15/30327554 DC : 0
|
BS ISO/IEC 13157-2 - INFORMATION TECHNOLOGY - TELECOMMUNICATIONS AND INFORMATION EXCHANGE BETWEEN SYSTEMS - NFC SECURITY - PART 2: NFC-SEC CRYPTOGRAPHY STANDARD USING ECDH AND AES |
MIL-STD-1840 Revision C:1997
|
AUTOMATED INTERCHANGE OF TECHNICAL INFORMATION |
PD IEC/PAS 62734:2012
|
Industrial communication networks. Fieldbus specifications. Wireless systems for industrial automation: process control and related applications |
ISO/IEC 13157-2:2016
|
Information technology Telecommunications and information exchange between systems NFC Security Part 2: NFC-SEC cryptography standard using ECDH and AES |
16/30339535 DC : 0
|
BS EN 62056-5-3 ED 3.0 - ELECTRICITY METERING DATA EXCHANGE - THE DLMS/COSEM SUITE - PART 5-3: DLMS/COSEM APPLICATION LAYER |
BS ISO/IEC 19770-3:2016
|
Information technology. IT asset management Entitlement schema |
PD IEC/TS 60870-5-7:2013
|
Telecontrol equipment and systems Transmission protocols. Security extensions to IEC 60870-5-101 and IEC 60870-5-104 protocols (applying IEC 62351) |
14/30275438 DC : 0
|
BS ISO/IEC 29167-12 - INFORMATION TECHNOLOGY - AUTOMATIC IDENTIFICATION AND DATA CAPTURE TECHNIQUES - PART 12: CRYPTO SUITE ECC-DH SECURITY SERVICES FOR AIR INTERFACE COMMUNICATION |
IEEE 1363.3-2013
|
IEEE Standard for Identity-Based Cryptographic Techniques using Pairings |
IEEE 1363.2 : 2008
|
SPECIFICATION FOR PASSWORD-BASED PUBLIC-KEY CRYPTOGRAPHIC TECHNIQUES |
I.S. EN 62056-5-3:2017
|
ELECTRICITY METERING DATA EXCHANGE - THE DLMS/COSEM SUITE - PART 5-3: DLMS/COSEM APPLICATION LAYER |
I.S. EN 62734:2015
|
INDUSTRIAL NETWORKS - WIRELESS COMMUNICATION NETWORK AND COMMUNICATION PROFILES - ISA 100.11A |
PREN 419212-5 : DRAFT 2016
|
APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 5: TRUSTED ESERVICE |
ISO/IEC 19770-3:2016
|
Information technology IT asset management Part 3: Entitlement schema |
ASTM E 1762 : 1995
|
Standard Guide for Electronic Authentication of Health Care Information |
ISO/IEC TR 29149:2012
|
Information technology Security techniques Best practices for the provision and use of time-stamping services |
ASTM E 2085 : 2000 : REV A
|
Standard Guide on Security Framework for Healthcare Information (Withdrawn 2009) |
CEN/TS 15130:2006
|
Postal services - DPM infrastructure - Messages supporting DPM applications |
EN 62734:2015
|
Industrial networks - Wireless communication network and communication profiles - ISA 100.11a |
EN 62056-5-3:2017
|
Electricity metering data exchange - The DLMS/COSEM suite - Part 5-3: DLMS/COSEM application layer |
ISO/IEC 18013-3:2017
|
Information technology — Personal identification — ISO-compliant driving licence — Part 3: Access control, authentication and integrity validation |
10/30192164 DC : DRAFT JUNE 2010
|
BS ISO/IEC 29150 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SIGNCRYPTION |
DD CEN/TS 15130:2006
|
Postal services. DPM infrastructure. Messages supporting DPM applications |
PREN 14890-1 : DRAFT 2012
|
APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES |
16/30335567 DC : 0
|
BS ISO/IEC 15946-5 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC TECHNIQUES BASED ON ELLIPTIC CURVES - PART 5: ELLIPTIC CURVE GENERATION |
BS EN 62056-5-3:2017
|
Electrcity metering data exchange. The DLMS/COSEM suite DLMS/COSEM application layer |
CAN/CSA-ISO/IEC 19678:16
|
Information Technology BIOS Protection Guidelines (Adopted ISO/IEC 19678:2015, first edition, 2015-05-01) |
ANSI INCITS 516 : 2013(R2018)
|
