Your cart is currently empty!

ISO 29167:2015
ISO 29167:2015 Information technology – Automatic identification and data capture techniques – Part 12: Crypto suite ECC-DH security services for air interface communications
CDN $312.00
Description
ISO/IEC 29167-12:2015 defines the crypto suite for ECC-DH for the ISO/IEC 18000 air interfaces standards for radio frequency identification (RFID) devices. Its purpose is to provide a common crypto suite with Diffie-Hellmann-based authentication using ECC (elliptic curve cryptography) over binary fields for security for RFID devices that may be referred by ISO committees for air interface standards and application standards.
ISO/IEC 29167-12:2015 specifies a crypto suite for ECC-DH for air interface for RFID systems. The crypto suite is defined in alignment with existing air interfaces.
ISO/IEC 29167-12:2015 defines various authentication methods and methods of use for the cipher. A Tag and an Interrogator may support one, a subset, or all of the specified options, clearly stating what is supported.
Edition
1
Published Date
2015-05-21
Status
PUBLISHED
Pages
39
Format 
Secure PDF
Secure – PDF details
- Save your file locally or view it via a web viewer
- Viewing permissions are restricted exclusively to the purchaser
- Device limits - 3
- Printing – Enabled only to print (1) copy
See more about our Environmental Commitment

Abstract
ISO/IEC 29167-12:2015 defines the crypto suite for ECC-DH for the ISO/IEC 18000 air interfaces standards for radio frequency identification (RFID) devices. Its purpose is to provide a common crypto suite with Diffie-Hellmann-based authentication using ECC (elliptic curve cryptography) over binary fields for security for RFID devices that may be referred by ISO committees for air interface standards and application standards.
ISO/IEC 29167-12:2015 specifies a crypto suite for ECC-DH for air interface for RFID systems. The crypto suite is defined in alignment with existing air interfaces.
ISO/IEC 29167-12:2015 defines various authentication methods and methods of use for the cipher. A Tag and an Interrogator may support one, a subset, or all of the specified options, clearly stating what is supported.
Previous Editions
Can’t find what you are looking for?
Please contact us at:
Related Documents
-
ISO 80004:2011 Nanotechnologies – Vocabulary – Part 7: Diagnostics and therapeutics for healthcare
0 out of 5CDN $115.00 Add to cart -
ISO 80004:2021 Nanotechnologies – Vocabulary – Part 6: Nano-object characterization
0 out of 5CDN $76.00 Add to cart -
ISO 22553:2019 Paints and varnishes – Electro-deposition coatings – Part 1: Vocabulary
0 out of 5CDN $76.00 Add to cart -
ISO 8384:2019 Ships and marine technology – Dredgers – Vocabulary
0 out of 5CDN $76.00 Add to cart