15/30324800 DC : 0
|
BS ISO/IEC 16512-2 - INFORMATION TECHNOLOGY - RELAYED MULTICAST PROTOCOL: SPECIFICATION FOR SIMPLEX GROUP APPLICATIONS |
CSA ISO/IEC 10116 : 2007 : R2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MODES OF OPERATION FOR AN N-BIT BLOCK CIPHER |
CSA ISO/IEC 18033-2 :2006
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 2: ASYMMETRIC CIPHERS |
15/30288056 DC : 0
|
BS ISO/IEC 10116 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MODES OF OPERATION FOR AN N-BIT BLOCK CIPHER |
08/30192697 DC : 0
|
BS ISO/IEC 9797-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MESSAGE AUTHENTICATION CODES (MACS) - PART 1: MECHANISMS USING A BLOCK CIPHER |
BS ISO/IEC 4909:2006
|
Identification cards. Financial transaction cards. Magnetic stripe data content for track 3 |
10/30135070 DC : DRAFT NOV 2010
|
BS ISO/IEC 9797-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MESSAGE AUTHENTICATION CODES (MACS) - PART 3: MECHANISMS USING A UNIVERSAL HASH FUNCTION |
BS ISO 11568-4:2007
|
Banking. Key management (retail) Asymmetric cryptosystems. Key management and life cycle |
11/30231373 DC : 0
|
BS ISO 11568-2 - FINANCIAL SERVICES - KEY MANAGEMENT (RETAIL) - PART 2: SYMMETRIC CIPHERS, THEIR KEY MANAGEMENT AND LIFE CYCLE |
BS ISO/IEC 29192-5:2016
|
Information technology. Security techniques. Lightweight cryptography Hash-functions |
BS EN 419212-1:2017
|
Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services Introduction and common definitions |
15/30327554 DC : 0
|
BS ISO/IEC 13157-2 - INFORMATION TECHNOLOGY - TELECOMMUNICATIONS AND INFORMATION EXCHANGE BETWEEN SYSTEMS - NFC SECURITY - PART 2: NFC-SEC CRYPTOGRAPHY STANDARD USING ECDH AND AES |
ISO/IEC 13157-2:2016
|
Information technology Telecommunications and information exchange between systems NFC Security Part 2: NFC-SEC cryptography standard using ECDH and AES |
ISO/IEC 18028-4:2005
|
Information technology Security techniques IT network security Part 4: Securing remote access |
DIN EN 14890-1 E : 2009
|
APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES |
16/30304626 DC : 0
|
BS ISO 20038 - BANKING AND RELATED FINANCIAL SERVICES - KEY WRAP |
NASA CCSDS 350.9-G : ISSUE 1
|
CCSDS CRYPTOGRAPHIC ALGORITHMS |
PD CEN/TR 16968:2016
|
Electronic Fee Collection. Assessment of security measures for applications using Dedicated Short-Range Communication |
BS ISO 21188:2006
|
Public key infrastructure for financial services. Practices and policy framework |
CSA ISO/IEC 10116 : 2007 : INC : COR 1 : 2009
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MODES OF OPERATION FOR AN N-BIT BLOCK CIPHER |
INCITS/ISO/IEC 24745 : 2012(R2017)
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - BIOMETRIC INFORMATION PROTECTION |
ISO/IEC 9797-3:2011
|
Information technology — Security techniques — Message Authentication Codes (MACs) — Part 3: Mechanisms using a universal hash-function |
CSA ISO/IEC 10118-2 : 2012 : INC : COR 1 : 2013
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - HASH-FUNCTIONS - PART 2: HASH-FUNCTIONS USING AN N-BIT BLOCK CIPHER |
05/30144066 DC : DRAFT DEC 2005
|
ISO 13492 - FINANCIAL SERVICES - KEY MANAGEMENT RELATED DATA ELEMENT - APPLICATION AND USAGE OF ISO 8353 DATA ELEMENTS 53 AND 96 |
INCITS/ISO/IEC 11770-5 : 2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 5: GROUP KEY MANAGEMENT |
CAN/CSA-ISO/IEC 18033-2:06 (R2016)
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 2: ASYMMETRIC CIPHERS |