INFORMATION TECHNOLOGY - SCSI STREAM COMMANDS - 4 (SSC-4) |
16/30335156 DC : 0
|
BS EN 14615 - POSTAL SERVICES - DIGITAL POSTAGE MARKS - APPLICATIONS, SECURITY AND DESIGN |
CEI UNI ISO/IEC 18013-3 : 2011
|
INFORMATION TECHNOLOGY - PERSONAL IDENTIFICATION - ISO-COMPLIANT DRIVING LICENCE - PART 3: ACCESS CONTROL, AUTHENTICATION AND INTEGRITY VALIDATION |
SCTE 41 : 2016
|
POD COPY PROTECTION SYSTEM |
BS ISO/IEC 19770-2:2015
|
Information technology. Software asset management Software identification tag |
TS 101 733 : 2.2.1
|
ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); CMS ADVANCED ELECTRONIC SIGNATURES (CADES) |
PD IEC/TS 62224:2013
|
Multimedia home server systems. Conceptual model for digital rights management |
PD ISO/TR 14742:2010
|
Financial services. Recommendations on cryptographic algorithms and their use |
BS ISO/IEC 18367:2016
|
Information technology. Security techniques. Cryptographic algorithms and security mechanisms conformance testing |
ISO 20215:2015
|
Space data and information transfer systems — CCSDS cryptographic algorithms |
BS ISO/IEC 18031 : 2011
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - RANDOM BIT GENERATION |
BS ISO/IEC 18013-3:2017
|
Information technology. Personal identification. ISO-compliant driving licence Access control, authentication and integrity validation |
ISO/IEC 18370-2:2016
|
Information technology Security techniques Blind digital signatures Part 2: Discrete logarithm based mechanisms |
ARINC 823-1 : 2007
|
DATALINK SECURITY - PART 1: ACARS MESSAGE SECURITY |
ISO/IEC 11889-1:2015
|
Information technology Trusted platform module library Part 1: Architecture |
ISO/IEC 18367:2016
|
Information technology Security techniques Cryptographic algorithms and security mechanisms conformance testing |
ISO/IEC/IEEE 8802-22:2015
|
Information technology Telecommunications and information exchange between systems Local and metropolitan area networks Specific requirements Part 22: Cognitive Wireless RAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Policies and Procedures for Operation in the TV Bands |
CEN/TS 16702-1:2014
|
Electronic fee collection - Secure monitoring for autonomous toll systems - Part 1: Compliance checking |
CAN/CSA-ISO/IEC 18367:18
|
Information technology — Security techniques — Cryptographic algorithms and security mechanisms conformance testing (Adopted ISO/IEC 18367:2016, first edition, 2016-12-15) |
BS ISO/IEC/IEEE 8802-22:2015
|
Information technology. Telecommunications and information exchange between systems. Local and metropolitan area networks. Specific requirements Cognitive Wireless RAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Policies and Procedures for Operation in the TV Bands |
ISO/IEC 29167-17:2015
|
Information technology Automatic identification and data capture techniques Part 17: Crypto suite cryptoGPS security services for air interface communications |
15/30228996 DC : 0
|
BS ISO/IEC 19770-3 - INFORMATION TECHNOLOGY - IT ASSET MANAGEMENT - PART 3: SOFTWARE ENTITLEMENT SCHEMA |
SMPTE ST 429.6 : 2006 AMD 1 2018
|
D-CINEMA PACKAGING - MXF TRACK FILE ESSENCE ENCRYPTION |
NASA CCSDS 352.0-B : ISSUE 1
|
CCSDS CRYPTOGRAPHIC ALGORITHMS |
UNI CEI ISO/IEC 18013-3 : 2011
|
INFORMATION TECHNOLOGY - PERSONAL IDENTIFICATION - ISO-COMPLIANT DRIVING LICENCE - PART 3: ACCESS CONTROL, AUTHENTICATION AND INTEGRITY VALIDATION |
BS ISO 20215:2015
|
Space data and information transfer systems. CCSDS cryptographic algorithms |
PD CEN/TS 16702-1:2014
