ISO/IEC TS 29167-15:2017
Information technology - Automatic identification and data capture techniques - Part 15: Crypto suite XOR security services for air interface communications
ISO/IEC TS 29167-15:2017 defines various authentication methods and methods of use for the XOR. A tag and an interrogator may support one, a subset, or all of the specified options, clearly stating what is supported.
|Publication type||Technical Specification|
|TC/SC||ISO/IEC JTC 1/SC 31 - Automatic identification and data capture techniquesrss|
|ICS||35.040.50 - Automatic identification and data capture techniques|
|File size||1064 KB|
The following test report forms are related:
Share your publications
Learn how to share your publications with your colleagues, using networking options.
Our prices are in Swiss francs (CHF). We accept all major credit cards (American Express, Mastercard and Visa), PayPal and bank transfers as form of payment.
Keep in touch
Keep up to date with new publication releases and announcements with our free IEC Just Published email newsletter.
Contact customer services
Please send your enquiry by email or call us on +41 22 919 02 11 between 09:00 – 17:00 CET Monday to Friday.