EN ISO 24534-4:2010
|
Automatic vehicle and equipment identification - Electronic Registration Identification (ERI) for vehicles - Part 4: Secure communications using asymmetrical techniques (ISO 24534-4:2010) |
ISO/IEC 29167-10:2017
|
Information technology — Automatic identification and data capture techniques — Part 10: Crypto suite AES-128 security services for air interface communications |
I.S. EN 419212-2:2017
|
APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 2: SIGNATURE AND SEAL SERVICES |
I.S. EN 419212-1:2017
|
APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 1: INTRODUCTION AND COMMON DEFINITIONS |
CSA ISO/IEC 29167-10 : 2016
|
INFORMATION TECHNOLOGY - AUTOMATIC IDENTIFICATION AND DATA CAPTURE TECHNIQUES - PART 10: CRYPTO SUITE AES-128 SECURITY SERVICES FOR AIR INTERFACE COMMUNICATIONS |
I.S. EN 62734:2015
|
INDUSTRIAL NETWORKS - WIRELESS COMMUNICATION NETWORK AND COMMUNICATION PROFILES - ISA 100.11A |
ISO/IEC 18033-2:2006
|
Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers |
ECMA 386 : 3ED 2015
|
NFC-SEC-01: NFC-SEC CRYPTOGRAPHY STANDARD USING ECDH AND AES |
BS ISO 16609:2012
|
Financial services. Requirements for message authentication using symmetric techniques |
ISO/IEC 25185-1:2016
|
Identification cards Integrated circuit card authentication protocols Part 1: Protocol for Lightweight Authentication of Identity |
CEN/TR 17167:2018
|
Communication system for meters - Accompanying TR to EN 13757-2,-3 and -7, Examples and supplementary information |
ISO 11568-4:2007
|
Banking — Key management (retail) — Part 4: Asymmetric cryptosystems — Key management and life cycle |
CEN/TS 16702-2:2015
|
Electronic fee collection - Secure monitoring for autonomous toll systems - Part 2: Trusted recorder |
I.S. EN 15509:2014
|
ELECTRONIC FEE COLLECTION - INTEROPERABILITY APPLICATION PROFILE FOR DSRC |
CEN ISO/TS 19299 : 2015
|
ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK (ISO/TS 19299:2015) |
IEC 62320-2:2016 RLV
|
Maritime navigation and radiocommunication equipment and systems - Automatic identification system (AIS) - Part 2: AIS AtoN Stations - Operational and performance requirements, methods of testing and required test results |
EN 61162-460:2015
|
Maritime navigation and radiocommunication equipment and systems - Digital interfaces - Part 460: Multiple talkers and multiple listeners - Ethernet interconnection - Safety and security |
EN 62734:2015
|
Industrial networks - Wireless communication network and communication profiles - ISA 100.11a |
ISO 11568-2:2012
|
Financial services — Key management (retail) — Part 2: Symmetric ciphers, their key management and life cycle |
ISO/IEC 11770-5:2011
|
Information technology Security techniques Key management Part 5: Group key management |
04/30062952 DC : DRAFT MAR 2004
|
ISO/IEC FCD 10116 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MODES OF OPERATION FOR AN N-BIT BLOCK CIPHER ALGORITHM |
ISO/IEC 16512-2:2016
|
Information technology Relayed multicast protocol: Specification for simplex group applications Part 2: |
S.R. CEN/TS 16702-2:2015
|
ELECTRONIC FEE COLLECTION - SECURE MONITORING FOR AUTONOMOUS TOLL SYSTEMS - PART 2: TRUSTED RECORDER |
ISO/IEC 16504:2011
|
Information technology Telecommunications and information exchange between systems MAC and PHY for operation in TV white space |
10/30228327 DC : 0
|
BS ISO/IEC 18031 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - RANDOM BIT GENERATION |