|
Electronic fee collection. Secure monitoring for autonomous toll system Compliance checking |
14/30302807 DC : 0
|
BS ISO/IEC 11889-4 - INFORMATION TECHNOLOGY - TRUSTED PLATFORM MODULE - PART 4: SUPPORTING ROUTINES |
BS ISO/IEC 14888-3 : 2006
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DIGITAL SIGNATURES WITH APPENDIX - PART 3: DISCRETE LOGARITHM BASED MECHANISMS |
TS 103 436 : 1.2.1
|
RECONFIGURABLE RADIO SYSTEMS (RRS); SECURITY REQUIREMENTS FOR RECONFIGURABLE RADIOS |
12/30255293 DC : 0
|
BS EN 14890-1 - APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES |
14/30297103 DC : 0
|
BS ISO/IEC 19678 - INFORMATION TECHNOLOGY - BIOS PROTECTIONS |
BS ISO/IEC 29150:2011
|
Information technology. Security techniques. Signcryption |
BS EN 62734:2015
|
Industrial networks. Wireless communication network and communication profiles. ISA 100.11a |
ISO/IEC/IEEE 8802-15-6:2017
|
Information technology — Telecommunications and information exchange between systems — Local and metropolitan area networks — Specific requirements — Part 15-6: Wireless body area network |
MIL-STD-2045-47001 Revision D:2005
|
CONNECTIONLESS DATA TRANSFER APPLICATION LAYER STANDARD |
BIS IS/IEC/TS 62351-5 : 2009(R2016)
|
POWER SYSTEMS MANAGEMENT AND ASSOCIATED INFORMATION EXCHANGE - DATA AND COMMUNICATIONS SECURITY - PART 5: SECURITY FOR IEC 60870-5 AND DERIVATIVES |
ISO/IEC/IEEE 8802-21:2018
|
Information technology — Telecommunications and information exchange between systems — Local and metropolitan area networks — Specific requirements — Part 21: Media independent services framework |
S.R. CWA 16745:2014
|
IMPROVING TRANSPARENCY IN FINANCIAL AND BUSINESS REPORTING - METADATA CONTAINER |
S.R. CEN/TS 16702-1:2014
|
ELECTRONIC FEE COLLECTION - SECURE MONITORING FOR AUTONOMOUS TOLL SYSTEMS - PART 1: COMPLIANCE CHECKING |
ISO/IEC 18031:2011
|
Information technology Security techniques Random bit generation |
ISO/IEC 15946-5:2017
|
Information technology Security techniques Cryptographic techniques based on elliptic curves Part 5: Elliptic curve generation |
ISO/TR 14742:2010
|
Financial services Recommendations on cryptographic algorithms and their use |
ISO/IEC 15444-2:2004
|
Information technology JPEG 2000 image coding system: Extensions Part 2: |
IEC 62056-5-3:2017
|
Electrcity metering data exchange - The DLMS/COSEM suite - Part 5-3: DLMS/COSEM application layer |
TR 103 690 : 1.1.1
|
LAWFUL INTERCEPTION (LI); EWARRANT INTERFACE |
GS NFV-SEC 002 : 1.1.1
|
NETWORK FUNCTIONS VIRTUALISATION (NFV); NFV SECURITY; CATALOGUING SECURITY FEATURES IN MANAGEMENT SOFTWARE |
CAN/CSA-ISO/IEC 29167-17:16
|
Information technology Automatic identification and data capture techniques Part 17: Crypto suite cryptoGPS security services for air interface communications (Adopted ISO/IEC 29167-17:2015, first edition, 2015-06-01) |
ISO/IEC 29167-12:2015
|
Information technology Automatic identification and data capture techniques Part 12: Crypto suite ECC-DH security services for air interface communications |
TS 102 176-1 : 2.1.1
|
ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); ALGORITHMS AND PARAMETERS FOR SECURE ELECTRONIC SIGNATURES; PART 1: HASH FUNCTIONS AND ASYMMETRIC ALGORITHMS |
ISO/IEC 19678:2015
|
Information Technology BIOS Protection Guidelines |
14/30284313 DC : 0
|
BS ISO 32000-2 - DOCUMENT MANAGEMENT - PORTABLE DOCUMENT FORMAT - PART 2: PDF 2.0 |
TS 102 232 : 1.5.1
|
LAWFUL INTERCEPTION (LI); HANDOVER SPECIFICATION FOR IP DELIVERY |
