ECMA 415 : 1ED 2016
|
NFC-SEC TEST METHODS |
14/30275227 DC : 0
|
BS ISO/IEC 29167-17 - INFORMATION TECHNOLOGY - AUTOMATIC IDENTIFICATION AND DATA CAPTURE TECHNIQUES - PART 17: AIR INTERFACE FOR SECURITY SERVICES CRYPTO SUITE CRYPTOGPS |
08/30169502 DC : 0
|
BS ISO/IEC 9798-5 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 5: MECHANISMS USING ZERO KNOWLEDGE TECHNIQUES |
UNI CEN ISO/TS 24534-4 : 2008
|
AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES - PART 4: SECURE COMMUNICATIONS USING ASYMMETRICAL TECHNIQUES |
12/30264383 DC : 0
|
BS ISO 21549-3 - HEALTH INFORMATICS - PATIENT HEALTH CARD DATA - PART 3: LIMITED CLINICAL DATA |
INCITS/ISO/IEC 9798-4 : 1999
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 4: MECHANISMS USING A CRYPTOGRAPHIC CHECK FUNCTION |
CAN/CSA-ISO/IEC 10181-2-00 (R2013)
|
Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Authentication Framework (Adopted ISO/IEC 10181-2:1996, first edition, 1996-05-15) |
ISO/IEC 15944-10:2013
|
Information technology — Business operational view — Part 10: IT-enabled coded domains as semantic components in business transactions |
ETR 232 : 20001
|
SECURITY TECHNIQUES ADVISORY GROUP (STAG); GLOSSARY OF SECURITY TERMINOLOGY |
16/30339535 DC : 0
|
BS EN 62056-5-3 ED 3.0 - ELECTRICITY METERING DATA EXCHANGE - THE DLMS/COSEM SUITE - PART 5-3: DLMS/COSEM APPLICATION LAYER |
08/30195399 DC : 0
|
BS EN ISO 24534-3 - AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES - PART 3: VEHICLE DATA |
CSA ISO/IEC 18033-1 : 2006 : INC : AMD 1 : 2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 1: GENERAL |
CSA ISO/IEC 9798-2:2010
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 2: MECHANISMS USING SYMMETRIC ENCIPHERMENT ALGORITHMS |
CSA ISO/IEC 9798-5 : 2010 : R2015
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 5: MECHANISMS USING ZERO-KNOWLEDGE TECHNIQUES |
17/30333935 DC : 0
|
BS EN 1300 - SECURE STORAGE UNITS - CLASSIFICATION FOR HIGH SECURITY LOCKS ACCORDING TO THEIR RESISTANCE TO UNAUTHORIZED OPENING |
BS ISO/IEC 17922:2017
|
Information technology. Security techniques. Telebiometric authentication framework using biometric hardware security module |
14/30250091 DC : 0
|
BS ISO/IEC 18033-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 1: GENERAL |
BS ISO/IEC 18014-1:2008
|
Information technology. Security techniques. Time- stamping services Framework |
11/30251478 DC : 0
|
BS EN 1300 - SECURE STORAGE UNITS - CLASSIFICATION FOR HIGH SECURITY LOCKS ACCORDING TO THEIR RESISTANCE TO UNAUTHORIZED OPENING |
UNE-EN 1300:2014
|
Secure storage units - Classification for high security locks according to their resistance to unauthorized opening |
08/30195391 DC : 0
|
BS EN ISO 24534-1 - AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES - PART 1: ARCHITECTURE |
CSA ISO/IEC TR 14516 : 2004
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR THE USE AND MANAGEMENT OF TRUSTED THIRD PARTY SERVICES |
CSA ISO/IEC 9798-3 : 2002 : ADD A : INC : AMD 1 : 2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 3: MECHANISMS USING DIGITAL SIGNATURE TECHNIQUES |
CAN/CSA-ISO/IEC TR 14516-04 (R2017)
|
Information Technology - Security Techniques - Guidelines for the use and Management of Trusted Third Party Services (Adopted ISO/IEC TR 14516:2002, first edition, 2002-06-15) |
DD ENV 12017:1998
|
Medical informatics. Medical informatics vocabulary (MIVoc) |
CSA ISO/IEC TR 14516 : 2004 : R2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR THE USE AND MANAGEMENT OF TRUSTED THIRD PARTY SERVICES |
CSA ISO/IEC 9798-2 : 2010 : R2015
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 2: MECHANISMS USING SYMMETRIC ENCIPHERMENT ALGORITHMS |
CSA ISO/IEC 9798-5 : 2010
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 5: MECHANISMS USING ZERO-KNOWLEDGE TECHNIQUES |
ANSI X9.117 : 2012
|
SECURE REMOTE ACCESS - MUTUAL AUTHENTICATION |
I.S. EN 62056-5-3:2017
|
ELECTRICITY METERING DATA EXCHANGE - THE DLMS/COSEM SUITE - PART 5-3: DLMS/COSEM APPLICATION LAYER |
I.S. EN 62734:2015
|
INDUSTRIAL NETWORKS - WIRELESS COMMUNICATION NETWORK AND COMMUNICATION PROFILES - ISA 100.11A |
BS ISO/IEC 9796-2:2010
|
Information technology. Security techniques. Digital signature schemes giving message recovery Integer factorization based mechanisms |
