ZH

RU

ES

dia technology

dia technology, Total:497 items.

In the international standard classification, dia technology involves: Character sets and information coding, Vocabularies, Products of the chemical industry, Information technology (IT) in general, Applications of information technology, Services, Technical drawings, Vacuum technology, Rubber and plastics products, Electromagnetic compatibility (EMC), Installations in buildings, Plant and equipment for the food industry, Environmental protection, Microprocessor systems, Lamps and related equipment, Pumps, Organic chemicals, Document imaging applications, External water conveyance systems, Telecommunication systems, Data storage devices, Technical product documentation, Graphical symbols, Mathematics, Test conditions and procedures in general, Quality, Welding, brazing and soldering, Audio, video and audiovisual engineering, Accident and disaster control, Physics. Chemistry, CHEMICAL TECHNOLOGY, Manufacturing forming processes, Characteristics and design of machines, apparatus, equipment, Fuels, Gears, Information sciences. Publishing, Shipbuilding and marine structures in general, Radiocommunications, Company organization and management, Thermodynamics and temperature measurements, Fluid power systems, Compressors and pneumatic machines, Refractories, Paints and varnishes, Meat, meat products and other animal produce, Continuous handling equipment, Sugar. Sugar products. Starch, Inorganic chemicals, Farming and forestry, Heat treatment, Ergonomics, Software development and system documentation, Farm buildings, structures and installations, Interface and interconnection equipment, Networking, Languages used in information technology, Agricultural machines, implements and equipment, Transport, Alarm and warning systems.


International Organization for Standardization (ISO), dia technology

  • ISO/IEC 21000-7:2004/Amd 1:2006 Information technology - Multimedia framework (MPEG-21) - Part 7: Digital item adaption; Amendment 1: DIA Conversions and permissions
  • ISO/IEC 24761:2009 Information technology - Security techniques - Authentication context for biometrics
  • ISO/IEC 11770-2:1996/Cor 1:2005 Information technology - Security techniques - Key management - Part 2: Mechanisms using symmetric techniques; Technical Corrigendum 1
  • ISO/IEC 19790:2006/Cor 1:2008 Information technology - Security techniques - Security requirements for cryptographic modules; Technical Corrigendum 1
  • ISO/IEC 15946-1:2008/Cor 1:2009 Information technology - Security techniques - Cryptographic techniques based on elliptic curves - Part 1: General TECHNICAL CORRIGENDUM 1 (Second Edition; Replaced by ISO/IEC 15946-1:2008/Cor 2:2014)
  • ISO/IEC 29128:2011 Information technology - Security techniques - Verification of cryptographic protocols
  • ISO 9905:1994/cor 1:2005 Technical specifications for centrifugal pumps - Class I - Technical Corrigendum 1
  • ISO/IEC 14888-3:1998/Cor 1:2001 Information technology - Security techniques; Digital signatures with appendix - Part 3: Certificate-based mechanisms; Technical Corrigendum 1
  • ISO/IEC 11770-3:2015/Cor 1:2016 Information technology - Security techniques - Key management - Part 3: Mechanisms using asymmetric techniques; Technical Corrigendum 1
  • ISO/IEC 11770-2:1996 Information technology - Security techniques - Key management - Part 2: Mechanisms using symmetric techniques
  • ISO/IEC 13841:1995 Information technology - Guidance on measurement techniques for 90 mm optical disk cartridges
  • ISO 6414:2020 Technical product documentation (TPD) — Technical drawings for glassware
  • ISO/IEC 15946-1:2002 Information technology - Security techniques; Cryptographic techniques based on elliptic curves - Part 1: General
  • ISO/IEC 15946-1:2008 Information technology - Security techniques - Cryptographic techniques based on elliptic curves - Part 1: General
  • ISO/IEC 15946-1:2016 Information technology - Security techniques - Cryptographic techniques based on elliptic curves - Part 1: General
  • ISO/IEC 9798-5:1999 Information technology - Security techniques - Entity authentication - Part 5: Mechanisms using zero knowledge techniques
  • ISO/IEC 9798-5:2004 Information technology - Security techniques - Entity authentication - Part 5: Mechanisms using zero-knowledge techniques
  • ISO/IEC 11770-3:1999 Information technology - Security techniques - Key management - Part 3: Mechanisms using asymmetric techniques
  • ISO/IEC 9798-5:2009 Information technology - Security techniques - Entity authentication - Part 5: Mechanisms using zero-knowledge techniques
  • ISO/IEC TR 19791:2006 Information technology - Security techniques - Security assessment of operational systems
  • ISO/IEC 18045:2005 Information technology - Security techniques - Methodology for IT security evaluation
  • ISO/IEC 19790:2006 Information technology - Security techniques - Security requirements for cryptographic modules
  • ISO/IEC 18045:2008 Information technology.Security techniques.Methodology for IT security evaluation
  • ISO/IEC 19790:2012 Information technology - Security techniques - Security requirements for cryptographic modules
  • ISO/IEC 24759:2008 Information technology - Security techniques - Test requirements for cryptographic modules
  • ISO/IEC 24759:2014 Information technology - Security techniques - Test requirements for cryptographic modules
  • ISO/IEC 24759:2017 Information technology - Security techniques - Test requirements for cryptographic modules
  • ISO/IEC 9979:1999 Information technology - Security techniques - Procedures for the registration of cryptographic algorithms
  • ISO/IEC TR 22446:2017 Information technology — Continual performance improvement of IT enabled services
  • ISO/TR 23015:2020 Fine bubble technology — Measurement technique matrix for the characterization of fine bubbles
  • ISO/IEC 9798-3:1998 Information technology - Security techniques - Entity authentication - Part 3: Mechanisms using digital signature techniques
  • ISO/IEC 11770-3:2008 Information technology - Security techniques - Key management - Part 3: Mechanisms using asymmetric techniques
  • ISO/IEC 11770-3:2015 Information technology - Security techniques - Key management - Part 3: Mechanisms using asymmetric techniques
  • ISO/IEC 38506:2020 Information technology — Governance of IT — Application of ISO/IEC 38500 to the governance of IT enabled investments
  • ISO/IEC 13888-2:2010 Information technology - Security techniques - Non-repudiation - Part 2: Mechanisms using symmetric techniques
  • ISO/IEC 15946-2:2002 Information technology - Security techniques; Cryptographic techniques based on elliptic curves - Part 2: Digital signatures
  • ISO/IEC 13888-3:2009 Information technology - Security techniques - Non-repudiation - Part 3: Mechanisms using asymmetric techniques
  • ISO/IEC 29192-4:2013 Information technology - Security techniques - Lightweight cryptography - Part 4: Mechanisms using asymmetric techniques
  • ISO/IEC 9798-3:2019 IT Security techniques — Entity authentication — Part 3: Mechanisms using digital signature techniques
  • ISO/IEC 15946-5:2009/Cor 1:2012 Information technology - Security techniques - Cryptographic techniques based on elliptic curves - Part 5: Elliptic curve generation; Technical Corrigendum 1
  • ISO/IEC 27070:2021 Information technology — Security techniques — Requirements for establishing virtualized roots of trust
  • ISO/IEC 11801:2002/Cor 3:2008 Information technology - Generic cabling for customer premises; Technical Corrigendum 3
  • ISO/IEC 19792:2009 Information technology - Security techniques - Security evaluation of biometrics
  • ISO/IEC 14888-3:1998 Information technology - Security techniques - Digital signatures with appendix - Part 3: Certificate-based mechanisms
  • ISO/TR 18196:2016 Nanotechnologies - Measurement technique matrix for the characterization of nano-objects
  • ISO 11785:1996/Cor 1:2008 Radio frequency identification of animals - Technical concept; Technical Corrigendum 1
  • ISO/IEC 11801:2002/Cor 1:2002 Information technology - Generic cabling for customer premises; Corrigendum 1
  • ISO/IEC 11801:2002/Cor 2:2002 Information technology - Generic cabling for customer premises; Corrigendum 2
  • ISO/IEC TR 19768:2007 Information technology - Programming languages - Technical Report on C++ Library Extensions

