"technique " CNS Standards List |
|
CNS 15134-4
2018 Edition Information technology - Security techniques - IT network security - Part 4: Securing remote access 資訊技術ï¼å®‰å…¨æŠ€è¡“ï¼è³‡è¨ŠæŠ€è¡“網路安全ï¼ç¬¬4部:é 端接å–之ä¿å…¨ |
![]() |
|
|
CNS 14629-3
2018 Edition Information technologyï¼Security techniquesï¼Digital signature with appendixï¼Part 3: Certificate-based mechanisms 資訊技術ï¼å®‰å…¨æŠ€è¡“ï¼å…·é™„件之數ä½ç°½ç« ï¼ç¬¬3部:憑è‰åŸºç¤Žæ©Ÿåˆ¶ |
![]() |
|
|
CNS 14233
2018 Edition Information processing - SGML support facilities - techniques for using SGML 資訊處ç†â€“標準通用標示語言支æ´è¨æ–½â€“標準通用標示語言的使用技術 |
![]() |
|
|
CNS 7654
2018 Edition Information technology-Character code structure and extension techniques 資訊技術–å—元碼çµæ§‹åŠå»¶ä¼¸æŠ€è¡“ |
![]() |
|
|
CNS 14510-3
2018 Edition Information technology-Security techniques-Non-repudiation Part3:Mechanisms using asymmetric techniques 資訊技術-安全技術-ä¸å¯å¦èªæ€§-第3部:使用éžå°ç¨±æŠ€è¡“之機制 |
![]() |
|
|
CNS 13398
2018 Edition Data Cryptographic techniques - Data Integrity Mechanism Using a Cryptographic Check Function Employing a Block Cipher Algorithm 資料密碼技術–使用å€å¡ŠåŠ å¯†æ¼”ç®—æ³•çš„å¯†ç¢¼æ ¸å°åŠŸèƒ½çš„資料完整性機制 |
![]() |
|
|
CNS 14105-2
2018 Edition Information technology-Security techniques-Hash functions-Part 2:Hash-functions using an n-bit block cipher algorithm 資訊技術–安全技術–雜湊函數–第2部:使用nä½å…ƒå€å¡ŠåŠ 密演算法之雜湊函數 |
![]() |
|
|
CNS 14510-1
2018 Edition Information technology - Security techniques - Non-repudiation - Part 1 : General 資訊技術ï¼å®‰å…¨æŠ€è¡“ï¼ä¸å¯å¦èªï¼ç¬¬ï¼‘部:概述 |
![]() |
|
|
CNS 15134-5
2018 Edition Information technology - Security techniques - IT network security - Part 5: Securing communications across networks using virtual private networks 資訊技術ï¼å®‰å…¨æŠ€è¡“ï¼è³‡è¨ŠæŠ€è¡“網路安全ï¼ç¬¬5部:使用虛擬ç§æœ‰ç¶²è·¯ä¿å…¨è·¨ç¶²è·¯ä¹‹é€šè¨Š |
![]() |
|
|
CNS 14686
2018 Edition Information technology -Security techniques -Procedures for the registration of cryptographic algorithms 資訊技術ï¼å®‰å…¨æŠ€è¡“ï¼å¯†ç¢¼æ¼”ç®—æ³•çš„è¨»å†Šç¨‹åº |
![]() |
|
|
CNS 14381-2
2018 Edition Information technology-Security techniques - Key management - Part 2:Mechanisms using symmetric techniques 資訊技術ï¼å®‰å…¨æŠ€è¡“ï¼é‡‘鑰管ç†ï¼ç¬¬2部:使用å°ç¨±æŠ€è¡“的機制 |
![]() |
|
|
CNS 14563
2018 Edition Information technology-Security techniques-Digital signature schemes giving message recovery-Part 2:Mechanisms using a hash-function 資訊技術ï¼å®‰å…¨æŠ€è¡“ï¼å…·è¨Šæ¯å›žå¾©çš„數ä½ç°½ç« 方案ï¼ç¬¬ï¼’部:使用雜湊函數之機制 |
![]() |
|
|
CNS 15558-2
2017 Edition Flexible cellular polymeric materials - Physical properties - Part 2: Determination of hardness (indentation technique), compressive deflection coefficient, hysteresis loss rate and stress/strain characteristic in compression 軟質發泡ææ–™ï¼ç‰©ç†ç‰¹æ€§ï¼ç¬¬ï¼’部:硬度(凹壓法)ã€å£“縮撓度係數ã€é²æ»¯æ失率åŠå£“縮應力/應變特性測定法 |
![]() |
|
|
CNS 31010
2017 Edition Risk management - Risk assessment techniques 風險管ç†ï¼é¢¨éšªè©•é‘‘技術 |
![]() |
|
|
CNS 12675