IEC 62056-5-3:2017
|
Electrcity metering data exchange - The DLMS/COSEM suite - Part 5-3: DLMS/COSEM application layer |
I.S. EN ISO 24534-3:2016
|
INTELLIGENT TRANSPORT SYSTEMS - AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES - PART 3: VEHICLE DATA (ISO 24534-3:2016) |
BS EN ISO 21549-7:2016
|
Health informatics. Patient healthcard data Medication data |
CEN/TS 419261:2015
|
Security requirements for trustworthy systems managing certificates and time-stamps |
CEN ISO/TS 24534-1:2007
|
Automatic vehicle and equipment identification - Electronic Registration Identification (ERI) for vehicles - Part 1: Architecture (ISO/TS 24534-1:2007) |
EN 62734:2015
|
Industrial networks - Wireless communication network and communication profiles - ISA 100.11a |
EN 62056-5-3:2017
|
Electricity metering data exchange - The DLMS/COSEM suite - Part 5-3: DLMS/COSEM application layer |
BS ISO/IEC 9798-2:2008
|
Information technology. Security techniques. Entity authentication Mechanisms using symmetric encipherment algorithms |
08/30169505 DC : DRAFT JULY 2008
|
BS ISO/IEC 13888-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NON-REPUDIATION - PART 1: GENERAL |
INCITS/ISO/IEC 9798-4 : 1999 : R2005
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 4: MECHANISMS USING A CRYPTOGRAPHIC CHECK FUNCTION |
08/30192697 DC : 0
|
BS ISO/IEC 9797-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MESSAGE AUTHENTICATION CODES (MACS) - PART 1: MECHANISMS USING A BLOCK CIPHER |
BS ISO 24534-5:2011
|
Intelligent transport systems. Automatic vehicle and equipment identification. Electronic Registration Identification (ERI) for vehicles Secure communications using symmetrical techniques |
10/30204613 DC : 0
|
BS ISO 24534-5 - AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES - PART 5: SECURE COMMUNICATIONS USING SYMMETRICAL TECHNIQUES |
ISO/IEC 9796-2:2010
|
Information technology Security techniques Digital signature schemes giving message recovery Part 2: Integer factorization based mechanisms |
BS EN ISO 24534-3:2016
|
Intelligent transport systems. Automatic vehicle and equipment identification. Electronic registration identification (ERI) for vehicles Vehicle data |
BS ISO/IEC 10181-1:1996
|
Information technology. Open systems interconnection. Security frameworks for open systems Overview |
12/30236952 DC : 0
|
BS ISO/IEC 20009-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ANONYMOUS ENTITY AUTHENTICATION - PART 2: MECHANISMS BASED ON SIGNATURES USING A GROUP PUBLIC KEY |
BS ISO/IEC 9798-3 : 1998
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 3: MECHANISMS USING DIGITAL SIGNATURE TECHNIQUES |
09/30204756 DC : 0
|
BS ISO/IEC 11770-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 1: FRAMEWORK |
ISO/IEC 15944-7:2009
|
Information technology Business operational view Part 7: eBusiness vocabulary |
16/30313398 DC : 0
|
BS ISO/IEC 15944-12 - INFORMATION TECHNOLOGY - BUSINESS OPERATIONAL VIEW - PART 12: PRIVACY PROTECTION REQUIREMENTS ON INFORMATION LIFE CYCLE MANAGEMENT (ILCM) AND EDI OF PERSONAL INFORMATION |
DD ISO/TS 24534-1:2007
|
Automatic vehicle and equipment identification. Electronic registration identification (ERI) for vehicles Architecture |
ISO/IEC 13157-4:2016
|
Information technology Telecommunications and information exchange between systems NFC Security Part 4: NFC-SEC entity authentication and key agreement using asymmetric cryptography |
BS ISO/IEC 10181-2:1996
|
Information technology. Open systems interconnection. Security frameworks for open systems Authentication framework |
07/30107757 DC : 0
|
BS ISO/IEC 24708 - INFORMATION TECHNOLOGY - BIOAPI INTERWORKING PROTOCOL |
BS EN 62056-5-3:2017
|
Electrcity metering data exchange. The DLMS/COSEM suite DLMS/COSEM application layer |
11/30227809 DC : 0
|
BS ISO/IEC 15944-10 - INFORMATION TECHNOLOGY - BUSINESS OPERATIONAL VIEW - PART 10: IT-ENABLED CODED DOMAINS AS SEMANTIC COMPONENTS IN BUSINESS TRANSACTIONS |
DD ENV 12018:1998
|
Identification, administrative, and common clinical data structure for intermittently connected devices used in healthcare (including machine readable cards) |
02/653358 DC : DRAFT NOV 2002
|
ISO/DIS 21549-2 - HEALTH INFORMATICS - PATIENT HEALTHCARE DATA - PART 2: COMMON OBJECTS |
