Use the form below to find the searched projects. Enter your criteria for searching (single or in combination) in the fields below and press the button “Search”.
Rice - Determination of rice kernel resistance to extrusion after cooking - Amendment 1 (ISO 11747:2012/Amd 1:2017)
60.60 Standard published
Safety of industrial trucks - Electrical/electronic requirements
60.60 Standard published
Gas cylinders - Cylinder bundles for compressed and liquefied gases (excluding acetylene) - Inspection at time of filling (ISO 11755:2005)
60.60 Standard published
Gas cylinders — Cylinder bundles for compressed and liquefied gases (excluding acetylene) — Inspection at time of filling
60.60 Standard published
Rubber hoses and hose assemblies for dispensing liquefied petroleum gases (LPGs) — Specification
60.60 Standard published
Playground equipment and surfacing - Part 1: General safety requirements and test methods
60.60 Standard published
Playground equipment and surfacing - Part 10: Additional specific safety requirements and test methods for fully enclosed play equipment
60.60 Standard published
Playground equipment and surfacing - Part 11: Additional specific safety requirements and test methods for spatial network
60.60 Standard published
Playground equipment and surfacing - Part 3: Additional specific safety requirements and test methods for slides
60.60 Standard published
Impact attenuating playground surfacing - Methods of test for determination of impact attenuation
60.60 Standard published
Information technology — Security techniques — Key management — Part 1: Framework
60.60 Standard published
IT Security techniques — Key management — Part 2: Mechanisms using symmetric techniques
60.60 Standard published
Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques
60.60 Standard published
Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques — Amendment 1: Blinded Diffie-Hellman key agreement
60.60 Standard published
Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets
60.60 Standard published
Information security — Key management — Part 5: Group key management
60.60 Standard published