Provides guidance on the operational testing of biometric systems; specifies performance metrics for operational systems; details data that may be retained by operational systems to enable performance monitoring; and specifies requirements on test methods, recording of data, and reporting of results of operational evaluations.
Series defines various systems code points and fields that establish properties of a multimedia stream that are independent of the compression encoding and bit rate. These properties could describe the appropriate interpretation of decoded multimedia data or could, similarly, describe the characteristics of such signals before the signal is compressed by an encoder that is suitable for compressing such an input signal.
Provides usage examples of ASCs for specific applications.
Describes the characteristics for identification cards and the use of such cards for international interchange. This document specifies the physical characteristics of identification cards including card materials, construction, characteristics and dimensions for four sizes of cards.
Specifies entity authentication mechanisms using zero-knowledge techniques: mechanisms based on identities and providing unilateral authentication; mechanisms based on integer factorization and providing unilateral authentication; mechanisms based on discrete logarithms with respect to numbers that are either prime or composite, and providing unilateral authentication; mechanisms based on asymmetric encryption systems and providing either unilateral authentication, or mutual authentication; mechanisms based on discrete logarithms on elliptic curves and providing unilateral authentication.
This technical report selects and restricts logical options from the Fibre Channel Framing and Signaling, Fibre Channel Protocol for SCSI, Fibre Channel Arbitrated Loop, Fibre Channel Generic Services, and Fibre Channel Single Byte Command Set standards. The intent of this technical report is to facilitate interoperablity between devices whether they are connected in a loop or Fabric topology.
This Standard specifies key establishment schemes using public-key cryptography based on the integer factorization problem. Both key agreement and key transport schemes are specified. The schemes may be used by two parties to transport or agree on shared keying material. The keying material may be used to provide other cryptographic services that are outside the scope of this Standard, e.g. data confidentiality, data integrity, and symmetric-key-based key establishment.
This standard specifies the most commonly used character line spacings for office machines and data processing equipment.
This standard is concerned solely with the scientific 'technical performance testing' of biometric system(s) and subsystem(s) to be used for access control.
The set of AT Attachment standards consists of this standard and the ATA implementation standards described in AT Attachment - 8 ATA/ATAPI Architecture Model (ATA8-AAM). This standard specifies the command set that host systems use to access storage devices that implement the Host Aware Zones feature set (see 4.3), the Host Managed Zones feature set (see 4.4), the Zone Domains feature set (see 4.5), and the Zone Realms feature set (see 4.6). This standard provides a common command set for systems manufacturers, system integrators, software suppliers, and suppliers of storage devices that provide one or more of the zones feature sets. Figure 1 shows the relationship of this standard to other ATA standards as well as related device and host standards and specifications (e.g., SCSI standards and SATA-IO specifications).