BS ISO/IEC 20009-2:2013
|
Information technology. Security techniques. Anonymous entity authentication Mechanisms based on signatures using a group public key |
INCITS/ISO/IEC 15944-5 : 2008(R2013)
|
INFORMATION TECHNOLOGY - BUSINESS OPERATIONAL VIEW - PART 5: IDENTIFICATION AND REFERENCING OF REQUIREMENTS OF JURISDICTIONAL DOMAINS AS SOURCES OF EXTERNAL CONSTRAINTS |
17/30349181 DC : 0
|
BS ISO/IEC 24760-1 AMENDMENT 1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - A FRAMEWORK FOR IDENTITY MANAGEMENT - PART 1: TERMINOLOGY AND CONCEPTS |
PD CEN/TS 419261:2015
|
Security requirements for trustworthy systems managing certificates and time-stamps |
BS ISO/IEC 22425:2017
|
Information technology. Telecommunications and information exchange between systems. NFC-SEC Test Methods |
BS ISO/IEC 15944-1:2011
|
Information technology. Business operational view Operational aspects of Open-edi for implementation |
BS ISO/IEC 15944-5:2008
|
Information technology. Business operational view Identification and referencing of requirements of jurisdictional domains as sources of external constraints |
04/30126440 DC : DRAFT DEC 2004
|
ISO 21549-4 - HEALTH INFORMATICS - PATIENT HEALTHCARD DATA - PART 4: EXTENDED CLINICAL DATA |
PD ISO/TR 14742:2010
|
Financial services. Recommendations on cryptographic algorithms and their use |
UNI EN ISO 24534-1 : 2011
|
AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES - PART 1: ARCHITECTURE |
CSA ISO/IEC 9798-6 : 2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 6: MECHANISMS USING MANUAL DATA TRANSFER |
02/652661 DC : DRAFT NOV 2002
|
ISO/IEC FCD 18033-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 1: GENERAL |
CAN/CSA-ISO/IEC 9798-4-02 (R2016)
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 4: MECHANISMS USING A CRYPTOGRAPHIC CHECK FUNCTION |
INCITS/ISO/IEC 20009-1 : 2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ANONYMOUS ENTITY AUTHENTICATION - PART 1: GENERAL |
CAN/CSA-ISO/IEC 15944-1:13 (R2017)
|
Information technology - Business operational view - Part 1: Operational aspects of open-edi for implementation (Adopted ISO/IEC 15944-1:2011, second edition, 2011-08-01) |
ECMA 410 : 3ED 2017
|
NFC-SEC-03: NFC-SEC ENTITY AUTHENTICATION AND KEY AGREEMENT USING ASYMMETRIC CRYPTOGRAPHY |
CSA ISO/IEC 9798-3 : 2002 : INC : COR 2 : 2013 : R201100
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 3: MECHANISMS USING DIGITAL SIGNATURE TECHNIQUES |
ISO/IEC 20009-1:2013
|
Information technology Security techniques Anonymous entity authentication Part 1: General |
CSA ISO/IEC 18014-1 : 2009
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - TIME-STAMPING SERVICES - PART 1: FRAMEWORK |
CSA ISO/IEC 9798-3 : 2002 : R2011
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 3: MECHANISMS USING DIGITAL SIGNATURE TECHNIQUES |
CSA ISO/IEC 9798-2 : 2010 : INC : COR 2 : 2013
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 2: MECHANISMS USING SYMMETRIC ENCIPHERMENT ALGORITHMS |
ISO 24534-5:2011
|
Intelligent transport systems — Automatic vehicle and equipment identification — Electronic Registration Identification (ERI) for vehicles — Part 5: Secure communications using symmetrical techniques |
IEC TS 62351-2:2008
|
Power systems management and associated information exchange - Data and communications security - Part 2: Glossary of terms |
EG 202 387 : 1.1.1
|
TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); SECURITY DESIGN GUIDE; METHOD FOR APPLICATION OF COMMON CRITERIA TO ETSI DELIVERABLES |
ETR 237 : 20001
|
SECURITY TECHNIQUES ADVISORY GROUP (STAG) - BASELINE SECURITY STANDARDS - FEATURES AND MECHANISMS |
BS EN ISO 24534-4:2010+A1:2019
|
Automatic vehicle and equipment identification. Electronic registration identification (ERI) for vehicles Secure communications using asymmetrical techniques |
ISO/IEC 29150:2011
|
Information technology — Security techniques — Signcryption |
EN ISO 24534-4:2010
|
Automatic vehicle and equipment identification - Electronic Registration Identification (ERI) for vehicles - Part 4: Secure communications using asymmetrical techniques (ISO 24534-4:2010) |
ISO/IEC 18014-1:2008
|
Information technology Security techniques Time-stamping services Part 1: Framework |
