Àô²y¼Ð·Çºô-CNS¼Ð·Ç¸Ñ¨M¤§¹D¡I | ­º­¶ | µn¿ý | µù¥U | Ápô§Ú­Ì | English |
¡¡ ¡¡

Chinese National Standards
中華民國國家標準
- Taiwan 台灣 -
¡@

"Gy " CNS ¼Ð·Ç²M³æ

| ¤Á½uÁä¡] | ¤ì¾¹¥Î»E | ¤ò¤y´ª« | ×ôÃþ¤ñ­« | ¿Nµ²¤£ù× | ¤Æ¾Ç¸ÕÃÄ | º£µ·¥¬±a | ¥Ö¾c | ¤u·~¥ÎÁ_ | µL¤ß¿i§É |

A-¤g¤ì¤uµ{¤Î«Ø¿v
CNS 12053:2019 - ­^¤åª©
Åé¨|À]¥Î¿û»s¬[°ª¦aªO²Õ¥ó
Steel Furring Components for Gymnasium Floors - English Version
X-¸ê°T¤Î³q«H
CNS 14213-7:2019 - ­^¤åª©
¸ê°T§Þ³N¡Ð¶}©ñ¨t²Î¤¬³s¡Ð¶}©ñ¨t²Î¤¬³sµù¥U¾÷ºc§@·~µ{§Ç¡Ð²Ä¢¶³¡¡G¥Î©ó¯S©w¤º®e¤§°ê»Ú¦WºÙ«ü©w
Information technology - Open systems interconnection - Procedures for the operation of OSI registration authorities - Part 7: Assignment of international names for use in specific contexts - English Version
X-¸ê°T¤Î³q«H
CNS 15327-5:2019 - ­^¤åª©
¸ê°T§Þ³N¡Ð¦Û°ÊÃѧO¤Î¸ê®ÆÂ^¨ú§Þ³N¡Ð°ß¤@ÃѧO¡Ð²Ä5³¡¡G­Ó§O¥i°hÁÙ¹B°e«~¶µ
Information technology ? Automatic identification and data capture techniques ? Unique identification ? Part 5: Individual returnable transport items (RTIs) - English Version
X-¸ê°T¤Î³q«H
CNS 15135:2019 - ­^¤åª©
¸ê°T§Þ³N¡Ð¦w¥þ§Þ³N¡Ð±K½X¼Ò²Õ¦w¥þ­n¨D
Information technology - Security techniques - Security requirements for cryptographic modules - English Version
X-¸ê°T¤Î³q«H
CNS 15327-4:2019 - ­^¤åª©
¸ê°T§Þ³N¡Ð¦Û°ÊÃѧO¤Î¸ê®ÆÂ^¨ú§Þ³N¡Ð°ß¤@ÃѧO¡Ð²Ä4³¡¡G­Ó§O²£«~¤Î²£«~¥]»q
Information technology ? Automatic identification and data capture techniques ? Unique identification ? Part 4: Individual products and product packages - English Version
D-¾÷°Ê¨®¤Î¯è¤Ó¤uµ{
CNS 10702:2019 - ­^¤åª©
¨T¨®­p¶Oªí¦Wµü
The Terminology of Taximeter - English Version

