ISO/IEC 7816-2:2007 specifies the dimensions and locations for each of the contacts on an integrated circuit card of an ID-1 card type. It also provides information on the way to identify which standards define the use of the contacts. ISO/IEC 7816-2:2007 is to be used in conjunction with ISO/IEC 7816-1.
Specifies test methods for media characteristics of 356-mm nominal diameter optical disk cartridges used for information processing systems and for information storage.
Specifies requirements for the use of ISO/IEC 19784-1, BioAPI Specification (also known as BioAPI 2.0), a software interface standard, for the purpose of performing a tenprint capture operation. This includes one or more of the following: 1. Identification of BioAPI functions to be utilized and the order (if any) in which they are to be called 2. Specification of values for function parameters 3. Definition of GUI (graphical user interface) events (for use with an application controlled GUI) 4. User interface specifications for use with a BSP (biometric service provider) controlled GUI 5. Sample calling sequences and example inputs/outputs.
Amendment 2 to ISO/IEC 10179:1996
Indicates that the accuracy requirements in ISO/IEC 13818-1 for PCRs in Transport Streams is not changed by the requirements of this part of ISO/IEC 13818. All Transport Streams, whether or not they are delivered in accordance with the RTI shall comply with ISO/IEC 13818-1. Compliance with this part of ISO/IEC 13818 is not required for compliance with ISO/IEC 13818-1. This part of ISO/IEC 13818 does not change or supersede any of the requirements in ISO/IEC 13818-1.
Defines ACSE services for ASO-association control in an open systems interconnection environment. ACSE supports two modes of communication service: connection-mode and connectionless-mode. The ACSE connection-mode service is provided by the use of the con
Specifies tweakable block ciphers. A tweakable block cipher is a family of n-bit permutations parametrized by a secret key value and a public tweak value. Such primitives are generic tools that can be used as building blocks to construct cryptographic schemes such as encryption, Message Authentication Codes, authenticated encryption, etc. A total of five different tweakable block ciphers are defined. They are categorized in Table 1.
Specifies anonymous entity authentication mechanisms based on signatures using a group public key in which a verifier verifies a group signature scheme to authenticate the entity with which it is communicating, without knowing this entity's identity. Provides: a general description of an anonymous entity authentication mechanism based on signatures using a group public key; a variety of mechanisms of this type. Describes: the group membership issuing processes; anonymous authentication mechanisms without an online Trusted Third Party (TTP); anonymous authentication mechanisms involving an online TTP.
Part 5-3 defines the Desktop specification for PowerPC 32 architecture, a system interface for compiled applications and a minimal environment for support of installation scripts. Its purpose is to enable a uniform industry standard environment for high-volume applications conforming to the LSB.