Electrotechincal

Electrotechincal



KS ISOIEC9314-5:1995

Information processing systems - Fibre Distributed Data Interface (FDDI) - Part 5: Hybrid Ring Control (HRC).

Specifies a Hybrid Ring Control (HRC) protocol which provides a mode of operation in which both packet switched and isochronous data are transmitted within the same special frame structure called a cycle..

Kes 9,270.00

KS ISOIEC9314-6:1998

Information processing systems - Fibre Distributed Data Interface (FDDI) - Part 6: Station Management (SMT).

Specifies the Station Management (SMT) for the Fibre Distributed Data Interface (FDDI)..

Kes 16,686.00

KS ISO/IEC 19989-3:2020

Information security Criteria and methodology for security evaluation of biometric systems Part 3: Presentation attack detection

For security evaluation of biometric verification systems and biometric identification systems, this document is dedicated to security evaluation of presentation attack detection applying the ISO/IEC 15408 series..

Kes 3,308.00

KS ISO/IEC 19989-1:2020

Information security - Criteria and methodology for security evaluation of biometric systems Part 1: Framework

For security evaluation of biometric recognition performance and presentation attack detection for biometric verification systems and biometric identification systemsthis document specifies..

Kes 5,067.00

KS ISO/IEC 19989-2:2020

Information security - Criteria and methodology for security evaluation of biometric systems Part 2: Biometric recognition performance

Evaluation of biometric verification systems and biometric identification systems, this document is dedicated to the security evaluation of biometric recognition performance applying the ISO/IEC 15408 series..

Kes 3,862.00

KS ISO/IEC 20009-3:2022

Information security - Anonymous entity authentication - Part 1: Mechanisms based on blind signatures

Provides general descriptions and specifications of anonymous entity authentication mechanisms based on blind digital signatures...

Kes 3,308.00

KS ISO/IEC 18033-7:2022

Information security - Encryption algorithms - Part 7: Tweakable block ciphers

Specifies tweakable block ciphers. A tweakable block cipher is a family of n-bit permutations parametrized by a secret key value and a public tweak value..

Kes 3,308.00

KS ISO/IEC 11770-7:2021

Information security - Key management - Part 7: Cross-domain password-based authenticated key exchange

Specifies mechanisms for cross-domain password-based authenticated key exchange, all of which are four-party password-based authenticated key exchange (4PAKE) protocols..

Kes 3,605.00

KS ISO/IEC 29192-8:2022

Information security - Lightweight cryptography - protocols - Part 8: Authenticated encryption

Specifies one method for authenticated encryption suitable for applications requiring lightweight cryptographic mechanisms...

Kes 3,308.00

KSISO/IEC9797-2:2021

Information security - Message authentication codes (MACs) - Part 2: Mechanisms using a dedicated hash-function

Specifies MAC algorithms that use a secret key and a hash-function (or its roundfunction or sponge function) to calculate an m-bit MAC...

Kes 4,820.00

Showing 771 to 780 of 918 (92 Pages)