Electrotechincal
Electrotechincal
KS ISOIEC9314-5:1995
Information processing systems - Fibre Distributed Data Interface (FDDI) - Part 5: Hybrid Ring Control (HRC).
Specifies a Hybrid Ring Control (HRC) protocol which provides a mode of operation in which both packet switched and isochronous data are transmitted within the same special frame structure called a cycle..
Kes 9,270.00
KS ISOIEC9314-6:1998
Information processing systems - Fibre Distributed Data Interface (FDDI) - Part 6: Station Management (SMT).
Specifies the Station Management (SMT) for the Fibre Distributed Data Interface (FDDI)..
Kes 16,686.00
KS ISO/IEC 19989-3:2020
Information security Criteria and methodology for security evaluation of biometric systems Part 3: Presentation attack detection
For security evaluation of biometric verification systems and biometric identification systems, this document is dedicated to security evaluation of presentation attack detection applying the ISO/IEC 15408 series..
Kes 3,308.00
KS ISO/IEC 19989-1:2020
Information security - Criteria and methodology for security evaluation of biometric systems Part 1: Framework
For security evaluation of biometric recognition performance and presentation attack detection for biometric verification systems and biometric identification systemsthis document specifies..
Kes 5,067.00
KS ISO/IEC 19989-2:2020
Information security - Criteria and methodology for security evaluation of biometric systems Part 2: Biometric recognition performance
Evaluation of biometric verification systems and biometric identification systems, this document is dedicated to the security evaluation of biometric recognition performance applying the ISO/IEC 15408 series..
Kes 3,862.00
KS ISO/IEC 20009-3:2022
Information security - Anonymous entity authentication - Part 1: Mechanisms based on blind signatures
Provides general descriptions and specifications of anonymous entity authentication mechanisms based on blind digital signatures...
Kes 3,308.00
KS ISO/IEC 18033-7:2022
Information security - Encryption algorithms - Part 7: Tweakable block ciphers
Specifies tweakable block ciphers. A tweakable block cipher is a family of n-bit permutations parametrized by a secret key value and a public tweak value..
Kes 3,308.00
KS ISO/IEC 11770-7:2021
Information security - Key management - Part 7: Cross-domain password-based authenticated key exchange
Specifies mechanisms for cross-domain password-based authenticated key exchange, all of which are four-party password-based authenticated key exchange (4PAKE) protocols..
Kes 3,605.00
KS ISO/IEC 29192-8:2022
Information security - Lightweight cryptography - protocols - Part 8: Authenticated encryption
Specifies one method for authenticated encryption suitable for applications requiring lightweight cryptographic mechanisms...
Kes 3,308.00
KSISO/IEC9797-2:2021
Information security - Message authentication codes (MACs) - Part 2: Mechanisms using a dedicated hash-function
Specifies MAC algorithms that use a secret key and a hash-function (or its roundfunction or sponge function) to calculate an m-bit MAC...
Kes 4,820.00