Search results

Search list

Results in:

81-90 of 467 results

Information security, cybersecurity and privacy protection - Verification of Cryptographic Protocols - Part 2: Evaluation Methods and Activities for Cryptographic Protocols

Information security - Verification of cryptographic protocols - Part 3: Part 3: Evaluation Methods and Activities for Protocol Implementation Verification

Cybersecurity evaluation of complex systems - Introduction and framework overview

Iron ores - Experimental methods for evaluation of quality variation

Vacuum technology - Vacuum gauges - Evaluation of the uncertainties of results of calibrations by direct comparison with a reference gauge

Road vehicles - Methods and criteria for usability evaluation of child restraint systems and their interface with vehicle anchorage systems - Part 1: Vehicles and child restraint systems equipped with ISOFIX anchorages and attachments

Road vehicles - Methods and criteria for usability evaluation of child restraint systems and their interface with vehicle anchorage systems - Part 3: Installation of child restraint systems using vehicle seat belts

Road vehicles - Methods and criteria for usability evaluation of child restraint systems and their interface with vehicle anchorage systems - Part 4: Securing of child in child restraint system and daily handling aspects

Road vehicles - Methods and criteria for usability evaluation of child restraint systems and their interface with vehicle anchorage systems - Part 5: Installation and securing of child in a booster system

General methods of evaluation of electrical insulation

TOP