Canadian Standards Association (CSA), dia technology

German Institute for Standardization, dia technology

  • DIN 16544:1988 Printing technology; terminology in reproduction technology
  • DIN 28400-6:1980 Vacuum technology; terms and definitions, surface analysis techniques
  • DIN 16620-2:1991-09 Printing technology; printing plates for offset printing; terminology and principles of measurement techniques
  • DIN 1988-1:1988 Drinking water supply systems; general (DVGW code of practice)
  • DIN ETS 300405 Berichtigung 1:1996 Corrigendum to DIN ETS 300405:1995-11 (ETS 300405:1995/Corrigendum:1995)
  • DIN 6770:2006 Technical product documentation - Identification of characteristics on technical drawings
  • DIN 6770:2006-11 Technical product documentation - Identification of characteristics on technical drawings
  • DIN 19057:1985 Microfilming of newspapers; technical proceeding of recording on film 35 mm
  • DIN CEN/TS 16937:2016-11*DIN SPEC 19278:2016-11 Nanotechnologies - Guidance for the responsible development of nanotechnologies; German version CEN/TS 16937:2016
  • DIN EN ISO/IEC 19790:2020-08 Information technology - Security techniques - Security requirements for cryptographic modules (ISO/IEC 19790:2012, Corrected version 2015-12); German version EN ISO/IEC 19790:2020
  • DIN 16514:1982 Printing technology; terms for letterpress printing
  • DIN 16529:1982 Printing technology; terms for planorgraphic printing
  • DIN 85005 Bb.1:2005 Ships and marine technology - Graphical symbols for technical documentation - Index
  • DIN 85005 Beiblatt 1:2005 Ships and marine technology - Graphical symbols for technical documentation - Index
  • DIN 85005 Beiblatt 1:2005-02 Ships and marine technology - Graphical symbols for technical documentation - Index
  • DIN 6779-12:2011-04 Structuring principles for technical products and technical product documentation - Part 12: Buildings and building technology / Note: Applies in conjunction with DIN EN 81346-1 (2010-05), DIN EN 81346-2 (2010-05).
  • DIN 22111 Berichtigung 1:2003 Corrigenda to DIN 22111:2000-03
  • DIN 22114 Berichtigung 1:2003 Corrigenda to DIN 22114:2001-12
  • DIN 17014 Bb.2:1961 Heat treating of iron and steel; translations of technical terms into foreign languages

RU-GOST R, dia technology

  • GOST R ISO/IEC TR 13335-3-2007 Information technology. Security techniques. Part 3. Techniques for the management of information technology security
  • GOST 28470-1990 System of technical maintenance and repair of computer facilities and informatics. Types and methods of technical maintenance and repair
  • GOST 29192-1991 Elestromagnetic compatibility of technical means. Classification of technical means
  • GOST 27962-1988 Flour-grinding equipment. General specifications
  • GOST R 56828.1-2015 Best available techniques. Guidelines for the description of the emerging technologies in the information and technical reference book on the best available techniques
  • GOST 24750-1981 Computing technique. General requirements of technical aestheties
  • GOST 19919-1974 Test automated of technical condition of aviation technique articles. Terms and definitions
  • GOST 3.1201-1985 Unified system for technological documentation. Identifying system of technological documentation
  • GOST R 22.9.21-2014 Technical means of chemical detection. Slassification. General technical requirements
  • GOST R ISO/IEC TR 19791-2008 Information technology. Security techniques. Security assessment of operational systems
  • GOST R 53480-2009 Dependability in technics. Terms and definitions
  • GOST R 27.002-2009 Dependability in technics. Terms and definitions
  • GOST R 51167-1998 Quality of technological and official information. Graphical models of data processing technologies
  • GOST R 56828.2-2015 Best available techniques. Methodical recommendation on presenting of information for economic aspects of the implementation of best available techniques in the information and technical reference book on the best available techniques
  • PNST 21-2014 Best available techniques. The structure of the information and technical reference book
  • GOST R 56828.14-2016 Best available techniques. The structure of the information and technical reference book
  • GOST R 51171-1998 Quality of technological and official information. Procedure for information technologies certification
  • GOST R 52985-2008 Ecological safety of rocket-space technique. General technical requirement
  • GOST R 58918-2021 Engineering (technology and design). Technological documentation. General requirements for the structure
  • GOST R 56828.10-2015 Best available techniques. Guidelines for the actualization and cancellation of an information and technical reference book on the best available techniques
  • GOST R 56828.8-2015 Best available techniques. Guidelines for the submission of information on best available techniques in the best available techniques reference document in the information and technical reference book on the best available techniques
  • GOST 7449-1996 Salted salmon fish. Specifications
  • GOST 22-1994 Refined sugar. Specifications
  • GOST 3864-1975 22% Mastic. Specifications
  • GOST 22-1978 Refined sugar. Specification
  • GOST R 57272.2-2016 Risk management of new technologies using. Part 2. Application to new technologies
  • GOST 20760-1975 Technical diagnosis. Tractors. Parameters and quality attributes of the technical condition
  • GOST R 55249-2012 Air transport. Airports. Technical means for screening. General technical requirements
  • GOST R 42.3.01-2014 Civil defense. Technical means of public notification. Slassification. General technical requirements
  • GOST R ISO/IEC TR 13335-4-2007 Information technology. Security techniques. Part 4. Selection of safeguards