¤w½Ķ
X-¸ê°T¤Î³q«H
CNS 15201:2019 - ­^¤åª©
¸ê°T§Þ³N¡Ð®a®x¹q¤l¨t²Î¥Î»y
Information technology - Terminology for the Home Electronic System (HES) - English Version
X-¸ê°T¤Î³q«H
CNS 14381-3:2019 - ­^¤åª©
¸ê°T§Þ³N¡Ð¦w¥þ§Þ³N¡Ðª÷Æ_ºÞ²z¡Ð²Ä¢²³¡¡G¨Ï¥Î«D¹ïºÙ§Þ³Nªº¾÷¨î
Information technology - Security techniques - Key management - Part 3 : Mechanism using asymmetric techniques - English Version
X-¸ê°T¤Î³q«H
CNS 15234-1:2019 - ­^¤åª©
¸ê°T§Þ³N¡Ð¦w¥þ§Þ³N¡Ð°ò©ó¾ò¶ê¦±½u¤§±K½X§Þ³N¡Ð²Ä¢°³¡¡G¤@¯ë
Information technology - Security techniques - Cryptographic techniques based on elliptic curves - Part 1: General - English Version
X-¸ê°T¤Î³q«H
CNS 15133:2019 - ­^¤åª©
¸ê°T§Þ³N¡Ð¦w¥þ§Þ³N¡Ð¨ü«H¿à²Ä¤T¤èªA°Èªº¨Ï¥Î»PºÞ²z¤§«ü¾Éºõ­n
Information technology - Security techniques - Guidelines for the use and management of Trusted Third Party services - English Version
X-¸ê°T¤Î³q«H
CNS 15234-2:2019 - ­^¤åª©
¸ê°T§Þ³N¡Ð¦w¥þ§Þ³N¡Ð°ò©ó¾ò¶ê¦±½u¤§±K½X§Þ³N¡Ð²Ä¢±³¡¡G¼Æ¦ìñ³¹
Information technology - Security techniques - Cryptographic techniques based on elliptic curves - Part 2: Digital signatures - English Version
C-¹q¾÷¤uµ{, ¹q¤l¤uµ{
CNS 62949:2019 - ­^¤åª©
³s±µ¦Ü¸ê³q°T§Þ³Nºô¸ô¤§³]³Æªº¯S©w¦w¥þ­n¨D
Particular safety requirements for equipment to be connected to information and communication technology networks - English Version
X-¸ê°T¤Î³q«H
CNS 14381-1:2019 - ­^¤åª©
¸ê°T§Þ³N¡Ð¦w¥þ§Þ³N¡Ðª÷Æ_ºÞ²z¡Ð²Ä¢°³¡¡G®Ø¬[
Information technology - Security techniques - Key management-Part 1 : Framework - English Version
X-¸ê°T¤Î³q«H
CNS 13889-2:2019 - ­^¤åª©
¸ê°T§Þ³N¡Ð©â¶H»yªk°Oªk(¤@)¡G¸ê°Tª«¥ó³W®æ
Information technology ¡V Abstract Syntax Notation One (ASN.1) :Information object specification - English Version
X-¸ê°T¤Î³q«H
CNS 27010:2019 - ­^¤åª©
¸ê°T§Þ³N¡Ð¦w¥þ§Þ³N¡Ð¸ó³¡ªù¤Î¸ó²Õ´³q°T¤§¸ê°T¦w¥þºÞ²z
Information technology ? Security techniques ? Information security management for inter-sector and inter-organizational communications - English Version
X-¸ê°T¤Î³q«H
CNS 27014:2019 - ­^¤åª©
¸ê°T§Þ³N¡Ð¦w¥þ§Þ³N¡Ð¸ê°T¦w¥þªv²z
Information technology ? Security techniques ? Governance of information security - English Version
X-¸ê°T¤Î³q«H
CNS 15275-4:2019 - ­^¤åª©
¸ê°T§Þ³N¡Ð¦Û°ÊÃѧO»P¸ê®ÆÂ^¨ú§Þ³N¡Ð½Õ©Mµü·J¡Ð²Ä4 ³¡¡GµL½u¹q³q°T¬ÛÃö·§­z¥Î»y
Information technology ? Automatic identification and data capture (AIDC) techniques ? Harmonized vocabulary ? Part 4: General terms relating to radio communications - English Version
X-¸ê°T¤Î³q«H
CNS 15134-3:2019 - ­^¤åª©
¸ê°T§Þ³N¡Ð¦w¥þ§Þ³N¡Ð¸ê°T§Þ³Nºô¸ô¦w¥þ¡Ð²Ä¢²³¡¡G¨Ï¥Î¦w¥þ¹h¹D¤§ºô¸ô¶¡ªº¦w¥þ³q°T
Information technology - Security techniques - IT network security - Part 3 : Securing communications between networks using security gateways - English Version
X-¸ê°T¤Î³q«H
CNS 29100-1:2019 - ­^¤åª©
¸ê°T§Þ³N¡Ð¦w¥þ§Þ³N¡Ð­Ó¸êºÞ²z¨t²Î­n¨D¨Æ¶µ
Information technology ? Security techniques ? Specification for a personal information management system - English Version
X-¸ê°T¤Î³q«H
CNS 14929-1:2019 - ­^¤åª©
¸ê°T§Þ³N¡Ð¦w¥þ§Þ³N¡Ð¸ê°T»P³q°T§Þ³N¦w¥þºÞ²z¡Ð²Ä1³¡¡G¸ê°T»P³q°T§Þ³N¦w¥þºÞ²z·§©À»P¼Ò«¬
