Information technology. Cryptographic data security. Produce and check procedures of electronic digital signature based on asymmetric cryptographic algorithm
Information technology. Automatic identification and data capture techniques. Guidelines for direct marking with fluorescence composition and marking quality control