CZ-CSN, dia technology

Japanese Industrial Standards Committee (JISC), dia technology

  • JIS K 4800:2000 Technical terms for explosives
  • JIS Z 8114:1999 Technical product documentation -- Terms relating to technical drawings
  • JIS K 3211:1990 Technical terms for surface active agents
  • JIS X 5059-2:1999 Information technology -- Security techniques -- Non-repudiation -- Part 2: Mechanisms using symmetric techniques
  • JIS X 5058-3:2000 Information technology -- Security techniques -- Key management -- Part 3: Mechanisms using asymmetric techniques
  • JIS X 19790:2007 Information technology -- Security techniques -- Security requirements for cryptographic modules
  • JIS X 24759:2009 Information technology -- Security techniques -- Test requirements for cryptographic modules
  • JIS X 24759:2017 Information technology -- Security techniques -- Test requirements for cryptographic modules
  • JIS M 0104:1984 Technical terms used in coal utilization
  • JIS X 5059-3:1999 Information technology -- Security techniques -- Non-repudiation -- Part 3: Mechanisms using asymmetric techniques
  • JIS X 5056-5:2002 Information technology -- Security techniques -- Entity authentication -- Part 5: Mechanisms using zero knowledge techniques
  • JIS X 5056-4:1996 Information technology -- Security techniques -- Entity authentication -- Part 4: Mechanisms using a cryptographic check function
  • JIS X 5058-2:1998 Information technology -- Security techniques -- Key management -- Part 2: Mechanisms using symmetric techniques
  • JIS X 5056-3:2002 Information technology -- Security techniques -- Entity authentication -- Part 3: Mechanisms using digital signature techniques
  • JIS X 19790:2015 Information technology -- Security techniques -- Security requirements for cryptographic modules
  • JIS B 0142:1994 Glossary of terms for oil hydraulics and pneumatics
  • JIS B 0004:2007 Technical representation of springs
  • JIS Q 27002:2006 Information technology -- Security techniques -- Code of practice for information security management
  • JIS Q 27002:2014 Information technology -- Security techniques -- Code of practice for information security controls
  • JIS X 5091:2007 Information technology -- Security technique -- Security test requirements for cryptographic modules

Danish Standards Foundation, dia technology

  • DS/ISO/IEC 19792:2009 Information technology - Security techniques - Security evaluation of biometrics
  • DS/ISO/IEC 29128:2012 Information technology - Security techniques - Verification of cryptographic protocols
  • DS/ISO/IEC 11770-2/Corr. 1:2009 Information technology - Security techniques - Key management - Part 2: Mechanisms using symmetric techniques
  • DS/ISO/IEC 11770-2:2008 Information technology - Security techniques - Key management - Part 2: Mechanisms using symmetric techniques
  • DS/ISO/IEC 15946-1/Corr. 1:2009 Information technology - Security techniques - Cryptographic techniques based on elliptic curves - Part 1: General
  • DS/ISO/IEC 15946-1:2008 Information technology - Security techniques - Cryptographic techniques based on elliptic curves - Part 1: General
  • DS/ISO/IEC TR 19791:2010 Information technology - Security techniques - Security assessment of operational systems
  • DS/ISO/IEC 24759:2008 Information technology - Security techniques - Test requirements for cryptographic modules
  • DS/ISO/IEC 24761:2009 Information technology - Security techniques - Authentication context for biometrics
  • DS/ISO/IEC 24761/Cor 1:2013 Information technology - Security techniques - Authentication context for biometrics
  • DS/ISO/IEC 19790:2012 Information technology - Security techniques - Security requirements for cryptographic modules
  • DS/ISO/IEC 11770-3/Corr. 1:2009 Information technology - Security techniques - Key management - Part 3: Mechanisms using asymmetric techniques
  • DS/ISO/IEC 11770-3:2008 Information technology - Security techniques - Key management - Part 3: Mechanisms using asymmetric techniques
  • DS/ISO/IEC 13888-2:2011 Information technology - Security techniques - Non-repudiation - Part 2: Mechanisms using symmetric techniques
  • DS/ISO/IEC 9798-5:2010 Information technology - Security techniques - Entity authentication - Part 5: Mechanisms using zero-knowledge techniques
  • DS/ISO/IEC 13888-2/Cor 1:2013 Information technology - Security techniques - Non-repudiation - Part 2: Mechanisms using symmetric techniques
  • DS/ISO/IEC 13888-3:2010 Information technology - Security techniques - Non-repudiation - Part 3: Mechanisms using asymmetric techniques
  • DS/ISO/IEC 9798-3/Corr. 1:2009 Information technology - Security techniques - Entity authentication - Part 3: Mechanisms using digital signatur techniques
  • DS/ISO/IEC 9798-3/Amd. 1:2010 Information technology - Security techniques - Entity authentication - Part 3: Mechanisms using digital signature techniques
  • DS/ISO/IEC 9798-3:1999 Information technology - Security techniques - Entity authentication - Part 3: Mechanisms using digital signature techniques
  • DS/ISO/IEC 9798-3/Cor 2:2012 Information technology - Security techniques - Entity authentication - Part 3: Mechanisms using digital signatur techniques
  • DS/ISO/IEC 29192-4:2013 Information technology - Security techniques - Lightweight cryptography - Part 4: Mechanisms using asymmetric techniques
  • DS/ISO/IEC 15816:2002 Information technology - Security techniques - Security information objects for access control