07/30154069 DC : 0
|
BS ISO/IEC 24727-3 - IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARD PROGRAMMING INTERFACES - PART 3: APPLICATION INTERFACE |
INCITS/ISO/IEC 10118-2 : 2011
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - HASH-FUNCTIONS - PART 2: HASH-FUNCTIONS USING AN N-BIT BLOCK CIPHER |
12/30259506 DC : DRAFT JAN 2012
|
BS EN 62734 - INDUSTRIAL COMMUNICATION NETWORKS - FIELDBUS SPECIFICATIONS - WIRELESS SYSTEMS FOR INDUSTRIAL AUTOMATION: PROCESS CONTROL AND RELATED APPLICATIONS (BASED ON ISA 100.11A) |
BS EN ISO 13141 : 2015
|
ELECTRONIC FEE COLLECTION - LOCALISATION AUGMENTATION COMMUNICATION FOR AUTONOMOUS SYSTEMS |
14/30314819 DC : 0
|
BS EN 62320-2 - MARITIME NAVIGATION AND RADIOCOMMUNICATION EQUIPMENT AND SYSTEMS - AUTOMATIC IDENTIFICATION SYSTEM (AIS) - PART 2: AIS ATON STATIONS - OPERATIONAL AND PERFORMANCE REQUIREMENTS, METHODS OF TESTING AND REQUIRED TEST RESULTS |
BS ISO 9564-2:2014
|
Financial services. Personal Identification Number (PIN) management and security Approved algorithms for PIN encipherment |
14/30275432 DC : 0
|
BS ISO/IEC 29167-10 - INFORMATION TECHNOLOGY - AUTOMATIC IDENTIFICATION AND DATA CAPTURE TECHNIQUES - PART 10: CRYPTO SUITE AES-128 SECURITY SERVICES FOR AIR INTERFACE COMMUNICATIONS |
ISO/TS 21719-2:2018
|
Electronic fee collection — Personalization of on-board equipment (OBE) — Part 2: Using dedicated short-range communication |
16/30338581 DC : 0
|
BS EN 13757-7 - COMMUNICATION SYSTEMS FOR METERS - PART 7: TRANSPORT AND SECURITY SERVICES |
16/30288045 DC : 0
|
BS ISO/IEC 20009-4 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ANONYMOUS ENTITY AUTHENTICATION - PART 4: MECHANISMS BASED ON WEAK SECRETS |
ISO/IEC 29167-14:2015
|
Information technology Automatic identification and data capture techniques Part 14: Crypto suite AES OFB security services for air interface communications |
CSA ISO/IEC 18028-4 : 2006
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - IT NETWORK SECURITY - PART 4: SECURING REMOTE ACCESS |
BS ISO/IEC 19790:2012
|
Information technology. Security techniques. Security requirements for cryptographic modules |
PD ISO/TR 14742:2010
|
Financial services. Recommendations on cryptographic algorithms and their use |
S.R. CEN/TS 16439:2013
|
ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK |
CSA ISO/IEC 9798-6 : 2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 6: MECHANISMS USING MANUAL DATA TRANSFER |
CSA ISO/IEC 10116 : 2007 : R2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MODES OF OPERATION FOR AN N-BIT BLOCK CIPHER |
ECMA 387 : 2ED 2010
|
HIGH RATE 60 GHZ PHY, MAC AND PALS |
CSA ISO/IEC 10116 : 2007
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MODES OF OPERATION FOR AN N-BIT BLOCK CIPHER |
INCITS/ISO/IEC 18033-2 : 2008
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 2: ASYMMETRIC CIPHERS |
ISO 20215:2015
|
Space data and information transfer systems — CCSDS cryptographic algorithms |
BS ISO/IEC 18031 : 2011
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - RANDOM BIT GENERATION |
ISO/IEC 24767-1:2008
|
Information technology Home network security Part 1: Security requirements |
ISO/IEC 19790:2012
|
Information technology Security techniques Security requirements for cryptographic modules |
BS ISO/IEC/IEEE 8802-1X : 2013
|
INFORMATION TECHNOLOGY - TELECOMMUNICATIONS AND INFORMATION EXCHANGE BETWEEN SYSTEMS - LOCAL AND METROPOLITAN AREA NETWORKS - PART 1X: PORT-BASED NETWORK ACCESS CONTROL |
