11.01.2015 Views

JTC 1/SC 31 relevance to IoT - OGC Network

JTC 1/SC 31 relevance to IoT - OGC Network

JTC 1/SC 31 relevance to IoT - OGC Network

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>SC</strong> <strong>31</strong>/WG 7 <br />

ISO/IEC 29167-­‐1:2012<br />

ISO/IEC NP 29167-­‐1<br />

ISO/IEC NP 29167-­‐3<br />

ISO/IEC WD 29167-­‐6<br />

ISO/IEC NP 29167-­‐10<br />

ISO/IEC NP 29167-­‐11<br />

ISO/IEC NP 29167-­‐12<br />

ISO/IEC NP 29167-­‐13<br />

ISO/IEC NP 29167-­‐14<br />

ISO/IEC NP 29167-­‐15<br />

ISO/IEC NP 29167-­‐16<br />

Information technology -­‐-­‐ Au<strong>to</strong>matic identification and data capture techniques -­‐-­‐ Part 1: Air interface <br />

for security services and file management for RFID architecture<br />

Information technology -­‐-­‐ Au<strong>to</strong>matic identification and data capture techniques -­‐-­‐ Part 1: Air interface <br />

for security services and file management for RFID architecture<br />

Information technology -­‐-­‐ Au<strong>to</strong>matic identification and data capture techniques -­‐-­‐ Part 3: Air Interface <br />

for security services and file management for RFID at 13.56 MHz<br />

Information technology -­‐-­‐ Au<strong>to</strong>matic identification and data capture techniques -­‐-­‐ Part 6: Air Interface <br />

for security services and file management for RFID at 860-­‐960 MHz<br />

Information technology -­‐-­‐ Au<strong>to</strong>matic identification and data capture techniques -­‐-­‐ Part 10: Air <br />

Interface for security services cryp<strong>to</strong> suite AES128<br />

Information technology -­‐-­‐ Au<strong>to</strong>matic identification and data capture techniques -­‐-­‐ Part 11: Air Interface <br />

for security services cryp<strong>to</strong> suite PRESENT-­‐80<br />

Information technology -­‐-­‐ Au<strong>to</strong>matic identification and data capture techniques -­‐-­‐ Part 12: Air Interface <br />

for security services cryp<strong>to</strong> suite ECC-­‐DH<br />

Information technology -­‐-­‐ Au<strong>to</strong>matic identification and data capture techniques -­‐-­‐ Part 13: Air Interface <br />

for security services cryp<strong>to</strong> suite Grain-­‐128A<br />

Information technology -­‐-­‐ Au<strong>to</strong>matic identification and data capture techniques -­‐-­‐ Part 14: Air <br />

Interface for security services cryp<strong>to</strong> suite -­‐ AES OFB-­‐like<br />

Information technology -­‐-­‐ Au<strong>to</strong>matic identification and data capture techniques -­‐-­‐ Part 15: Air Interface <br />

for security services cryp<strong>to</strong> suite XOR<br />

Information technology -­‐-­‐ Au<strong>to</strong>matic identification and data capture techniques -­‐-­‐ Part 16: Air <br />

Interface for security services cryp<strong>to</strong> suite ECDSA-­‐ECDH<br />

SYSTEMS<br />

Copyright © 2012- Q.E.D. Systems

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!