International Electrotechnical Commission (IEC), dia technology

  • ISO/IEC 38503:2022 Information technology - Governance of IT - Assessment of the governance of IT
  • ISO/IEC 15946-1:2008/Cor 2:2014 Information technology - Security techniques - Cryptographic techniques based on elliptic curves - Part 1: General; Technical Corrigendum 2
  • ISO/IEC 10116:2017 Information technology - Security techniques - Modes of operation for an n-bit block cipher

British Standards Institution (BSI), dia technology

  • BS ISO/IEC 24761:2009 Information technology - Security techniques - Authentication context for biometrics
  • BS ISO/IEC 13888-2:2011 Information technology. Security techniques. Non-repudiation. Mechanisms using symmetric techniques
  • BS ISO/IEC 13888-2:2010 Information technology. Security techniques. Non-repudiation. Mechanisms using symmetric techniques
  • BS ISO/IEC 15946-1:2016 Tracked Changes. Information technology. Security techniques. Cryptographic techniques based on elliptic curves. General
  • BS ISO/IEC 11770-3:2015 Information technology. Security techniques. Key management. Mechanisms using asymmetric techniques
  • BS ISO/IEC 15946-1:2009 Information technology - Security techniques - Cryptographic techniques based on elliptic curves - General
  • BS ISO/IEC 11770-3:2008 Information technology - Security techniques - Key management - Mechanisms using asymmetric techniques
  • BS ISO/IEC 15946-1:2008 Information technology - Security techniques - Cryptographic techniques based on elliptic curves - General
  • BS ISO/IEC 10118-1:2016+A1:2021 Information technology. Security techniques. Hash-functions. General
  • BS ISO/IEC 9798-5:2010 Information technology. Security techniques. Entity authentication. Mechanisms using zero knowledge techniques
  • BS ISO/IEC 29192-4:2013+A1:2016 Information technology. Security techniques. Lightweight cryptography - Mechanisms using asymmetric techniques
  • BS ISO/IEC 9798-5:2009 Information technology - Security techniques - Entity authentication - Mechanisms using zero knowledge techniques
  • BS ISO/IEC 18370-1:2016 Information technology. Security techniques. Blind digital signatures. General
  • PD CEN ISO/TS 80004-12:2017 Nanotechnologies. Vocabulary. Quantum phenomena in nanotechnology
  • BS ISO/IEC 27031:2011 Information technology. Security techniques. Guidelines for information and communication technology readiness for business continuity
  • BS PD CEN/TR 16672:2014 Information technology. Privacy capability features of current RFID technologies
  • BS ISO/IEC 18045:2008 Information technology - Security techniques - Methodology for IT security evaluation
  • BS EN ISO/IEC 19790:2020 Information technology. Security techniques. Security requirements for cryptographic modules
  • BS EN 15016-3:2023 Railway applications. Technical documents - Handling of modifications of technical documents
  • BS ISO/IEC 15946-5:2017 Information technology. Security techniques. Cryptographic techniques based on elliptic curves. Elliptic curve generation
  • BS ISO/IEC 15946-5:2010 Information technology - Security techniques - Cryptographic techniques based on elliptic curves - Elliptic curve generation
  • PD ISO/IEC TR 29198:2013 Information technology. Biometrics. Characterization and measurement of difficulty for fingerprint databases for technology evaluation
  • BS ISO/IEC 24760-1:2012 Information technology. Security techniques. A framework for identity management. Terminology and concepts
  • BS ISO/IEC 19792:2009 Information technology - Security techniques - Security evaluation of biometrics
  • PD ISO/PAS 15339-1:2015 Graphic technology. Printing from digital data across multiple technologies. Principles
  • BS ISO/IEC 14888-1:2008 Information technology - Security techniques - Digital signatures with appendix - General
  • BS ISO/IEC 11770-2:2018 IT Security techniques. Key management - Mechanisms using symmetric techniques
  • BS ISO 23497:2019 Determination of pH value. Technical buffer solutions for the calibration of technical measuring installations
  • BS ISO/IEC 13888-3:2010 Information technology. Security techniques. Non-repudiation. Mechanisms using asymmetric techniques. ISO/IEC 13888-3:2009
  • BS ISO/IEC 13888-3:1998 Information technology - Security techniques - Non-repudiation - Mechanisms using asymmetric techniques
  • BS ISO/IEC 13888-3:2009 Information technology - Security techniques - Non-repudiation - Mechanisms using asymmetric techniques - ISO/IEC 13888-3:2009
  • PD ISO/IEC TS 23078-1:2020 Information technology. Specification of DRM technology for digital publications. Overview of copyright protection technologies in use in the publishing industry
  • BS ISO/IEC 18033-5:2015 Information technology. Security techniques. Encryption algorithms. Identity-based ciphers
  • BS ISO/IEC 10116:2006 Information technology - Security techniques - Modes of operation for an n-bit cipher
  • BS ISO/IEC 10118-3:2003 Information technology. Security techniques. Hash-functions. Dedicated hash-functions

IET - Institution of Engineering and Technology, dia technology

ANSI - American National Standards Institute, dia technology

  • INCITS/ISO/IEC TR 19791:2006 Information technology - Security techniques - Security assessment of operational systems (Technical Report)
  • INCITS/ISO/IEC 11770-2:1996 Information technology - Security techniques - Key management - Part 2: Mechanisms using symmetric techniques
  • INCITS/ISO/IEC TR 24722:2007 Information technology - Technical Report on Multi-Modal and other Multi-Biometric Fusion (Technical Report)
  • INCITS/ISO/IEC 9798-5:2004 Information technology - Security techniques - Entity authentication - Part 5: Mechanisms using zero-knowledge techniques
  • INCITS/ISO/IEC 9798-5:2009 Information technology - Security techniques - Entity authentication - Part 5: Mechanisms using zero-knowledge techniques
  • INCITS/ISO/IEC 13888-3:2009 Information technology - Security techniques - Non-repudiation - Part 3: Mechanisms using asymmetric techniques
  • INCITS/ISO/IEC TR 15285:1988 Information technology - An operational model for characters and glyphs (Technical Report)
  • INCITS/ISO/IEC TR 29198:2013 Information technology - Biometrics - Characterization and measurement of difficulty for fingerprint databases for technology evaluation (Technical Report)
  • INCITS/ISO/IEC TR 15446:2009 Information technology - Security techniques - Guide for the production of Protection Profiles and Security Targets (Technical Report)
  • INCITS/ISO/IEC 15946-1:2002 Information technology Security techniques Cryptographic techniques based on elliptic curves Part 1: General (Adopted by INCITS)
  • INCITS/ISO/IEC TR 9573:1988 Information processing - SGML support facilities - Techniques for using SGML (TECHNICAL REPORT)
  • INCITS/ISO/IEC 10116:2006 Information technology — Security techniques — Modes of operation for an n-bit block cipher