TR 101 545-4 : 1.1.1
|
DIGITAL VIDEO BROADCASTING (DVB); SECOND GENERATION DVB INTERACTIVE SATELLITE SYSTEM (DVB-RCS2); PART 4: GUIDELINES FOR IMPLEMENTATION AND USE OF EN 301 545-2 |
CAN/CSA-ISO/IEC/IEEE 8802-22:16
|
Information technology Telecommunications and information exchange between systems Local and metropolitan area networks Specific requirements Part 22: Cognitive Wireless RAN Medium Access Control (MCA) and Physical Layer (PHY) Specifications: Policies and Procedures for Operation in the TV Bands (Adopted ISO/IEC/IEEE 8802-22:2015, first edition, 2015-05-01) |
BS ISO/IEC 15946-5:2017
|
Information technology. Security techniques. Cryptographic techniques based on elliptic curves Elliptic curve generation |
TS 101 861 : 1.4.1
|
ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); TIME STAMPING PROFILE |
ANSI X9.112-2 : 2014
|
WIRELESS MANAGEMENT AND SECURITY - PART 2: ATM AND POS |
TS 102 220 : 1.1.1
|
ACCESS AND TERMINALS (AT); TECHNICAL SPECIFICATION: DELIVERY OF CABLE BASED SERVICES ACROSS A HOME ACCESS TO THE DEVICES IN THE HOME |
DD IEC TS 62351-5 : DRAFT OCT 2009
|
POWER SYSTEMS MANAGEMENT AND ASSOCIATED INFORMATION EXCHANGE - DATA AND COMMUNICATIONS SECURITY - PART 5: SECURITY FOR IEC 60870-5 AND DERIVATIVES |
CAN/CSA-ISO/IEC 29167-12:16
|
Information technology Automatic identification and data capture techniques Part 12: Crypto suite ECC-DH security services for air interface communication (Adopted ISO/IEC 29167-12:2015, first edition, 2015-05-15) |
NASA CCSDS 350.3-G : ISSUE 1
|
AUTHENTICATION/INTEGRITY ALGORITHM ISSUES SURVEY |
PREN 14615 : DRAFT 2016
|
POSTAL SERVICES - DIGITAL POSTAGE MARKS - APPLICATIONS, SECURITY AND DESIGN |
UNE-ETSI/TS 101733 V1.2.2:2011
|
Electronic signature formats. |
DD IEC/TS 62351-2:2008
|
Power systems management and associated information exchange. Data and communications security Glossary of terms |
IEEE DRAFT 1609.2 : 0
|
WIRELESS ACCESS IN VEHICULAR ENVIRONMENTS - SECURITY SERVICES FOR APPLICATIONS AND MANAGEMENT MESSAGES |
TS 119 312 : 1.2.1
|
ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); CRYPTOGRAPHIC SUITES |
ASTM E 1762 : 1995 : R2009
|
Standard Guide for Electronic Authentication of Health Care Information |
SCTE 23-2 : 2017
|
DOCSIS 1.1 - PART 2: BASELINE PRIVACY PLUS INTERFACE |
SCTE 24-10 : 2016
|
IPCABLECOM 1.0 - PART 10: SECURITY SPECIFICATION |
ASTM E 1762 : 1995 : R2013
|
Standard Guide for Electronic Authentication of Health Care Information (Withdrawn 2017) |
I.S. CEN TS 15130:2006
|
POSTAL SERVICES - DPM INFRASTRUCTURE - MESSAGES SUPPORTING DPM APPLICATIONS |
ISO/IEC 29150:2011
|
Information technology — Security techniques — Signcryption |
ISO/IEC 14776-333:2013
|
Information technology Small Computer System Interface (SCSI) Part 333: SCSI Stream Commands - 3 (SSC-3) |
ISO 26429-6:2008
|
Digital cinema (D-cinema) packaging — Part 6: MXF track file essence encryption |
ISO/IEC 14888-3:2016
|
Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms |
IEC TS 62351-2:2008
|
Power systems management and associated information exchange - Data and communications security - Part 2: Glossary of terms |
IEC PAS 62734:2012
|
Industrial communication networks - Fieldbus specifications - Wireless systems for industrial automation: process control and related applications |
IEC TS 62224:2013
|
Multimedia home server systems - Conceptual model for digital rights management |
IEC 62351-11:2016
|