BS EN ISO 21549-2:2014
|
Health informatics. Patient healthcard data Common objects |
UNE-EN ISO 21549-3:2014
|
Health informatics - Patient healthcard data -- Part 3: Limited clinical data (ISO 21549-3:2014) |
DIN EN 1300:2014-05
|
SECURE STORAGE UNITS - CLASSIFICATION FOR HIGH SECURITY LOCKS ACCORDING TO THEIR RESISTANCE TO UNAUTHORIZED OPENING |
I.S. EN ISO 21549-2:2014
|
HEALTH INFORMATICS - PATIENT HEALTHCARD DATA - PART 2: COMMON OBJECTS (ISO 21549-2:2014) |
I.S. EN ISO 21549-3:2014
|
HEALTH INFORMATICS - PATIENT HEALTHCARD DATA - PART 3: LIMITED CLINICAL DATA (ISO 21549-3:2014) |
I.S. EN ISO 21549-7:2016
|
HEALTH INFORMATICS - PATIENT HEALTHCARD DATA - PART 7: MEDICATION DATA (ISO 21549-7:2016) |
ISO/IEC 13888-1:2009
|
Information technology Security techniques Non-repudiation Part 1: General |
UNI EN 1300 : 2014
|
SECURE STORAGE UNITS - CLASSIFICATION FOR HIGH SECURITY LOCKS ACCORDING TO THEIR RESISTANCE TO UNAUTHORIZED OPENING |
BS ISO/IEC 29192-2:2012
|
Information technology. Security techniques. Lightweight cryptography Block ciphers |
ISO 24534-4:2010
|
Automatic vehicle and equipment identification — Electronic registration identification (ERI) for vehicles — Part 4: Secure communications using asymmetrical techniques |
09/30214048 DC : 0
|
BS ISO/IEC 9796-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DIGITAL SIGNATURE SCHEMES GIVING MESSAGE RECOVERY - PART 2: INTEGER FACTORIZATION BASED MECHANISMS |
ISO/IEC 29167-17:2015
|
Information technology Automatic identification and data capture techniques Part 17: Crypto suite cryptoGPS security services for air interface communications |
03/652695 DC : 0
|
ISO/IEC 9798-5 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 5: MECHANISMS USING ZERO KNOWLEDGE TECHNIQUES |
03/308265 DC : DRAFT JUNE 2003
|
ISO/TS 24534 - ROAD TRANSPORT AND TRAFFIC TELEMATICS - AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES |
ISO/IEC 9798-5:2009
|
Information technology — Security techniques — Entity authentication — Part 5: Mechanisms using zero-knowledge techniques |
16/30266969 DC : 0
|
BS ISO/IEC 17922 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - TELEBIOMETRIC AUTHENTICATION FRAMEWORK USING BIOMETRIC HARDWARE SECURITY MODULE |
07/30163724 DC : 0
|
BS ISO/IEC 24727-4 - IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARDS PROGRAMMING INTERFACE - PART 4: API ADMINISTRATION |
17/30345248 DC : 0
|
BS ISO/IEC 9798-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 3: MECHANISMS USING DIGITAL SIGNATURE TECHNIQUES |
10/30180220 DC : 0
|
BS ISO/IEC 15944-8 - BUSINESS OPERATIONAL VIEW - PART 8: IDENTIFICATION OF PRIVACY PROTECTION REQUIREMENTS AS EXTERNAL CONSTRAINTS ON BUSINESS TRANSACTIONS |
12/30228421 DC : 0
|
BS ISO/IEC 29192-4 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - LIGHTWEIGHT CRYPTOGRAPHY - PART 4: MECHANISMS USING ASYMMETRIC TECHNIQUES |
BS ISO/IEC 9798-4:1999
|
Information technology. Security techniques. Entity authentication Mechanisms using a cryptographic check function |
BS ISO 15668:1999
|
Banking. Secure file transfer (retail) |
TS 118 111 : 2.4.1
|
ONEM2M; COMMON TERMINOLOGY (ONEM2M TS-0011 VERSION 2.4.1 RELEASE 2) |
BS ISO/IEC 9797-1:2011
|
Information technology. Security techniques. Message authentication codes (MACs) Mechanisms using a block cipher |
18/30354751 DC : DRAFT FEB 2018
|
BS ISO/IEC 18033-6 - INFORMATION TECHNOLOGY SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 6: HOMOMORPHIC ENCRYPTION |
07/30135157 DC : 0
|
BS ISO/IEC 18014-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - TIME-STAMPING SERVICES - PART 1: FRAMEWORK |
ISO/IEC TR 14516:2002
|
Information technology Security techniques Guidelines for the use and management of Trusted Third Party services |
BS ISO/IEC 29150:2011
|
Information technology. Security techniques. Signcryption |
BS EN 1300:2013
|
Secure storage units. Classification for high security locks according to their resistance to unauthorized opening |
CAN/CSA-ISO/IEC 9797-1:12 (R2016)
|
Information technology - Security techniques - Message authentication codes (MACs) - Part 1: Mechanisms using a block cipher (Adopted ISO/IEC 9797-1:2011, second edition, 2011-03-01) |
ISO/IEC 13888-2:2010
|