Standard Association of Australia (SAA), dia technology

WRC - Welding Research Council, dia technology

  • BULLETIN 300-1984 TECHNICAL POSITION ON CRITERIA ESTABLISHMENT ; TECHNICAL POSITION ON DAMPING VALUES FOR PIPING-INTERIM SUMMARY REPORT ; TECHNICAL POSITION ON RESPONSE SPECTRA BROADENING ; TECHNICAL POSITION ON INDU

RO-ASRO, dia technology

Association of German Mechanical Engineers, dia technology

  • VDI 2050 Blatt 1-2006 Requirements at technique centers - Technical bases for planning and execution
  • VDI 2218-2003 Information technology in product development - Feature Technology
  • VDI 2050 Blatt 1-2013 Requirements for technical equipment rooms - Technical bases for planning and execution
  • VDI 2127-1993 Technical principles of mechanisms; terminology of mechanisms
  • VDI 2878 Blatt 4-2016 Application of thermography to maintenance diagnostics - Equipment technology

HU-MSZT, dia technology

GOSTR, dia technology

  • GOST R IEC 61165-2019 Dependability in technics. Application of Markov techniques
  • GOST R 113.00.02-2019 Best available techniques. Methodical recommendations about structure of assessment of technological processes, equipment, technical means and methods for the compliance with requirements of the best available techniques
  • GOST R 113.00.03-2019 Best available techniques. The structure of the information and technical reference book
  • GOST R 59100-2020 Plastics. Filaments for additive technologies. General technical requirements
  • GOST R 113.00.08-2020 The best available techniques. The evaluation system of the best available techniques. General requirements

IX-ISO/IEC, dia technology

Korean Agency for Technology and Standards (KATS), dia technology

  • KS X 1204-3-2004 Information technology-Security techniques-Entity authentication-Part 3:Mechanisms using digital signature techniques
  • KS X ISO/IEC 15946-2:2012 Information technology-Security techniques-Cryptographic techniques based on elliptic curves-Part 2:Digital signatures
  • KS X ISO/IEC 29128:2014 Information technology — Security techniques — Verification of cryptographic protocols
  • KS X ISO/IEC 19772:2014 Information technology — Security techniques — Authenticated encryption
  • KS K 0103-2016 Technical terms for membranes and membrane processes
  • KS M 2952-2007(2017) Technical terms for surface active agents
  • KS X ISO/IEC TR 13841:2001 Information technology-Guidance on measurement techniques for 90 mm optical disk cartidges
  • KS X ISO/IEC TR 13841-2001(2021) Information technology — Guidance on measurement techniques for 90 mm optical disk cartridges
  • KS X ISO/IEC 9798-5:2014 Information technology-Security techniques-Entity authentication-Part 5:Mechanisms using zero-knowledge techniques
  • KS X ISO/IEC 9798-5:2006 Information technology-Security techniques-Entity authentication-Part 5:Mechanisms using zero-knowledge techniques
  • KS X ISO/IEC 15946-1:2008 Information technology-Security techniques-Cryptographic techniques based on elliptic curves-Part 1:General
  • KS X ISO/IEC 11770-2-2011(2017) Information technology-Security techniques-Key management-Part 2:Mechanisms using symmetric techniques
  • KS X ISO/IEC 11770-2-2011(2021) Information technology-Security techniques-Key management-Part 2:Mechanisms using symmetric techniques
  • KS X ISO/IEC 15946-1:2019 Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 1: General
  • KS X ISO/IEC 15946-5:2014 Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 5: Elliptic curve generation
  • KS X ISO/IEC 18031:2013 Information technology — Security techniques — Random bit generation
  • KS X ISO/IEC 9979:2012 Information technology-Security techniques-Procedure for the registration of cryptographic algorithms
  • KS X 1209-2004 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - PROCEDURES FOR THE REGISTRATION OF CRYPTOGRAPHIC ALGORITHMS
  • KS X ISO/IEC 18031:2007 Information technology-Security techniques-Random bit generation
  • KS X ISO/IEC 19790:2007 Information technology - Security techniques - Security requirements for cryptographic modules
  • KS X ISO/IEC 24759:2007 Information technology-Security techniques-Test requirements for cryptographic modules
  • KS X ISO/IEC 19792-2014(2019) Information technology — Security techniques — Security evaluation of biometrics
  • KS X ISO/IEC 24761-2014(2019) Information technology — Security techniques — Authentication context for biometrics
  • KS X ISO/IEC 24759-2015(2020) Information technology — Security techniques — Test requirements for cryptographic modules
  • KS X 1209-1998 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - PROCEDURES FOR THE REGISTRATION OF CRYPTOGRAPHIC ALGORITHMS
  • KS X ISO/IEC 19790:2015 Information technology — Security techniques — Security requirements for cryptographic modules
  • KS X ISO/IEC 24759:2015 Information technology — Security techniques — Test requirements for cryptographic modules
  • KS X ISO/IEC 19790-2015(2020) Information technology — Security techniques — Security requirements for cryptographic modules
  • KS X ISO/IEC 11770-3:2013 Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques
  • KS X 1211-2-2004 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NON-REPUDIATION - PART 2 : MECHANISMS USING SYMMETRIC TECHNIQUES
  • KS X ISO/IEC 11770-3:2008 Information technology-Security techniques-Key management-Part 3:Mechanisms using asymmetric techniques
  • KS X 1211-2-1998 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NON-REPUDIATION - PART 2 : MECHANISMS USING SYMMETRIC TECHNIQUES
  • KS X ISO/IEC 11770-3:2019 Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques
  • KS X ISO/IEC 9798-5-2014(2019) Information technology-Security techniques-Entity authentication-Part 5:Mechanisms using zero-knowledge techniques
  • KS X ISO/IEC 13888-2-2014(2019) Information technology — Security techniques — Non-repudiation — Part 2: Mechanisms using symmetric techniques
  • KS X ISO/IEC 13888-3-2014(2019) Information technology — Security techniques — Non-repudiation — Part 3: Mechanisms using asymmetric techniques
  • KS X ISO/IEC 15946-2-2003(2008) Information technology-Security techniques-Cryptographic techniques based on elliptic curves-Part 2:Digital signatures
  • KS X ISO/IEC 9798-3-2008(2018) Information technology-Security techniques-Entity authentication-Part 3:Mechanisms using digital signature techniques
  • KS X ISO/IEC 15946-3-2008(2018) Information technology-Security techniques-Cryptographic techniques based on elliptic curves-Part 3:Key establishment
  • KS X 1212-3-2013 Information technology-Guidelines for the management of IT Security-Part 3:Techniques for the management of IT security
  • KS X ISO/IEC 10116:2018 Information technology — Security techniques — Modes of operation for an n-bit block cipher
  • KS L 1628-2015(2020) Glossary of terms and definition of fine bubble technology
  • KS A ISO 10209-1:2003 Technical product documentation-Vocabulary-Part 1:Terms relating to technical drawings:general and types of drawings
  • KS A ISO 10209-1:2015 Technical product documentation-Vocabulary-Part 1:Terms relating to technical drawings:general and types of drawings
  • KS A IEC 61165-2014(2019) Application of Markov techniques
  • KS X ISO/IEC 13335-1-2005(2010) Information technology-Security technique-Management of information and communications technology security-Part 1:Concepts and models for information and communications technology security management
  • KS X ISO/IEC 27010:2014 Information technology — Security techniques — Information security management for inter-sector and inter-organizational communications
  • KS X 6029-1999 Graphic technology-Prepress digital data exchange - Tag image file format for image technology(TIFF/IT)
  • KS X ISO/IEC 15816:2007 Information technology-Security techniques-Security information objects for access control
  • KS X ISO/IEC 10116:2021 Information technology — Security techniques —Modes of operation for an n-bit block cipher

