Search

Refine Results
International Classification for Standards (ICS) code
Source
Standards Development Organization (SDO) code
Language
Status
National Standards of Canada (NSC) code
Period range

From

To

Displaying 1101 - 1110 of 2984
Information technology - Automatic identification and data capture techniques - Reading and display ...
ISO/IEC 16480:2015 specifies a method to assess the symbol quality rendered on electronic displays (i.e. the symbol produces its own light) when the reading device is a two-dimensional bar code imager. In addition, this international standard specifies a method to assess the quality of symbols that are intended to be read with general-purpose cameras in ambient lighting conditions. Further, this…
Publisher :
IEC
Status :
Published
Published Date :
2015-08-13
ICS Code(s) :
35.040.50
Space data and information transfer systems — CCSDS Space Link Protocols over ETSI DVB-S2 Standard
The DVB-S2 standard (reference [1]) proposes advanced modulation techniques (QPSK, 8PSK, 16APSK, and 32APSK) and a wide range of coding rates (from 1/4 to 9/10) with near-Shannon coding schemes (LDPC codes). This high number of modulation and coding schemes allows a wide range of possibilities to satisfy specific mission constraints. Moreover, to maximize the telemetry system throughput, it…
Publisher :
ISO
Status :
Published
Published Date :
2015-08-10
ICS Code(s) :
49.140
Space data and information transfer systems — Delta-DOR Raw Data Exchange Format
Delta-DOR (Delta Differential One-Way Ranging) is a Very Long Baseline Interferometry (VLBI) technique that can be used in conjunction with Doppler and ranging data to improve spacecraft navigation by more efficiently determining spacecraft angular position in the plane of sky. It involves the use of multiple ground stations, possibly belonging to different agencies, for simultaneous acquisition…
Publisher :
ISO
Status :
Published
Published Date :
2015-08-10
ICS Code(s) :
49.140
Information technology — Security techniques — Network security — Part 1: Overview and concepts
ISO/IEC 27033-1:2015 provides an overview of network security and related definitions. It defines and describes the concepts associated with, and provides management guidance on, network security. (Network security applies to the security of devices, security of management activities related to the devices, applications/services, and end-users, in addition to security of the information being…
Publisher :
ISO
Status :
Published
Published Date :
2015-08-09
ICS Code(s) :
35.030
Technologies de l'information — Techniques automatiques d'identification et de capture des...
Publisher :
ISO
Status :
Withdrawn
Published Date :
2015-08-09
ICS Code(s) :
35.040.50
Information technology — Automatic identification and data capture techniques — Bar code verifier co...
ISO/IEC 15426-2:2015 defines test methods and minimum accuracy criteria applicable to verifiers using the methodologies of ISO/IEC 15415 for multi-row bar code symbols and two-dimensional matrix symbologies, and specifies reference calibration standards against which these should be tested. It provides for testing of representative samples of the equipment. NOTE ISO/IEC 15426‑1 applies…
Publisher :
ISO
Status :
Withdrawn
Published Date :
2015-08-09
ICS Code(s) :
35.040.50
Information technology - Security techniques - Network security - Part 1: Overview and concepts
ISO/IEC 27033-1:2015 provides an overview of network security and related definitions. It defines and describes the concepts associated with, and provides management guidance on, network security. (Network security applies to the security of devices, security of management activities related to the devices, applications/services, and end-users, in addition to security of the information being…
Publisher :
IEC
Status :
Published
Published Date :
2015-08-09
ICS Code(s) :
35.030
Information technology - Automatic identification and data capture techniques - Bar code verifier co...
ISO/IEC 15426-2:2015 defines test methods and minimum accuracy criteria applicable to verifiers using the methodologies of ISO/IEC 15415 for multi-row bar code symbols and two-dimensional matrix symbologies, and specifies reference calibration standards against which these should be tested. It provides for testing of representative samples of the equipment. NOTE ISO/IEC 15426‑1 applies…
Publisher :
IEC
Status :
Revised
Published Date :
2015-08-09
ICS Code(s) :
35.040.50
Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric ...
ISO/IEC 11770-3:2015 defines key management mechanisms based on asymmetric cryptographic techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals: a) establish a shared secret key for use in a symmetric cryptographic technique between two entities A and B by key agreement. In a secret key agreement mechanism, the secret key is computed as the result of…
Publisher :
ISO
Status :
Withdrawn
Published Date :
2015-08-03
ICS Code(s) :
35.030
Information technology - Security techniques - Key management - Part 3: Mechanisms using asymmetric ...
ISO/IEC 11770-3:2015 defines key management mechanisms based on asymmetric cryptographic techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals: a) establish a shared secret key for use in a symmetric cryptographic technique between two entities A and B by key agreement. In a secret key agreement mechanism, the secret key is computed as the result of…
Publisher :
IEC
Status :
Revised
Published Date :
2015-08-03
ICS Code(s) :
35.030