Power systems management and associated information exchange - Data and communications security - Part 11: Security for XML documents |
BS ISO/IEC 19678:2015
|
Information Technology. BIOS Protection Guidelines |
UNI EN 419212-1 : 2015
|
APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES |
ISO/IEC 19770-2:2015
|
Information technology IT asset management Part 2: Software identification tag |
ISO/IEC 29192-4:2013
|
Information technology — Security techniques — Lightweight cryptography — Part 4: Mechanisms using asymmetric techniques |
BS EN 62351-11:2017
|
Power systems management and associated information exchange. Data and communications security Security for XML documents |
BS ISO/IEC 24713-3:2009
|
Information technology. Biometric profiles for interoperability and data interchange Biometrics-based verification and identification of seafarers |
BS ISO/IEC/IEEE 8802-1AR:2014
|
Information technology. Telecommunications and information exchange between systems. Local and metropolitan area networks Secure device identity |
PD ISO/IEC TR 29149:2012
|
Information technology. Security techniques. Best practices for the provision and use of time-stamping services |
15/30268565 DC : 0
|
BS ISO/IEC 18370-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - BLIND DIGITAL SIGNATURES - PART 2: DISCRETE LOGARITHM BASED MECHANISMS |
ES 202 488-3 : 1.1.1
|
ACCESS AND TERMINALS (AT); SECOND GENERATION TRANSMISSION SYSTEMS FOR INTERACTIVE CABLE TELEVISION SERVICES - IP CABLE MODEMS; PART 3: BASELINE PRIVACY PLUS INTERFACE SPECIFICATION |
BS ISO 26429-6:2008
|
Digital cinema (D-cinema) packaging MXF track file essence encryption |
DD IEC TS 62224 : DRAFT 2007
|
MULTIMEDIA HOME SERVER SYSTEMS - CONCEPTUAL MODEL FOR DIGITAL RIGHTS MANAGEMENT |
BS ISO/IEC/IEEE 8802-21:2018
|
Information technology. Telecommunications and information exchange between systems. Local and metropolitan area networks. Specific requirements Media independent services framework |
ANSI X9.82-3 : 2007(R2017)
|
RANDOM NUMBER GENERATION - PART 3: DETERMINISTIC RANDOM BIT GENERATORS |
ISO/IEC/IEEE 8802-1AR:2014
|
Information technology Telecommunications and information exchange between systems Local and metropolitan area networks Part 1AR: Secure device identity |
ISO/IEC 20248:2018
|
Information technology Automatic identification and data capture techniques Data structures Digital signature meta structure |
ASTM E 1762 : 1995 : R2003
|
Standard Guide for Electronic Authentication of Health Care Information |
IEEE 1815-2012 REDLINE
|
IEEE Standard for Electric Power Systems Communications-Distributed Network Protocol (DNP3) |
IEEE 802.22-2011
|
IEEE Standard for Information technology-- Local and metropolitan area networks-- Specific requirements-- Part 22: Cognitive Wireless RAN Medium Access Control (MAC) and Physical Layer (PHY) specifications: Policies and procedures for operation in the TV Bands |
ISO/IEC 24713-3:2009
|
Information technology Biometric profiles for interoperability and data interchange Part 3: Biometrics-based verification and identification of seafarers |
ISO/IEC 13157-3:2016
|
Information technology Telecommunications and information exchange between systems NFC Security Part 3: NFC-SEC cryptography standard using ECDH-256 and AES-GCM |
16/30345819 DC : 0
|
BS EN 419212-5 - APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 5: TRUSTED ESERVICE |
EN 62351-11:2017
|
Power systems management and associated information exchange – Data and communications security - Part 11: Security for XML documents |