未注明发布机构, dia technology

  • ISO/IEC 19790:2012/Cor 1:2015 Information technology.Security technology.Security requirements for cryptographic modulesTechnical corrigendum 1
  • BS ISO/IEC 13888-2:2010(2012) Information technology — Security techniques — Non - repudiation Part 2 : Mechanisms using symmetric techniques
  • ISO/IEC 15946-3:2002 Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 3: Key establishment

American National Standards Institute (ANSI), dia technology

  • ANSI/INCITS TR 37-2004 INCITS Technical Report for Information Technology - Time-Limited Commands (TLC)
  • ANSI/INCITS/ISO/IEC 15946-3:2002 Information technology - Security techniques - Cryptographic techniques based on elliptic curves - Part 3: Key establishment
  • ANSI/INCITS/ISO/IEC 15946-1:2002 Information technology - Security techniques - Cryptographic techniques based on elliptic curves - Part 1: General
  • ANSI/INCITS/ISO/IEC 15946-1:2009 Information technology - Security techniques - Cryptographic techniques based on elliptic curves - Part 1: General
  • ANSI/ISO/IEC 15946-1:2002 Information technology Security techniques Cryptographic techniques based on elliptic curves Part 1: General Adopted by INCITS
  • ANSI/IEEE 208:1995 Standard on Video Techniques: Measurement of Resolution of Camera Systems, 1993 Techniques
  • ANSI/INCITS/ISO/IEC 19790:2009 Information technology - Security techniques - Security requirements for cryptographic modules
  • ANSI/ISO/IEC 11770-2:1996 Information technology - Security techniques - Key management - Part 2: Mechanisms using symmetric techniques Adopted by INCITS
  • ANSI/INCITS/ISO/IEC 11770-3:1999 Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques
  • ANSI/INCITS/ISO/IEC 9798-5:2004 Information technology - Security techniques - Entity authentication - Part 5: Mechanisms using zero-knowledge techniques
  • ANSI/ISO/IEC 11770-3:1999 Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques Adopted by INCITS
  • ANSI/INCITS/ISO/IEC 15946-2:2002 Information technology - Security techniques - Cryptographic techniques based on elliptic curves - Part 2: Digital signatures
  • ANSI/ISO/IEC 15946-2:2002 Information technology Security techniques Cryptographic techniques based on elliptic curves Part 2: Digital signatures Adopted by INCITS
  • ANSI/ISO/IEC 15946-3:2002 Information technology Security techniques Cryptographic techniques based on elliptic curves Part 3: Key establishment Adopted by INCITS
  • ANSI/INCITS/ISO/IEC 14888-3/COR 1:2009 Information technology - Security techniques - Digital signatures with appendix - Part 3: Certificate-based mechanisms - Corrigendum 1
  • ANSI/INCITS/ISO/IEC 10116:2008 Information technology - Security techniques - Modes of operation for an n-bit block cipher
  • ANSI/INCITS/ISO/IEC 24761:2009 Information technology - Security techniques - Authentication context for biometrics
  • ANSI/INCITS 172-2002 Information Technology - American National Standard Dictionary of Information Technology (ANSDIT)
  • ANSI/INCITS TR 33-2003 INCITS Technical Report for Information Technology Fibre Channel Signal Modeling (FCSM)
  • ANSI/ISO/IEC 2022:1994 Information technology - Character code structure and extension techniques Adopted by INCITS