BS ISO/IEC 18013-3:2017
|
Information technology. Personal identification. ISO-compliant driving licence Access control, authentication and integrity validation |
I.S. EN 14890-1:2008
|
APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES |
ISO/IEC 13157-5:2016
|
Information technology Telecommunications and information exchange between systems NFC Security Part 5: NFC-SEC entity authentication and key agreement using symmetric cryptography |
BS EN ISO 24534-4:2010+A1:2019
|
Automatic vehicle and equipment identification. Electronic registration identification (ERI) for vehicles Secure communications using asymmetrical techniques |
ISO 20038:2017
|
Banking and related financial services — Key wrap using AES |
ISO 21188:2018
|
Public key infrastructure for financial services — Practices and policy framework |
EN 13757-7:2018
|
Communication systems for meters - Part 7: Transport and security services |
ISO/IEC 11889-1:2015
|
Information technology Trusted platform module library Part 1: Architecture |
BS ISO/IEC 10118-2:2010
|
Information technology. Security techniques. Hash-functions Hash-functions using an n-bit block cipher |
ANSI X9.119-1 : 2016
|
RETAIL FINANCIAL SERVICES - REQUIREMENTS FOR PROTECTION OF SENSITIVE PAYMENT CARD DATA - PART 1: USING ENCRYPTION METHODS |
ISO/IEC 11889-2:2015
|
Information technology Trusted Platform Module Library Part 2: Structures |
IEC 62055-41:2014 RLV
|
Electricity metering – Payment systems – Part 41: Standard transfer specification (STS) – Application layer protocol for one-way token carrier systems |
CEN/TS 16702-1:2014
|
Electronic fee collection - Secure monitoring for autonomous toll systems - Part 1: Compliance checking |
OVE/ONORM EN 62734 : 2015
|
INDUSTRIAL NETWORKS - WIRELESS COMMUNICATION NETWORK AND COMMUNICATION PROFILES - ISA 100.11A (IEC 62734:2014) |
04/30040717 DC : DRAFT JUL 2004
|
ISO/IEC 18033-2 - INFORMATION TECHNOLOGY - ENCRYPTION ALGORITHMS - PART 2: ASYMMETRIC CIPHERS |
BS ISO/IEC 18028-4:2005
|
Information technology. Security techniques. IT network security Securing remote access |
15/30311322 DC : 0
|
BS ISO/IEC 29192-5 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - LIGHTWEIGHT CRYPTOGRAPHY - PART 5: HASH-FUNCTIONS |
BS ISO/IEC 16512-2:2016
|
Information technology. Relayed multicast protocol: Specification for simplex group applications |
17/30281253 DC : 0
|
BS ISO 21188 - PUBLIC KEY INFRASTRUCTURE FOR FINANCIAL SERVICES - PRACTICES AND POLICY FRAMEWORK |
16/30346333 DC : 0
|
BS EN 61162-460 - MARITIME NAVIGATION AND RADIOCOMMUNICATION EQUIPMENT AND SYSTEMS -DIGITAL INTERFACES - PART 460: MULTIPLE TALKERS AND MULTIPLE LISTENERS - ETHERNET INTERCONNECTION - SAFETY AND SECURITY |
PD CEN/TS 16702-2:2015
|
Electronic fee collection. Secure monitoring for autonomous toll systems Trusted recorder |
BS ISO/IEC 24745:2011
|
Information technology. Security techniques. Biometric information protection |
07/30163724 DC : 0
|
BS ISO/IEC 24727-4 - IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARDS PROGRAMMING INTERFACE - PART 4: API ADMINISTRATION |
16/30332188 DC : 0
|
BS ISO/IEC 29167-10 - INFORMATION TECHNOLOGY - AUTOMATIC IDENTIFICATION AND DATA CAPTURE TECHNIQUES - PART 10: CRYPTO SUITE AES-128 SECURITY SERVICES FOR AIR INTERFACE COMMUNICATIONS |
12/30228421 DC : 0
|
BS ISO/IEC 29192-4 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - LIGHTWEIGHT CRYPTOGRAPHY - PART 4: MECHANISMS USING ASYMMETRIC TECHNIQUES |
