loading
NEMA XR 9 - Power Supply Guidelines for X-Ray Machines
January 1, 1984 - NEMA
A description is not available for this item.
NEMA XR 8 - Test Methods for Diagnostic X-Ray Machines for Use During Initial Installation
January 1, 1979 - NEMA
A description is not available for this item.
ANSI X9.124-5 - Symmetric Key Cryptography For the Financial Services Industry — Format Preserving Encryption – Part 5 Format-preserving Feistel-based Mode FF3.1
January 14, 2021 - ASC/X9

The American National Standard (ANS) X9.124, Format Preserving Encryption, defines a collection of methods for encrypting data strings so that the length and the character set for the ciphertext is the same as those of the plaintext. This is called format-preserving encryption (FPE). These methods...

ITU-T X.1376 - Security-related misbehaviour detection mechanism using big data for connected vehicles
January 1, 2021 - ITU-T

This Recommendation describes a security-related misbehaviour detection mechanism for connected vehicles. The mechanism includes the following steps. a) Data capture. Specification of the types of data and information that can be captured from different sources, including automotive,...

ITU-T X.1368 - Secure firmware or software update for Internet of things devices
January 1, 2021 - ITU-T

This Recommendation specifies basic models and procedures for securely updating the firmware or software (FW/SW) of IoT devices. It also describes requirements and capabilities for IoT FW/SW updates. This Recommendation focuses on updating FW, but it is applicable to updating any other SW of IoT...

ITU-T X.1217 - Guidelines for applying threat intelligence in telecommunication network operation
January 1, 2021 - ITU-T

This Recommendation proposes guidelines for applying threat intelligence in telecommunication network operation after an overview analysis.

ANSI X9.6 - Committee on Uniform Security Identification Procedures Securities Identification CUSIP
December 22, 2020 - ASC/X9

This standard provides specifications for identifying an eligible security, financial instrument, or other investment media referred to hereinafter as an issue. It uniquely identifies the issuer, and with a few exceptions for high-volume fixed income programs, the issue as well. It shall serve as...

ITU-T X.1046 - Framework of software-defined security in software-defined networks/network functions virtualization networks
December 1, 2020 - ITU-T

This Recommendation specifies a framework of software-defined security in software-defined networks (SDNs) and the network functions virtualization (NFV) networks. This Recommendation provides the following: - analysis of the main security challenges including technical and operational aspects in...

ANSI X9.124-1 - Symmetric Key Cryptography for the Financial Services Industry - Format-Preserving Encryption - Part 1: Definitions and Model
October 15, 2020 - ASC/X9

The ANS X9.124 standard defines a collection of methods for encrypting data strings so that the length and the character set for the ciphertext is the same as those of the plaintext. This is called format-preserving encryption (FPE). These methods are useful in situations where fixed-format data,...

ITU-T X.1052 - Information security management processes for telecommunication organizations
October 1, 2020 - ITU-T

This Recommendation provides information security management processes for telecommunication organizations to support the implementation of [ITU-T X.1051]. This Recommendation is based on a process approach to describe a set of security management areas which give guidelines to...

ITU-T X.1710 - Security framework for quantum key distribution networks
October 1, 2020 - ITU-T

This Recommendation is the first in a series on the security of quantum key distribution (QKD) and provides a security framework for other related Recommendations. In particular, this Recommendation addresses the following items: - security aspects for quantum key distribution networks (QKDNs); -...

ITU-T X.1375 - Guidelines for an intrusion detection system for in-vehicle networks
October 1, 2020 - ITU-T

This Recommendation establishes guidelines for an intrusion detection system (IDS) for in-vehicle networks (IVNs). This Recommendation identifies threats to IVNs such as a controller area network (CAN), which is widely used in modern vehicles. This Recommendation mainly focuses on aspects of...

ITU-T X.1452 - Guidelines for security services provided by operators
October 1, 2020 - ITU-T

This Recommendation classifies potential use cases of security services provided by operators, analyses their specific requirements and specifies guidelines for operators to safeguard and improve their security services.

ITU-T X.1400 - Terms and definitions for distributed ledger technology
October 1, 2020 - ITU-T

This Recommendation contains a baseline set of terms and definitions for distributed ledger technology (DLT). The definition of each term provides a basic characterization of the term, and where appropriate, a note is included to provide additional clarity.

ITU-T X.1404 - Security assurance for distributed ledger technology
October 1, 2020 - ITU-T

This Recommendation defines three levels of security assurance for the distributed ledger technology (DLT). It further defines ten security assurance components encompassing security assurance and specifies criteria and guidelines for achieving each of the three levels of a security assurance...

ITU-T X.1714 - Key combination and confidential key supply for quantum key distribution networks
October 1, 2020 - ITU-T

This Recommendation describes key combination methods for quantum key distribution network (QKDN) and specifies security requirements for both the key combination and the key supply from QKDN to cryptographic applications. In particular, this Recommendation addresses the following points: - the...

ITU-T X.1374 - Security requirements for external interfaces and devices with vehicle access capability
October 1, 2020 - ITU-T

This Recommendation analyses security threats to connected vehicles in two parts: threats against interfaces which are used to communicate between a vehicle and its external devices, and threats against external devices which communicate with the vehicle. This Recommendation specifies security...

ITU-T X.1218 - Requirements and guidelines for dynamic malware analysis in a sandbox environment
October 1, 2020 - ITU-T

This Recommendation analyses threats related to unknown malwares and specifies requirements of unknown malware detection based on dynamic behaviour analysis. This Recommendation covers: - Analysis of threat scenarios related to unknown malwares, such as targeted/customized malwares; and -...

ANSI X9.142 - Public Key Cryptography for the Financial Services Industry — The Elliptic Curve Digital Signature Algorithm ECDSA
September 10, 2020 - ASC/X9

This Standard defines methods for digital signature (signature) generation and verification for the protection of messages and data using the Elliptic Curve Digital Signature Algorithm (ECDSA). The ECDSA shall be used in conjunction with an Approved hash function, as specified in the ASC X9...

ITU-T X.1254 - Entity authentication assurance framework
September 1, 2020 - ITU-T

This Recommendation provides a framework for managing entity authentication assurance (EAA) in a given context. In particular, it: - establishes three entity authentication assurance levels (AALs); - gives guidelines for understanding these entity AALs; - specifies criteria and guidelines for...

Advertisement