ZA-SANS, dia technology

  • SANS 60921:2006 Ballasts for tubular fluorescent lamps - Performance requirements
  • SANS 13888-2:2004 Information technology - Security techniques - Non-repudiation Part 2: Mechanisms using symmetric techniques
  • SANS 13888-3:2004 Information technology - Security techniques - Non-repudiation Part 3: Mechanisms using asymmetric techniques
  • SANS 15946-1:2007 Information technology — Security techniques — Cryptographic techniques based on elliptic curves Part 1: General
  • SANS 15946-1:2009 Information technology - Security techniques - Cryptographic techniques based on elliptic curves Part 1: General
  • SANS 15946-1:2018 Information technology - Security techniques - Cryptographic techniques based on elliptic curves Part 1: General
  • SANS 13335-1:2005 Information technology - Security techniques - Management of information and communications technology security Part 1: Concepts and models for information and communications technology security management
  • SANS 19790:2009 Information technology - Security techniques - Security requirements for cryptographic modules
  • SANS 24759:2018 Information technology - Security techniques - Test requirements for cryptographic modules
  • SANS 9798-5:2006 Information technology - Security techniques - Entity authentication Part 5: Mechanisms using zero-knowledge techniques
  • SANS 11770-3:2009 Information technology - Security techniques - Key management Part 3: Mechanisms using asymmetric techniques
  • SANS 11770-3:2018 Information technology - Security techniques - Key management Part 3: Mechanisms using asymmetric techniques
  • SANS 9798-3:2003 Information technology - Security techniques - Entity authentication Part 3: Mechanisms using digital signature techniques
  • SANS 15946-2:2007 Information technology - Security techniques - Cryptographic techniques based on elliptic curves Part 2: Digital signatures
  • SANS 15946-3:2007 Information technology - Security techniques - Cryptographic techniques based on elliptic curves Part 3: Key establishment
  • SANS 11770-2:2004 Information technology — Security techniques — Key management Part 2: Mechanisms using symmetric techniques
  • SANS 19791:2007 Information technology - Security techniques - Security assessment of operational systems
  • SANS 15946-4:2007 Information technology - Security techniques - Cryptographic techniques based on elliptic curves Part 4: Digital signatures giving message recovery
  • SANS 16:2007 Information technology - Security techniques - Modes of operation for an n-bit block cipher

BELST, dia technology

  • STB 1450-2010 Technological documentation. Technological specification. General requirements for the development
  • STB 2465-2016 Dependability in technics. Dependability management of technically complicated items
  • STB 2351-2014 Technological documentation. Technological instruction for food products. General requirements for working out
  • STB 2466-2016 Dependability in technics. Dependability calculation of technically complicated items
  • STB 34.101.50-2019 Information technology and security. Procedures for registering information technology objects

Indonesia Standards, dia technology

International Telecommunication Union (ITU), dia technology

YU-JUS, dia technology

Taiwan Provincial Standard of the People's Republic of China, dia technology

  • CNS 14381-2-1999 Information technology-Security techniques - Key management - Part 2:Mechanisms using symmetric techniques
  • CNS 14381.2-1999 Information technology-Security techniques - Key management - Part 2:Mechanisms using symmetric techniques
  • CNS 14381-3-2007 Information technology - Security techniques - Key management - Part 3 : Mechanism using asymmetric techniques
  • CNS 14686-2002 Information technology -Security techniques -Procedures for the registration of cryptographic algorithms

General Administration of Quality Supervision, Inspection and Quarantine of the People‘s Republic of China, dia technology

  • GB/T 15021-1994 Micrographics rules for microfilming technical drawings and technical documentations on 35mm roll film
  • GB/T 17903.2-1999 Information technology-Security techniques-Non-repudiation-Part 2: Mechanisms using symmetric techniques
  • GB/T 17903.2-2008 Information technology. Security techniques. Non-repudiation. Part 2: Mechanisms using symmetric techniques
  • GB/T 17903.3-1999 Information technology-Security techniques-Non-repudiation-Part 3: Mechanisms using asymmetric techniques
  • GB/T 17903.3-2008 Information technology. Security techniques. Non-repudiation. Part 3: Mechanisms using asymmetric techniques
  • GB/T 15843.5-2005 Information technology.Security techniques.Entity authentication.Part 5:Mechanisms using zero knowledge techniques
  • GB/T 15843.3-2016 Information technology.Security techniques.Entity authentication.Part 3:Mechanisms using digital signature techniques
  • GB/T 8989-1998 Micrographics--Quality criteria and control of micrography of technical drawings and documentations
  • GB/T 15843.3-1998 Information technology--Security techniques--Entity authentication--Part 3: Mechanisms using asymmetric signature techniques
  • GB/T 15843.3-2008 Information technology.Security techniques.Entity authentication.Part3:Mechanisms using digital signature techniques
  • GB/T 15843.3-2023 Information Technology Security Technical Entity Authentication Part 3: Mechanisms Using Digital Signature Technology
  • GB/Z 41297-2022 General technical requirements for tourism informatization service based on M2M technology

Group Standards of the People's Republic of China, dia technology

  • T/CSSTI 0001-2023 Classification and Coding of Technologies for Future Technology Monitoring Information Part 1: Biotechnology
  • T/CECA 20013-2021 Guidelines for Technical Evaluation of Urban Water Supply Engineering Design Technology
  • T/WAPIA 035.3-2020 IT security techniques-Entity authentication-Part 3: Mechanisms using digital signature techniques
  • T/ITS 0051-2017 General technical requirements of LTE-based Vehicular Communication

国家市场监督管理总局、中国国家标准化管理委员会, dia technology

  • GB/T 17903.2-2021 Information technology—Security techniques—Non-repudiation—Part 2: Mechanisms using symmetric techniques
  • GB/T 36624-2018 Information technology—Security techniques—Authenticated encryption
  • GB/T 17901.3-2021 Information technology—Security techniques—Key management—Part 3: Mechanisms using asymmetric techniques

SE-SIS, dia technology

AT-ON, dia technology

  • ONORM A 6020-1989 Technical drawings; electroplated coatings; indication on technical drawings