08/30180103 DC : DRAFT MAR 2008
|
BS EN 50136-1 - ALARM SYSTEMS - ALARM TRANSMISSION SYSTEMS - PART 1: GENERAL REQUIREMENTS FOR ALARM TRANSMISSION SYSTEMS |
BS ISO 20215:2015
|
Space data and information transfer systems. CCSDS cryptographic algorithms |
PD CEN/TS 16702-1:2014
|
Electronic fee collection. Secure monitoring for autonomous toll system Compliance checking |
DIN EN 14890-1:2009-03
|
APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES |
BS ISO/IEC 9797-1:2011
|
Information technology. Security techniques. Message authentication codes (MACs) Mechanisms using a block cipher |
14/30302807 DC : 0
|
BS ISO/IEC 11889-4 - INFORMATION TECHNOLOGY - TRUSTED PLATFORM MODULE - PART 4: SUPPORTING ROUTINES |
04/30040736 DC : DRAFT DEC 2004
|
ISO/IEC 18031 - INFORMATION TECHNOLOGY - RANDOM NUMBER GENERATION |
INCITS/ISO/IEC 18031 : 2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - RANDOM BIT GENERATION |
BS ISO/IEC 25185-1:2016
|
Identification cards. Integrated circuit card authentication protocols Protocol for Lightweight Authentication of Identity |
IEEE 1901-2010
|
IEEE Standard for Broadband over Power Line Networks: Medium Access Control and Physical Layer Specifications |
12/30255293 DC : 0
|
BS EN 14890-1 - APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES |
16/30345808 DC : 0
|
BS EN 419212-1 - APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 1: INTRODUCTION AND COMMON DEFINITIONS |
BS ISO/IEC 18033-5:2015
|
Information technology. Security techniques. Encryption algorithms Identity-based ciphers |
ISO/IEC 29192-5:2016
|
Information technology Security techniques Lightweight cryptography Part 5: Hash-functions |
CSA ISO/IEC 26907 : 2010
|
INFORMATION TECHNOLOGY - TELECOMMUNICATIONS AND INFORMATION EXCHANGE BETWEEN SYSTEMS - HIGH-RATE ULTRA-WIDEBAND PHY AND MAC STANDARD |
CAN/CSA-ISO/IEC 9797-1:12 (R2016)
|
Information technology - Security techniques - Message authentication codes (MACs) - Part 1: Mechanisms using a block cipher (Adopted ISO/IEC 9797-1:2011, second edition, 2011-03-01) |
CAN/CSA-ISO/IEC 10118-2:12 (R2016)
|
Information technology - Security techniques - Hash-functions - Part 2: Hash-functions using an n-bit block cipher (Adopted ISO/IEC 10118-2:2010, third edition, 2010-10-15) |
ANSI INCITS 410 : 2015
|
INFORMATION TECHNOLOGY - IDENTIFICATION CARDS - LIMITED USE (LU), PROXIMITY INTEGRATED CIRCUIT CARD (PICC) |
CAN/CSA-ISO/IEC 25185-1:18
|
Identification cards — Integrated circuit card authentication protocols — Part 1: Protocol for Lightweight Authentication of Identity (Adopted ISO/IEC 25185-1:2016, first edition, 2016-01-15) |
ISO/IEC 18013-3:2017
|
Information technology — Personal identification — ISO-compliant driving licence — Part 3: Access control, authentication and integrity validation |
14/30312433 DC : 0
|
BS ISO 20215 - SPACE DATA AND INFORMATION TRANSFER SYSTEMS - CCSDS CRYPTOGRAPHIC ALGORITHMS |
CAN/CSA-ISO/IEC 18031:13 (R2017)
|
Information technology - Security techniques - Random bit generation (Adopted ISO/IEC 18031:2011, second edition, 2011-11-15) |
BS EN 62734:2015
|
Industrial networks. Wireless communication network and communication profiles. ISA 100.11a |
DIN CEN ISO/TS 19299;DIN SPEC 74125:2016-02
|
ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK (ISO/TS 19299:2015) |
CSA ISO/IEC 18031 : 2013
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - RANDOM BIT GENERATION |