2017 Edition Method of Test for Qualification Procedure of Ultrasonic Testing technique of Aluminum and Aluminum Alloy Welds é‹åˆé‡‘熔接縫超音波探傷試驗技術檢定之試驗法 |
![]() |
|
|
CNS 27036-1
2017 Edition Information technology − Security techniques − Information security for supplier relationships − Part 1: Overview and concepts 資訊技術ï¼å®‰å…¨æŠ€è¡“ï¼ä¾›æ‡‰è€…關係資訊安全ï¼ç¬¬1 部:概觀åŠæ¦‚念 |
![]() |
|
|
CNS 11051
2017 Edition General Rules for Ultrasonic Testing by Pulse Echo technique 脈波åå°„å¼è¶…音波檢驗法通則 |
![]() |
|
|
CNS 14135
2017 Edition Method of thickness measurement by ultrasonic pulse echo technique for metals 金屬æ料超音波測厚法 |
![]() |
|
|
CNS 15963
2017 Edition Information technology ‒ Automatic identification and data capture techniques – Data Matrix bar code symbology 資訊技術ï¼è‡ªå‹•è˜åˆ¥åŠè³‡æ–™æ“·å–技術ï¼è³‡æ–™çŸ©é™£æ¢ç¢¼ç¬¦è™Ÿè¡¨ç¤ºæ³• |
![]() |
|
|
CNS 15328
2017 Edition Information technology - Automatic identification and data capture techniques - Radio frequency identification device performance test methods 資訊技術ï¼è‡ªå‹•è˜åˆ¥èˆ‡è³‡æ–™æ“·å–技術ï¼ç„¡ç·šå°„é »è˜åˆ¥è£ç½®æ•ˆèƒ½æ¸¬è©¦æ–¹æ³• |
![]() |
|
|
CNS 12677
2017 Edition Method of Test for Qualification Procedure of Radiographic Testing technique of Welds 熔接縫放射線é€å°„試驗技術檢定之試驗法 |
![]() |
|
|
CNS 15964
2017 Edition Information technology − Automatic identification and data capture techniques − QR Code bar code symbology 資訊技術ï¼è‡ªå‹•è˜åˆ¥åŠè³‡æ–™æ“·å–技術ï¼QR 碼æ¢ç¢¼ç¬¦è™Ÿè¡¨ç¤ºæ³• |
![]() |
|
|
CNS 13406
2017 Edition Method of Eddy Current Test for Steel Products by Encircling Coil technique 鋼éµç”¢å“之渦電æµå¤–繞線圈檢測法 |
![]() |
|
|
CNS 13624
2017 Edition Test Methods for Crystallographic Perfection of Gallium Arsenside by Molten Potassium Hydroxide(KOH)Etch technique ç ·åŒ–éŽµæ™¶é«”çµæ™¶å®Œæ•´æ€§æª¢é©—法(熔èžæ°«æ°§åŒ–鉀浸è•æ³•ï¼‰ |
![]() |
|
|
CNS 12664
2017 Edition Method of Test for Qualification Procedure of Welding technique of Plastics é‘‘å®šç†”æŽ¥å¡‘è† æŠ€è¡“ä¹‹è©¦é©—æ³• |
![]() |
|
|
CNS 12662
2017 Edition Method of Test for Qualification Procedure of Gas Pressure Welding technique 鑑定氣體壓力熔接技術之試驗法 |
![]() |
|
|
CNS 14650
2017 Edition Information technology ? Automatic identification and data capture techniques – Code 128 bar code symbology specification 資訊技術ï¼è‡ªå‹•è˜åˆ¥èˆ‡è³‡æ–™æ“·å–技術ï¼Code 128 æ¢ç¢¼ç¬¦è™Ÿè¡¨ç¤ºæ³• |
![]() |
|
|
CNS 29101
2017 Edition Information technology − Security techniques − Privacy architecture framework 資訊技術ï¼å®‰å…¨æŠ€è¡“ï¼éš±ç§æ¬Šæž¶æ§‹æ¡†æž¶ |
![]() |
|
|
CNS 14676-6
2017 Edition Electromagnetic compatibility (EMC) - Testing and measurement techniques- Part 6 : Immunity to conducted disturbances,induced by radio-frequency fields é›»ç£ç›¸å®¹ï¼æ¸¬è©¦èˆ‡é‡æ¸¬æŠ€è¡“ï¼ç¬¬ï¼–éƒ¨ï¼šå°„é »å ´æ„Ÿæ‡‰çš„å‚³å°Žæ“¾å‹•æŠ—æ“¾åŠ› |
![]() |
|
|
CNS 15326
2017 Edition Information technology - Automatic identification and data capture techniques - Syntax for high-capacity ADC media 資訊技術—自動è˜åˆ¥èˆ‡è³‡æ–™æ“·å–技術—高容é‡è‡ªå‹•è³‡æ–™æ“·å–媒體之語法 |
![]() |
Find out:135Items | To Page of: First -Previous-Next -Last | 1 2 3 4 5 |