Association Francaise de Normalisation, dia technology

  • NF E04-117*NF EN ISO 6414:2020 Technical product documentation (TPD) - Technical drawings for glassware
  • NF EN 12324-3:1999 Techniques d'irrigation - Installations avec enrouleurs - Présentation des caractéristiques techniques
  • XP CEN/TS 16937:2016 Nanotechnologies - Guide pour le développement responsable des nanotechnologies
  • NF Z74-007*NF ISO/IEC 27031:2014 Information technology - Security techniques - Guidelines for information and communication technology readiness for business continuity
  • NF Z74-209*NF EN ISO/IEC 19790:2020 Information technology - Security techniques - Security requirements for cryptographic modules
  • NF EN ISO/IEC 19790:2020 Technologies de l'information - Techniques de sécurité - Exigences de sécurité pour les modules cryptographiques
  • NF Z74-100:1991 INFORMATION TECHNOLOGY. SECURITY TECHNIQUES. DIGITAL SIGNATURE SCHEME GIVING MESSAGE RECOVERY.
  • NF EN 17736:2022 Technologies du spectacle - Spécifications pour la conception et la fabrication de praticables de scène en aluminium
  • NF Z67-012:1993 INFORMATION TECHNOLOGY. PROGRAM CONSTRUCTS AND CONVENTIONS FOR THEIR REPRESENTATION. (EUROPEAN STANDARD EN 28631).
  • FD T16-218*FD ISO/TR 18196:2017 Nanotechnologies - Measurement technique matrix for the characterization of nano-objects

European Committee for Standardization (CEN), dia technology

  • PD CEN/TR 16672:2014 Information technology - Privacy capability features of current RFID technologies
  • CEN/TR 16672:2014 Information technology - Privacy capability features of current RFID technologies

KP-CSK, dia technology

  • KPS 10877-2-2002 Information technology-Security techniques-Key management-Part 2:Mechanisms using symmetric techniques

KR-KS, dia technology

  • KS X ISO/IEC 15946-1-2019 Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 1: General
  • KS X ISO/IEC 11770-3-2019 Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques
  • KS X ISO/IEC 10116-2018 Information technology — Security techniques — Modes of operation for an n-bit block cipher
  • KS B ISO 6552-2003(2023) Automatic steam traps-Definition of technical terms

VN-TCVN, dia technology

  • TCVN 4210-1986 System of technological documents.Rules of making documents on technical control

VE-FONDONORMA, dia technology

ES-AENOR, dia technology

United States Navy, dia technology

American Society for Testing and Materials (ASTM), dia technology

PL-PKN, dia technology

SAE - SAE International, dia technology

Institute of Interconnecting and Packaging Electronic Circuits (IPC), dia technology

IL-SII, dia technology

American Society of Mechanical Engineers (ASME), dia technology

ITU-R - International Telecommunication Union/ITU Radiocommunication Sector, dia technology

NEMA - National Electrical Manufacturers Association, dia technology

Professional Standard - Post and Telecommunication, dia technology

  • YD/T 2916-2015 Technical requirements for disaster recovery based on storage replication
  • YD/T 2029-2009 Softwire based mesh framework for internet IPv6 transition
  • YD/T 2100-2010 GSM-based digital trunking mobile communication system - General technical requirement
  • YD/T 2178-2010 Technical requirement of single ethernet ring protection based on EAPS

AENOR, dia technology

API - American Petroleum Institute, dia technology

ES-UNE, dia technology

  • UNE-EN ISO/IEC 19790:2020 Information technology - Security techniques - Security requirements for cryptographic modules (ISO/IEC 19790:2012, including corrected version 2015-12)

Compressed Gas Association (U.S.), dia technology

  • CGA H-4-2013 Terminology associated with hydrogen fuel technologies
  • CGA H-4-2020 Terminology associated with hydrogen fuel technologies

IN-BIS, dia technology

PH-BPS, dia technology

  • PNS ISO/IEC 38506:2021 Information technology - Governance of IT - Application of ISO/IEC 38500 to the governance of IT enabled investments
  • PNS ISO/IEC 29190:2021 Information technology - Security techniques - Privacy capability as sessment model

NZ-SNZ, dia technology

  • AS/NZS ISO/IEC 11770.3:2008 Information technology-Security techniques-Key management Part 3: Mechanisms using asymmetric techniques
  • AS/NZS ISO/IEC 9798.3:2008 Information technology-Security techniques-Entity authentication Part 3: Mechanisms using digital signature techniques

Lithuanian Standards Office , dia technology

  • LST ISO/IEC 9798-3:2000 Information technology. Security techniques. Entity authentication. Part 3: Mechanisms using digital signature techniques
  • LST ISO/IEC 18032:2007 Information technology - Security techniques - Prime number generation (identical ISO/IEC 18032:2005)

中国民用航空局, dia technology

  • MH/T 9010.1-2018 Technical specifications for ground-to-air high-speed data links based on LET technology Part 1: Overall technical specifications

工业和信息化部, dia technology

  • YD/T 4117-2022 Technical requirements for Internet IPv6 transition technology management information base (MIB) based on mesh soft line technology
  • YD/T 3197-2016 Overall technical requirements for tourism information services based on M2M technology

IEC - International Electrotechnical Commission, dia technology

  • PAS 60027-6-2004 Letter symbols to be used in electrical technology – Control technology (Edition 1.0)

BE-NBN, dia technology

NL-NEN, dia technology

FI-SFS, dia technology

Society of Motion Picture and Television Engineers (SMPTE), dia technology

SG-SPRING SG, dia technology

  • SS 8-2001 SPECIFICATION FOR Hydrochloric acid, technical

A4A - Airlines for America, dia technology

US-ACEI, dia technology

  • IPC TA-721 Technology Assessment of Multilayer Boards

IPC - Association Connecting Electronics Industries, dia technology

Inner Mongolia Provincial Standard of the People's Republic of China, dia technology

ACI - American Concrete Institute, dia technology

European Telecommunications Standards Institute (ETSI), dia technology

  • ETSI EN 303 883-2016 Short Range Devices (SRD) using Ultra Wide Band (UWB); Measurement Techniques (V1.1.1)

Institute of Electrical and Electronics Engineers (IEEE), dia technology

  • IEEE 1003.1/COR 2-2004 Information technology - Portable Operating System Interface (POSIX); Technical Corrigendum 2

RTCA - RTCA@ Inc., dia technology

  • RTCA DO-332-2011 Object-Oriented Technology and Related Techniques Supplement to DO-178C and DO-278A




Copyright ©2007-2023 ANTPEDIA, All Rights Reserved