Information technology Security techniques Non-repudiation Part 2: Mechanisms using symmetric techniques |
CSA ISO/IEC 9798-4 : 2002 : INC : COR 1 : 2010 : R2011
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 4: MECHANISMS USING A CRYPTOGRAPHIC CHECK FUNCTION |
INCITS/ISO/IEC 9798-2 : 2010
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 2: MECHANISMS USING SYMMETRIC ENCIPHERMENT ALGORITHMS |
ANSI X9.112-1 : 2009
|
WIRELESS MANAGEMENT AND SECURITY - PART 1: GENERAL REQUIREMENTS |
BS ISO/IEC 13888-1:2009
|
Information technology. Security techniques. Non-repudiation General |
INCITS/ISO/IEC 9798-6 : 2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 6: MECHANISMS USING MANUAL DATA TRANSFER |
ISO 15764:2004
|
Road vehicles Extended data link security |
BS ISO/IEC 29192-4 : 2013
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - LIGHTWEIGHT CRYPTOGRAPHY - PART 4: MECHANISMS USING ASYMMETRIC TECHNIQUES |
ISO/IEC 29192-2:2012
|
Information technology Security techniques Lightweight cryptography Part 2: Block ciphers |
ISO/IEC 9798-3:1998
|
Information technology Security techniques Entity authentication Part 3: Mechanisms using digital signature techniques |
ISO/IEC 29187-1:2013
|
Information technology — Identification of privacy protection requirements pertaining to learning, education and training (LET) — Part 1: Framework and reference model |
ANSI X9.112 : 2016
|
WIRELESS MANAGEMENT AND SECURITY - PART 1: GENERAL REQUIREMENTS |
UNI CEN ISO/TS 24534-1 : 2008
|
AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES - PART 1: ARCHITECTURE |
ISO/TR 14742:2010
|
Financial services Recommendations on cryptographic algorithms and their use |
S.R. CEN ISO/TS 24534-4:2008
|
AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES - PART 4: SECURE COMMUNICATIONS USING ASYMMETRICAL TECHNIQUES |
ISO/TS 24534-3:2008
|
Automatic vehicle and equipment identification Electronic Registration Identification (ERI) for vehicles Part 3: Vehicle data |
IEC 62734:2014
|
Industrial networks - Wireless communication network and communication profiles - ISA 100.11a |
EN 1300:2013
|
Secure storage units - Classification for high security locks according to their resistance to unauthorized opening |
ENV 12018 : DRAFT 1997
|
IDENTIFICATION, ADMINISTRATIVE, AND COMMON CLINICAL DATA STRUCTURE FOR INTERMITTENTLY CONNECTED DEVICES USED IN HEALTHCARE (INCLUDING MACHINE READABLE CARDS) |
UNI EN ISO 21549-2 : 2014
|
HEALTH INFORMATICS - PATIENT HEALTHCARD DATA - PART 2: COMMON OBJECTS |
UNI EN ISO 21549-4 : 2014
|
HEALTH INFORMATICS - PATIENT HEALTHCARD DATA - PART 4: EXTENDED CLINICAL DATA |
UNI EN ISO 21549-3 : 2014
|
HEALTH INFORMATICS - PATIENT HEALTHCARD DATA - PART 3: LIMITED CLINICAL DATA |
BS ISO/IEC 20009-1:2013
|
Information technology. Security techniques. Anonymous entity authentication General |
BS ISO/IEC 15944-10:2013
|
Information technology. Business Operational View IT-enabled coded domains as semantic components in business transactions |
12/30264397 DC : 0
|
BS EN ISO 21549-2 - HEALTH INFORMATICS - PATIENT HEALTH CARD DATA - PART 2: COMMON OBJECTS |
07/30154069 DC : 0
|
BS ISO/IEC 24727-3 - IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARD PROGRAMMING INTERFACES - PART 3: APPLICATION INTERFACE |
DD ENV 13729:2000
|
Health informatics. Secure user identification. Strong authentication microprocessor cards |
ISO/TS 24534-5:2008
|
Automatic vehicle and equipment identification Electronic Registration Identification (ERI) for vehicles Part 5: Secure communications using symmetrical techniques |
ISO/IEC 18033-1:2015
|
Information technology Security techniques Encryption algorithms Part 1: General |
BS ISO/IEC TR 14516:2002
|
Information technology. Security techniques. Guidelines for the use and management of trusted third party services |
CSA ISO/IEC 18014-1 : 2009 : R2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - TIME-STAMPING SERVICES - PART 1: FRAMEWORK |
ISO 15668:1999
|
Banking Secure file transfer (retail) |
BS ISO/IEC 13888-2:2010
|
Information technology. Security techniques. Non-repudiation Mechanisms using symmetric techniques |
02/653359 DC : DRAFT NOV 2002
|
ISO/DIS 21549-3 - HEALTH INFORMATICS - PATIENT HEALTHCARE DATA - PART 3: LIMITED CLINICAL DATA |
