DIN ISO 8601:2006-09
|
DATA ELEMENTS AND INTERCHANGE FORMATS - INFORMATION INTERCHANGE - REPRESENTATION OF DATES AND TIMES |
ISO 9735-8:2002
|
Electronic data interchange for administration, commerce and transport (EDIFACT) — Application level syntax rules (Syntax version number: 4, Syntax release number: 1) — Part 8: Associated data in EDI |
ISO/IEC 10646:2014
|
Information technology Universal Coded Character Set (UCS) |
ISO 9735-6:2002
|
Electronic data interchange for administration, commerce and transport (EDIFACT) — Application level syntax rules (Syntax version number: 4, Syntax release number: 1) — Part 6: Secure authentication and acknowledgement message (message type - AUTACK) |
DIN ISO 9735:2002-11
|
ELECTRONIC DATA INTERCHANGE FOR ADMINISTRATION, COMMERCE AND TRANSPORT (EDIFACT) - APPLICATION LEVEL SYNTAX RULES |
ISO/IEC 12042:1993
|
Information technology Data compression for information interchange Binary arithmetic coding algorithm |
ISO/IEC 2022:1994
|
Information technology Character code structure and extension techniques |
ISO 10126-1:1991
|
Banking Procedures for message encipherment (wholesale) Part 1: General principles |
ISO 8731-1:1987
|
Banking Approved algorithms for message authentication Part 1: DEA |
ISO 9735-5:2002
|
Electronic data interchange for administration, commerce and transport (EDIFACT) — Application level syntax rules (Syntax version number: 4, Syntax release number: 1) — Part 5: Security rules for batch EDI (authenticity, integrity and non-repudiation of origin) |
ISO 9735-9:2002
|
Electronic data interchange for administration, commerce and transport (EDIFACT) — Application level syntax rules (Syntax version number: 4, Syntax release number: 1) — Part 9: Security key and certificate management message (message type- KEYMAN) |
ISO/IEC 9594-8:2017
|
Information technology Open Systems Interconnection The Directory Part 8: Public-key and attribute certificate frameworks |
ISO 8601:2004
|
Data elements and interchange formats Information interchange Representation of dates and times |
ISO/IEC 10118-1:2016
|
Information technology Security techniques Hash-functions Part 1: General |
ISO 9735-7:2002
|
Electronic data interchange for administration, commerce and transport (EDIFACT) — Application level syntax rules (Syntax version number: 4, Syntax release number: 1) — Part 7: Security rules for batch EDI (confidentiality) |
ISO/IEC 2375:2003
|
Information technology — Procedure for registration of escape sequences and coded character sets |
ISO 9735-2:2002
|
Electronic data interchange for administration, commerce and transport (EDIFACT) — Application level syntax rules (Syntax version number: 4, Syntax release number: 1) — Part 2: Syntax rules specific to batch EDI |
ISO/IEC 646:1991
|
Information technology ISO 7-bit coded character set for information interchange |
ISO/IEC 10118-3:2004
|
Information technology Security techniques Hash-functions Part 3: Dedicated hash-functions |
ISO 8731-2:1992
|
Banking Approved algorithms for message authentication Part 2: Message authenticator algorithm |
ISO 9735-1:2002
|
Electronic data interchange for administration, commerce and transport (EDIFACT) — Application level syntax rules (Syntax version number: 4, Syntax release number: 1) — Part 1: Syntax rules common to all parts |
ISO 9735-3:2002
|
Electronic data interchange for administration, commerce and transport (EDIFACT) — Application level syntax rules (Syntax version number: 4, Syntax release number: 1) — Part 3: Syntax rules specific to interactive EDI |
ISO/IEC 10116:2017
|
Information technology — Security techniques — Modes of operation for an n-bit block cipher |
ISO 9735-4:2002
|
Electronic data interchange for administration, commerce and transport (EDIFACT) — Application level syntax rules (Syntax version number: 4, Syntax release number: 1) — Part 4: Syntax and service report message for batch EDI (message type — CONTRL) |
ISO 11166-2:1994
|
Banking Key management by means of asymmetric algorithms Part 2: Approved algorithms using the RSA cryptosystem |
ISO/IEC 9797:1994
|
Information technology — Security techniques — Data integrity mechanism using a cryptographic check function employing a block cipher algorithm |