Information technology - Security techniques - Management of information and communications technology security - Part 1: Concepts and models for information and communications technology security management - English Version
X-¸ê°T¤Î³q«H
CNS 15234-3:2019 - ­^¤åª©
¸ê°T§Þ³N¡Ð¦w¥þ§Þ³N¡Ð°ò©ó¾ò¶ê¦±½u¤§±K½X§Þ³N¡Ð²Ä¢²³¡¡Gª÷Æ_«Ø¥ß
Information technology - Security techniques - Cryptographic techniques based on elliptic curves - Part 3: Key establishment - English Version
X-¸ê°T¤Î³q«H
CNS 15234-4:2019 - ­^¤åª©
¸ê°T§Þ³N¡Ð¦w¥þ§Þ³N¡Ð°ò©ó¾ò¶ê¦±½u¤§±K½X§Þ³N¡Ð²Ä¢³³¡¡G¨ã°T®§´_­ì¤§¼Æ¦ìñ³¹
Information technology - Security techniques - Cryptographic techniques based on elliptic curves - Part 4: Digital signatures giving message recovery - English Version
Z1-¤u·~¦w¥þ
CNS 9329:2018 - ­^¤åª©
²î²í¤Î®ü¬v§Þ³N¡ÐºÞ½u¨t²Î¤º®eª«ÃѧOÃC¦â
Ships and marine technology ? Identification colours for the content of piping systems - English Version
X-¸ê°T¤Î³q«H
CNS 15567-3:2018 - ­^¤åª©
¸ê°T§Þ³N¡Ð®a®x¹q¤l¨t²ÎÀ³¥Î¼Ò«¬¡Ð²Ä3³¡¡GHES¤§¯à·½ºÞ²z¨t²Î¼Ò«¬
Information technology ¡V Home Electronic System (HES) application model ¡V Part 3: Model of an energy management system for HES - English Version
Z9-¤@¯ë¤Î¨ä¥L
CNS 15025-2:2018 - ­^¤åª©
¦L¨ê§Þ³N¡Ð¥b¦â½Õ¤À¦â¡B¥´¼Ë©M¦L¨ê«~ªº»s§@¹Lµ{±±¨î¡Ð²Ä¢±³¡¡G¥­ª©¦L¨ê»sµ{
Graphic technology - Process control for the production of half-tone color separation, proof and production prints - Part 2: Offset lithography processes - English Version
Z5-ª«¬y¤Î¥]¸Ë
CNS 16053:2018 - ­^¤åª©
¸ê°T§Þ³N¡Ð¦Û°ÊÃѧO¤Î¸ê®ÆÂ^¨ú§Þ³N¡Ð±ø½X¦C¦L«~½è´ú¸Õ³W®æ¡Ð¤Gºû²Å¸¹
Information technology ? Automatic identification and data capture techniques ? Bar code symbol print quality test specification ? Two-dimensional symbols - English Version
X-¸ê°T¤Î³q«H
CNS 19086-3:2018 - ­^¤åª©
¸ê°T§Þ³N¡Ð¶³ºÝ¹Bºâ¡ÐªA°È¤ô·Ç¨óij(SLA)®Ø¬[¡Ð²Ä3³¡¡G®Ö¤ß²Å¦X©Ê­n¨D¨Æ¶µ
Information technology ? Cloud computing ? Service level agreement (SLA) framework ? Part 3: Core conformance requirements - English Version
X-¸ê°T¤Î³q«H
CNS 14378:2018 - ­^¤åª©
¸ê°T§Þ³N¡Ð¨t²Î¶¡¹q«H»P¸ê°T¥æ´«¡Ð¨Ï¥ÎX¡D25´£¨ÑOSI³s±µ¼Ò¦¡ºô¸ôªA°È
Information technology-Telecommunications and information exchange between systems - Use of X.25 to provide the OSIconnection- Mode network service - English Version
Z9-¤@¯ë¤Î¨ä¥L
CNS 15025-1:2018 - ­^¤åª©
¦L¨ê§Þ³N¡Ð¥b¦â½Õ¤À¦â¡B¥´¼Ë¤Î¦L¨ê«~¤§»s§@¹Lµ{±±¨î¡Ð²Ä¢°³¡¡G°Ñ¼Æ¤Î´ú¶q¤èªk
Graphic technology - Process control for the production of half-tone colour separations, proof and production prints - Part 1: Parameters and measurement methods - English Version
X-¸ê°T¤Î³q«H
CNS 13359-1:2018 - ­^¤åª©
¸ê°T§Þ³N¡Ð°ÊºA¼v­µ¦b¼Æ¦ìÀx¦s´CÅé¬ù1.5Mbps¤U¤§½s½X¡Ð²Ä1³¡¡G¨t²Î
Information technology-Coding of moving pictures and associated audio for digital storage media at up to about 1.5 Mbit/s-Part 1:Systems - English Version

§ä¨ì:558±ø¥Ø   |  [­º­¶]-[¤W¤@­¶]-[¤U¤@­¶]-[§À­¶]  | ¥h¨ì: [2] [3] [4] [5] [6] [7] [8]

¡@

| ­º­¶ | ±`¨£°ÝÃD | µn¿ý | µù¥U | Ápô§Ú­Ì | English | ©  CNS-standards.org   2001-2025 ª©Åv©Ò¦³
¥DºÞ¾÷Ãö³sµ²:
¸gÀÙ³¡¼Ð·ÇÀËÅç§½
¥»ºô¯¸«DÁõÄÝ©ó¸gÀÙ³¡¼Ð·ÇÀËÅç§½