ISO/IEC 9798-2:2008
|
Information technology Security techniques Entity authentication Part 2: Mechanisms using symmetric encipherment algorithms |
DD CEN ISO/TS 24534-4:2008
|
Automatic vehicle and equipment identification. Electronic registration identification (ERI) for vehicles Secure communications using asymmetrical techniques |
02/652659 DC : DRAFT NOV 2002
|
ISO/IEC FCD 13888-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NON-REPUDIATION - PART 1: GENERAL |
BS EN 62734:2015
|
Industrial networks. Wireless communication network and communication profiles. ISA 100.11a |
DD CEN ISO/TS 24534-3 : DRAFT MARCH 2008
|
AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES - PART 3: VEHICLE DATA |
07/30173155 DC : 0
|
BS ISO/IEC 9798-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 2: MECHANISMS USING SYMMETRIC ENCIPHERMENT ALGORITHMS |
08/30195403 DC : 0
|
BS EN ISO 24534-4 - AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES - PART 4: SECURE COMMUNICATIONS USING ASYMMETRICAL TECHNIQUES |
04/30093313 DC : DRAFT JUN 2004
|
ISO/IEC 9798-6 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 6: MECHANISMS USING MANUAL DATA TRANSFER |
14/30281542 DC : 0
|
BS EN ISO 21549-7 - HEALTH INFORMATICS - PATIENT HEALTHCARD DATA - PART 7: MEDICATION DATA |
S.R. CEN ISO TS 24534-1:2007
|
AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES - PART 1: ARCHITECTURE |
CSA ISO/IEC 13888-1:2010
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NON-REPUDIATION - PART 1: GENERAL |
UNI CEN ISO/TS 24534-3 : 2008
|
AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES - PART 3: VEHICLE DATA |
DD IEC/TS 62351-2:2008
|
Power systems management and associated information exchange. Data and communications security Glossary of terms |
CSA ISO/IEC 9798-3 : 2002 : INC : COR 1 : 2010 : R2011
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 3: MECHANISMS USING DIGITAL SIGNATURE TECHNIQUES |
CSA ISO/IEC 9797-1:2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MESSAGE AUTHENTICATION CODES (MACS) - PART 1: MECHANISMS USING A BLOCK CIPHER |
03/652682 DC : DRAFT NOV 2003
|
BS ISO/IEC TR 15446 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDE FOR THE PRODUCTION OF PROTECTION PROFILES AND SECURITY TARGETS |
CSA ISO/IEC 9798-4 : 2002 : R2011
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 4: MECHANISMS USING A CRYPTOGRAPHIC CHECK FUNCTION |
CR 14301 : 2002
|
HEALTH INFORMATICS - FRAMEWORK FOR SECURITY PROTECTION OF HEALTHCARE COMMUNICATION |
CAN/CSA-ISO/IEC 9798-6:12 (R2016)
|
Information technology - Security techniques - Entity authentication - Part 6: Mechanisms using manual data transfer (Adopted ISO/IEC 9798-6:2010, second edition, 2010-12-01) |
CSA ISO/IEC 9798-4 :2002
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 4: MECHANISMS USING A CRYPTOGRAPHIC CHECK FUNCTION |
UNE-EN ISO 24534-3:2016
|
Intelligent transport systems - Automatic vehicle and equipment identification - Electronic registration identification (ERI) for vehicles - Part 3: Vehicle data (ISO 24534-3:2016) |
DD ISO/TS 24534-5:2008
|
Automatic vehicle and equipment identification. Electronic Registration Identification (ERI) for vehicles Secure communications using symmetrical techniques |
CAN/CSA-ISO/IEC 29167-17:16
|
Information technology Automatic identification and data capture techniques Part 17: Crypto suite cryptoGPS security services for air interface communications (Adopted ISO/IEC 29167-17:2015, first edition, 2015-06-01) |
UNI EN ISO 24534-4 : 2011
|
AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES - PART 4: SECURE COMMUNICATIONS USING ASYMMETRICAL TECHNIQUES |
ISO/IEC 9798-6:2010
|
Information technology Security techniques Entity authentication Part 6: Mechanisms using manual data transfer |
I.S. EN ISO 24534-4:2010&A1:2019
|
AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES - PART 4: SECURE COMMUNICATIONS USING ASYMMETRICAL TECHNIQUES |
I.S. EN ISO 24534-1:2010
|
AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES - PART 1: ARCHITECTURE |
I.S. EN 1300:2013
|
SECURE STORAGE UNITS - CLASSIFICATION FOR HIGH SECURITY LOCKS ACCORDING TO THEIR RESISTANCE TO UNAUTHORIZED OPENING |
ISO/IEC 15444-8:2007
|
Information technology — JPEG 2000 image coding system: Secure JPEG 2000 — Part 8: |
