{"id":423520,"date":"2024-10-20T06:46:54","date_gmt":"2024-10-20T06:46:54","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-29167-162022\/"},"modified":"2024-10-26T12:43:49","modified_gmt":"2024-10-26T12:43:49","slug":"bs-iso-iec-29167-162022","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-29167-162022\/","title":{"rendered":"BS ISO\/IEC 29167-16:2022"},"content":{"rendered":"

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
2<\/td>\nNational foreword <\/td>\n<\/tr>\n
6<\/td>\nForeword <\/td>\n<\/tr>\n
7<\/td>\nIntroduction <\/td>\n<\/tr>\n
9<\/td>\n1 Scope
2 Normative references <\/td>\n<\/tr>\n
10<\/td>\n3 Terms and definitions
4 Symbols and abbreviated terms
4.1 Symbols
4.2 Abbreviated terms <\/td>\n<\/tr>\n
11<\/td>\n5 Conformance
5.1 Claiming conformance <\/td>\n<\/tr>\n
12<\/td>\n5.2 Interrogator conformance and obligations
5.3 Tag conformance and obligations
6 Cipher introduction
7 Parameter definitions
7.1 Parameter definitions <\/td>\n<\/tr>\n
14<\/td>\n7.2 Certiticate format
8 State diagram
9 Initialization and resetting <\/td>\n<\/tr>\n
15<\/td>\n10 Authentication
10.1 General
10.2 Authenticate message
10.2.1 Message in Authenticate command and reply <\/td>\n<\/tr>\n
16<\/td>\n10.2.2 Authenticate(MAM1.1 Message) <\/td>\n<\/tr>\n
17<\/td>\n10.2.3 MAM1.1 Response <\/td>\n<\/tr>\n
18<\/td>\n10.2.4 Authenticate(MAM1.2 Message)
10.2.5 MAM1.2 Response <\/td>\n<\/tr>\n
19<\/td>\n10.3 Authentication procedure
10.3.1 Protocol requirements
10.3.2 Procedure <\/td>\n<\/tr>\n
21<\/td>\n11 Communication
11.1 Authenticate communication
11.2 Secure communication <\/td>\n<\/tr>\n
23<\/td>\nAnnex A (normative) State transition table <\/td>\n<\/tr>\n
24<\/td>\nAnnex B (normative) Error codes and error handling <\/td>\n<\/tr>\n
25<\/td>\nAnnex C (normative) Cipher description <\/td>\n<\/tr>\n
26<\/td>\nAnnex D (informative) Test vectors <\/td>\n<\/tr>\n
31<\/td>\nAnnex E (normative) Protocol specific operation <\/td>\n<\/tr>\n
35<\/td>\nAnnex F (normative) Protocol message\u2019s fragmentation and defragmentation <\/td>\n<\/tr>\n
36<\/td>\nAnnex G (informative) Examples of ECC parameters <\/td>\n<\/tr>\n
37<\/td>\nAnnex H (normative) TTP involving <\/td>\n<\/tr>\n
39<\/td>\nBibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

Information technology. Automatic identification and data capture techniques – Crypto suite ECDSA-ECDH security services for air interface communications<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2023<\/td>\n40<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":423528,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[662,2641],"product_tag":[],"class_list":{"0":"post-423520","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-35-040-50","7":"product_cat-bsi","9":"first","10":"instock","11":"sold-individually","12":"shipping-taxable","13":"purchasable","14":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/423520","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/423528"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=423520"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=423520"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=423520"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}