Provides usage examples of ASCs for specific applications.
Describes the characteristics for identification cards and the use of such cards for international interchange. This document specifies the physical characteristics of identification cards including card materials, construction, characteristics and dimensions for four sizes of cards.
Specifies entity authentication mechanisms using zero-knowledge techniques: mechanisms based on identities and providing unilateral authentication; mechanisms based on integer factorization and providing unilateral authentication; mechanisms based on discrete logarithms with respect to numbers that are either prime or composite, and providing unilateral authentication; mechanisms based on asymmetric encryption systems and providing either unilateral authentication, or mutual authentication; mechanisms based on discrete logarithms on elliptic curves and providing unilateral authentication.
This technical report selects and restricts logical options from the Fibre Channel Framing and Signaling, Fibre Channel Protocol for SCSI, Fibre Channel Arbitrated Loop, Fibre Channel Generic Services, and Fibre Channel Single Byte Command Set standards. The intent of this technical report is to facilitate interoperablity between devices whether they are connected in a loop or Fabric topology.
This Standard specifies key establishment schemes using public-key cryptography based on the integer factorization problem. Both key agreement and key transport schemes are specified. The schemes may be used by two parties to transport or agree on shared keying material. The keying material may be used to provide other cryptographic services that are outside the scope of this Standard, e.g. data confidentiality, data integrity, and symmetric-key-based key establishment.
This standard specifies the most commonly used character line spacings for office machines and data processing equipment.
This standard is concerned solely with the scientific 'technical performance testing' of biometric system(s) and subsystem(s) to be used for access control.
The set of AT Attachment standards consists of this standard and the ATA implementation standards described in AT Attachment - 8 ATA/ATAPI Architecture Model (ATA8-AAM). This standard specifies the command set that host systems use to access storage devices that implement the Host Aware Zones feature set (see 4.3), the Host Managed Zones feature set (see 4.4), the Zone Domains feature set (see 4.5), and the Zone Realms feature set (see 4.6). This standard provides a common command set for systems manufacturers, system integrators, software suppliers, and suppliers of storage devices that provide one or more of the zones feature sets. Figure 1 shows the relationship of this standard to other ATA standards as well as related device and host standards and specifications (e.g., SCSI standards and SATA-IO specifications).
Provides the PICS proforma for the Distributed Transaction Processing Protocol as specified in ITU-T Rec. X.862 ISO/IEC 10026-3 in compliance with the relevant requirements, and in accordance with the relevant guidance, given in CCITT Rec. X.291 ISO/IEC 9646-2.
This International Standard specifies the conditions for conformance testing; the environments in which the cartridges are to be operated and stored; the mechanical, physical and dimensional characteristics of the case and of the cartridges, so as to provide mechanical interchangeability between the data processing systems; the format of the information on the disk, both embossed and user-written, including the physical disposition of the tracks and sectors, the error correction codes, and the modulation method used; the characteristics ofthe embossed information on the disk; the magneto-optical characteristics of the disk, enabling processing systems to write onto the di.