I.S. CEN ISO TS 24534-3:2008
|
AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES - PART 3: VEHICLE DATA |
ISO/TS 24534-1:2007
|
Automatic vehicle and equipment identification Electronic Registration Identification (ERI) for vehicles Part 1: Architecture |
UNE-EN ISO 21549-7:2018
|
Health informatics - Patient healthcard data - Part 7: Medication data (ISO 21549-7:2016) |
UNE-EN ISO 21549-2:2014
|
Health informatics - Patient healthcard data - Part 2: Common objects (ISO 21549-2:2014) |
ISO/TS 24534-4:2008
|
Automatic vehicle and equipment identification Electronic Registration Identification (ERI) for vehicles Part 4: Secure communications using asymmetrical techniques |
ISO 24534-1:2010
|
Automatic vehicle and equipment identification — Electronic registration identification (ERI) for vehicles — Part 1: Architecture |
ISO 21549-2:2014
|
Health informatics Patient healthcard data Part 2: Common objects |
BS EN ISO 21549-3:2014
|
Health informatics. Patient healthcard data Limited clinical data |
ISO 24534-3:2016
|
Intelligent transport systems — Automatic vehicle and equipment identification — Electronic registration identification (ERI) for vehicles — Part 3: Vehicle data |
ISO 21549-7:2016
|
Health informatics — Patient healthcard data — Part 7: Medication data |
ISO 21549-3:2014
|
Health informatics Patient healthcard data Part 3: Limited clinical data |
EN ISO 21549-3:2014
|
Health informatics - Patient healthcard data -- Part 3: Limited clinical data (ISO 21549-3:2014) |
EN ISO 21549-2:2014
|
Health informatics - Patient healthcard data - Part 2: Common objects (ISO 21549-2:2014) |
ENV 12017 : 1997
|
MEDICAL INFORMATICS - MEDICAL INFORMATICS VOCABULARY (MIVOC) |
EN ISO 21549-7:2016
|
Health informatics - Patient healthcard data - Part 7: Medication data (ISO 21549-7:2016) |
ISO/IEC 15944-8:2012
|
Information technology — Business operational view — Part 8: Identification of privacy protection requirements as external constraints on business transactions |
INCITS/ISO/IEC 9798-5 : 2010
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 5: MECHANISMS USING ZERO-KNOWLEDGE TECHNIQUES |
ISO/IEC 15944-5:2008
|
Information technology Business operational view Part 5: Identification and referencing of requirements of jurisdictional domains as sources of external constraints |
12/30236970 DC : 0
|
BS ISO/IEC 20009-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ANONYMOUS ENTITY AUTHENTICATION - PART 1: GENERAL |
UNE-EN ISO 24534-1:2012
|
Automatic vehicle and equipment identification - Electronic Registration Identification (ERI) for vehicles - Part 1: Architecture (ISO 24534-1:2010) |
INCITS/ISO/IEC 29192-4 : 2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - LIGHTWEIGHT CRYPTOGRAPHY - PART 4: MECHANISMS USING ASYMMETRIC TECHNIQUES |
INCITS/ISO/IEC 18033-1 : 2005
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 1: GENERAL |
13/30280997 DC : 0
|
BS EN ISO 24534-3 - INTELLIGENT TRANSPORT SYSTEMS - AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES - PART 3: VEHICLE DATA |
BS ISO/IEC 15944-8:2012
|
Information technology. Business Operational View Identification of privacy protection requirements as external constraints on business transactions |
ISO/IEC 29192-4:2013
|
Information technology — Security techniques — Lightweight cryptography — Part 4: Mechanisms using asymmetric techniques |
BS ISO/IEC 15944-7:2009
|
Information technology. Business operational view eBusiness vocabulary |
BS ISO/IEC 9798-5:2009
|
Information technology. Security techniques. Entity authentication Mechanisms using zero knowledge techniques |
ISO/IEC 9798-4:1999
|
Information technology Security techniques Entity authentication Part 4: Mechanisms using a cryptographic check function |
ISO/IEC 15944-1:2011
|
Information technology Business operational view Part 1: Operational aspects of open-edi for implementation |
10/30228415 DC : DRAFT NOV 2010
|
BS ISO/IEC 29192-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - LIGHTWEIGHT CRYPTOGRAPHY - PART 2: BLOCK CIPHERS |
UNE-EN ISO 24534-4:2012
|
Automatic vehicle and equipment identification - Electronic Registration Identification (ERI) for vehicles - Part 4: Secure communications using asymmetrical techniques (ISO 24534-4:2010) |
