loading
IEEE INFORMATION - INFORMATION GRAPHICS: A COMPRHENSIVE ILLUSTRATED REFERENCE
IEEE
A description is not available for this item.
PCMCIA SYSTEM - PCMCIA SYSTEM ARCHITECTURE
PCMCIA
A description is not available for this item.
ANSI X9 TR 51 - Levies Companion Document Uniform Adoption of X9.129 for Levies
July 26, 2020 - ASC/X9

Purpose of the Document The purpose of this document is to formalize an industry standard for exchange of legal orders using the ANSI X9.129 standard format and a compilation of industry norms. This document is not intended to replace the ANSI X9.129 standard, but rather to clarify how financial...

ITU-T X.519 - Information technology – Open Systems Interconnection – The Directory: Protocol specifications
October 1, 2019 - ITU-T

This Recommendation | International Standard specifies the Directory Access Protocol, the Directory System Protocol, the Directory Information Shadowing Protocol, and the Directory Operational Binding Management Protocol which fulfil the abstract services specified in Rec. ITU-T...

ITU-T X.501 - Information technology – Open Systems Interconnection – The Directory: Models
October 1, 2019 - ITU-T

The models defined in this Recommendation | International Standard provide a conceptual and terminological framework for the other ITU-T X.500-series Recommendations | parts of ISO/IEC 9594 which define various aspects of the Directory. The functional and administrative authority models...

ANSI X9.80 - Prime Number Generation, Primality Testing, and Primality Certificates
April 9, 2020 - ASC/X9

In the current state of the art in public key cryptography, all methods require, in one way or another, the use of prime numbers as parameters to the various algorithms. This document presents a set of accepted techniques for generating prime numbers, often referred to as simply "primes". It is...

ITU-T X.609.5 - Managed P2P communications: Overlay management protocol
April 1, 2020 - ITU-T

This Recommendation specifies overlay management protocol for various services including multimedia streaming and content distribution over managed peer-to-peer infrastructure. This Recommendation describes the following details: - overview of overlay management protocol, - elements of protocol...

ITU-T X.521 - Information technology – Open Systems Interconnection – The Directory: Selected object classes
October 1, 2019 - ITU-T

This Recommendation | International Standard defines a number of object classes and name forms which may be found useful across a range of applications of the Directory. The definition of an object class involves listing a number of attribute types which are relevant to objects of that class. The...

ITU-T X.677 - Identification mechanism for unmanned aerial vehicles using object identifiers
March 1, 2020 - ITU-T

This Recommendation analyses the requirements for full life-cycle management and operating identity recognition of unmanned aerial vehicles (UAVs) with security considerations. It also specifies an identification mechanism for UAVs using object identifiers (OIDs), including detailed specifications...

ITU-T X.1605 - Security requirements of public Infrastructure as a Service (IaaS) in cloud computing
March 1, 2020 - ITU-T

This Recommendation analyses security challenges faced by Infrastructure as a Service (IaaS) providers in IaaS environments, and specifies security requirements of public IaaS in cloud computing. This Recommendation is applicable for public IaaS providers. This is a high-level description of the...

ITU-T X.1372 - Security guidelines for vehicle-to-everything (V2X) communication systems
March 1, 2020 - ITU-T

This Recommendation provides security guidelines for vehicle-to-everything (V2X) communication. V2X is a generic term comprising the communication modes termed as vehicle-to-vehicle (V2V), vehicle-to-infrastructure (V2I), vehicle-to-nomadic devices (V2D) and vehicle-to-pedestrian (V2P) when...

ITU-T X.1604 - Security requirements of Network as a Service (NaaS) in cloud computing
March 1, 2020 - ITU-T

This Recommendation analyses security threats and challenges on Network as a Service (NaaS) in cloud computing, and specifies security requirements of NaaS in NaaS application, NaaS platform and NaaS connectivity aspects based on corresponding cloud capability types.

ITU-T X.1365 - Security methodology for the use of identity-based cryptography in support of Internet of things (IoT) services over telecommunication networks
March 1, 2020 - ITU-T

This Recommendation specifies a security methodology for the use of identity-based cryptography (IBC) technology in support of Internet of things (IoT) services over telecommunications networks. This security methodology includes mechanisms for device identification, private key issue, public...

ITU-T X.1332 - Security guidelines for smart metering services in smart grids
March 1, 2020 - ITU-T

This Recommendation provides security guidelines for smart metering services in smart grids. It covers the following: - identification of security threats and attacks against smart metering services; - security requirements for smart metering services; and - security guidelines for smart metering...

ITU-T X.1364 - Security requirements and framework for narrowband Internet of things
March 1, 2020 - ITU-T

This Recommendation analyses potential deployment schemes and typical application scenarios for narrowband Internet of things (NB-IoT). It specifies security threats and requirements specific to NBIoT deployments and establishes a security framework for operators to safeguard applications of this...

ASHRAE SYSTEMS & EQUIP SI - 2020 ASHRAE Handbook HVAC Systems and Equipment SI Edition
January 1, 2020 - ASHRAE
A description is not available for this item.
ASHRAE SYSTEMS & EQUIP IP - 2020 ASHRAE Handbook HVAC Systems and Equipment I-P Edition
January 1, 2020 - ASHRAE
A description is not available for this item.
ITU-T X.609.8 - Managed P2P communications: Management protocol for live data sources
December 1, 2019 - ITU-T

This Recommendation specifies a management protocol for data sources that generate live data continuously. The examples of live data include a live sensor data and a live CCTV stream, and they can be applicable to disaster recovery, autonomous vehicles, etc. The protocol specified by this...

ITU-T X.1702 - Quantum noise random number generator architecture
November 1, 2019 - ITU-T

This Recommendation provides a set of recommendations for a specific evaluation of entropy sources to distinguish non-quantum physical entropy sources from quantum physical entropy sources. It also provides the following specification regarding quantum physical entropy sources: - a description of...

ITU-T X.1401 - Security threats to distributed ledger technology
November 1, 2019 - ITU-T

This Recommendation provides guidance and categorization on security threats to distributed ledger technology (DLT) components. Each of the threats is described in four dimensions: - targeted component; - attacks; - attack impact; and - attack likelihood. It also assigns an index to security...

Advertisement