Part V, Definitions), constructed entirely of new, unused parts and...
Notice of Intent

Wind turbines - Part 24: Lightning protection

This International Standard applies to lightning protection of wind turbine generators and wind power systems. Normative references are made to generic standards for lightning protection, low-voltage systems and high-voltage...
Notice of Intent

Information technology - Security techniques - ...

This part of ISO/IEC 18033 specifies block ciphers. A block cipher maps blocks of n bits to blocks of n bits, under the control of a key of k kits. A total of seven different block ciphers are defined. They are categorized in...
Notice of Intent

Information technology - Security techniques - ...

This part of ISO/IEC 11770 a) establishes the general model on which key management mechanisms are based, b) defines the basic concepts of key management which are common to all the parts of ISO/IEC 11770, c) specifies the...
Notice of Intent

Information technology - Automatic identification...

This International Standard specifies the requirements and test methods for physical and related attributes of a bar code master. It covers all forms of bar code master, irrespective of the mode of origination of the initial...
Notice of Intent

Information technology - Security techniques...

This part of ISO/IEC 9797 specifies six MAC algorithms that use a secret key and an n-bit block cipher to calculate an m-bit MAC. This part of ISO/IEC 9797 can be applied to the security services of any security architecture...