ISO/IEC 17922:2017
|
Information technology — Security techniques — Telebiometric authentication framework using biometric hardware security module |
BS ISO/IEC 18033-1:2015
|
Information technology. Security techniques. Encryption algorithms General |
INCITS/ISO/IEC 15944-1 : 2008(R2013)
|
INFORMATION TECHNOLOGY - BUSINESS AGREEMENT SEMANTIC DESCRIPTIVE TECHNIQUES - PART 1: BUSINESS OPERATIONAL ASPECTS OF OPEN-EDI FOR IMPLEMENTATION |
PD ISO/IEC TR 29149:2012
|
Information technology. Security techniques. Best practices for the provision and use of time-stamping services |
09/30169508 DC : 0
|
BS ISO/IEC 13888-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NON-REPUDIATION - PART 2: MECHANISMS USING SYMMETRIC TECHNIQUES |
ECMA 411 : 3ED 2017
|
NFC-SEC-04: NFC-SEC ENTITY AUTHENTICATION AND KEY AGREEMENT USING SYMMETRIC CRYPTOGRAPHY |
ISO/IEC 20009-2:2013
|
Information technology Security techniques Anonymous entity authentication Part 2: Mechanisms based on signatures using a group public key |
BS EN ISO 24534-1:2010
|
Automatic vehicle and equipment identification. Electronic registration identification (ERI) for vehicles Architecture |
BS ISO/IEC 9798-6:2010
|
Information technology. Security techniques. Entity authentication Mechanisms using manual data transfer |
CSA ISO/IEC 13888-1 : 2010 : R2015
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NON-REPUDIATION - PART 1: GENERAL |
CSA ISO/IEC 9798-3:2002
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 3: MECHANISMS USING DIGITAL SIGNATURE TECHNIQUES |
CSA ISO/IEC 9798-3 : 2002 : INC : AMD 1 : 2012 : R2016
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 3: MECHANISMS USING DIGITAL SIGNATURE TECHNIQUES |
CSA ISO/IEC 9798-3 : 2002 : INC : AMD 1 : 2012 : R201100
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 3: MECHANISMS USING DIGITAL SIGNATURE TECHNIQUES |
CSA ISO/IEC 15944-1:2013
|
INFORMATION TECHNOLOGY - BUSINESS OPERATIONAL VIEW - PART 1: OPERATIONAL ASPECTS OF OPEN-EDI FOR IMPLEMENTATION |
CR 14302 : 2002
|
HEALTH INFORMATICS - FRAMEWORK FOR SECURITY REQUIREMENTS FOR INTERMITTENTLY CONNECTED DEVICES |
CSA ISO/IEC 18033-1 : 2006
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 1: GENERAL |
CSA ISO/IEC 18033-1 : 2006 : INC : AMD 1 : 2012 : R2016
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 1: GENERAL |
ISO/IEC 13157-5:2016
|
Information technology Telecommunications and information exchange between systems NFC Security Part 5: NFC-SEC entity authentication and key agreement using symmetric cryptography |
I.S. CR 14302:2002
|
HEALTH INFORMATICS - FRAMEWORK FOR SECURITY REQUIREMENTS FOR INTERMITTENTLY CONNECTED DEVICES |
ISO/IEC 22425:2017
|
Information technology — Telecommunications and information exchange between systems — NFC-SEC Test Methods |
S.R. CEN/TS 419261:2015
|
SECURITY REQUIREMENTS FOR TRUSTWORTHY SYSTEMS MANAGING CERTIFICATES AND TIME-STAMPS |
CSA ISO/IEC 10181-1 : 2000
|
INFORMATION TECHNOLOGY - OPEN SYSTEMS INTERCONNECTION - SECURITY FRAMEWORKS FOR OPEN SYSTEMS: OVERVIEW |
ISO/IEC TR 29149:2012
|
Information technology Security techniques Best practices for the provision and use of time-stamping services |
I.S. CR 14301:2002
|
HEALTH INFORMATICS - FRAMEWORK FOR SECURITY PROTECTION OF HEALTHCARE COMMUNICATION |
ISO/IEC 9797-1:2011
|
Information technology Security techniques Message Authentication Codes (MACs) Part 1: Mechanisms using a block cipher |
EN ISO 24534-1:2010
|
Automatic vehicle and equipment identification - Electronic Registration Identification (ERI) for vehicles - Part 1: Architecture (ISO 24534-1:2010) |
CEN ISO/TS 24534-4:2008
|
Automatic vehicle and equipment identification - Electronic Registration Identification (ERI) for vehicles - Part 4: Secure communications using asymmetrical techniques (ISO/TS 24534-4:2008) |
CEN ISO/TS 24534-3:2008
|
Automatic vehicle and equipment identification - Electronic Registration Identification (ERI) for vehicles - Part 3: Vehicle data (ISO/TS 24534-3:2008) |
EN ISO 24534-3:2016
|
Intelligent transport systems - Automatic vehicle and equipment identification - Electronic registration identification (ERI) for vehicles - Part 3: Vehicle data (ISO 24534-3:2016) |