Information technology - Security techniques - Methodology for IT security evaluation
Document status: Active
Information security, cybersecurity and privacy protection - Evaluation criteria for IT security - Methodology for IT security evaluation
Document status: Active
Information technology - Radio frequency identification device performance test methods - Part 1: Test methods for system performance
Document status: Active
Information technology - Radio frequency identification device performance test methods - Part 2: Test methods for interrogator performance
Document status: Active
Information technology - Radio frequency identification device performance test methods - Part 2: Test methods for interrogator performance
Document status: Active
Information technology - Radio frequency identification device performance test methods - Part 3: Test methods for tag performance
Document status: Active
Information technology - Radio frequency identification device performance test methods - Part 3: Test methods for tag performance
Document status: Active
Information technology - Radio frequency identification device performance test methods - Part 3: Test methods for tag performance
Document status: Active
Information technology - Radio frequency identification device conformance test methods - Part 2: Test methods for air interface communications below 135 kHz
Document status: Active
Corrigendum 1 - Information technology -- Radio frequency identification device conformance test methods -- Part 2: Test methods for air interface communications below 135 kHz -
Document status: Active