ISO/IEC 13156:2011
|
Information technology Telecommunications and information exchange between systems High rate 60 GHz PHY, MAC and PALs |
BS ISO/IEC 29167-10:2017
|
Information technology. Automatic identification and data capture techniques Crypto suite AES-128 security services for air interface communications |
ECMA 368 : 3ED 2008
|
HIGH RATE ULTRA WIDEBAND PHY AND MAC STANDARD |
INCITS/ISO/IEC 9798-6 : 2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 6: MECHANISMS USING MANUAL DATA TRANSFER |
ISO 15764:2004
|
Road vehicles Extended data link security |
ISO/IEC/IEEE 8802-15-6:2017
|
Information technology — Telecommunications and information exchange between systems — Local and metropolitan area networks — Specific requirements — Part 15-6: Wireless body area network |
I.S. EN ISO 13141:2015
|
ELECTRONIC FEE COLLECTION - LOCALISATION AUGMENTATION COMMUNICATION FOR AUTONOMOUS SYSTEMS (ISO 13141:2015) |
I.S. EN 61162-460:2015
|
MARITIME NAVIGATION AND RADIOCOMMUNICATION EQUIPMENT AND SYSTEMS - DIGITAL INTERFACES - PART 460: MULTIPLE TALKERS AND MULTIPLE LISTENERS - ETHERNET INTERCONNECTION - SAFETY AND SECURITY |
S.R. CEN/TS 16702-1:2014
|
ELECTRONIC FEE COLLECTION - SECURE MONITORING FOR AUTONOMOUS TOLL SYSTEMS - PART 1: COMPLIANCE CHECKING |
BS ISO/IEC 29192-4 : 2013
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - LIGHTWEIGHT CRYPTOGRAPHY - PART 4: MECHANISMS USING ASYMMETRIC TECHNIQUES |
CAN/CSA-ISO/IEC 23001-7:18
|
Information technology — MPEG systems technologies — Part 7: Common encryption in ISO base media file format files (Adopted ISO/IEC 23001-7:2016, third edition, 2016-02-15) |
CEN/TR 16968:2016
|
Electronic Fee Collection - Assessment of security measures for applications using Dedicated Short-Range Communication |
ISO/IEC 18031:2011
|
Information technology Security techniques Random bit generation |
ECMA 409 : 2ED 2015
|
NFC-SEC-02: NFC-SEC CRYPTOGRAPHY STANDARD USING ECDH-256 AND AES-GCM |
BIS IS 15116 : 2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MODES OF OPERATION FOR AN N-BIT BLOCK CIPHER |
S.R. CEN ISO/TS 19299:2015
|
ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK (ISO/TS 19299:2015) |
BS ISO/IEC 10116:2017
|
Information technology. Security techniques. Modes of operation for an n-bit block cipher |
CAN/CSA-ISO/IEC 11889-4:16
|
Information technology Trusted Platform Module Library Part 4: Supporting Routines (Adopted ISO/IEC 11889-4:2015, second edition, 2015-12-15) |
S.R. CEN ISO/TS 21719-2:2018
|
ELECTRONIC FEE COLLECTION - PERSONALIZATION OF ON-BOARD EQUIPMENT (OBE) - PART 2: USING DEDICATED SHORT-RANGE COMMUNICATION (ISO/TS 21719-2:2018) |
ISO 24534-4:2010
|
Automatic vehicle and equipment identification — Electronic registration identification (ERI) for vehicles — Part 4: Secure communications using asymmetrical techniques |
ISO/IEC 23001-7:2016
|
Information technology — MPEG systems technologies — Part 7: Common encryption in ISO base media file format files |
ISO/TR 14742:2010
|
Financial services Recommendations on cryptographic algorithms and their use |
ISO/TR 19038:2005
|
Banking and related financial services Triple DEA Modes of operation Implementation guidelines |
I.S. EN 62320-2:2017
|
MARITIME NAVIGATION AND RADIOCOMMUNICATION EQUIPMENT AND SYSTEMS - AUTOMATIC IDENTIFICATION SYSTEM (AIS) - PART 2: AIS ATON STATIONS - OPERATIONAL AND PERFORMANCE REQUIREMENTS, METHODS OF TESTING AND REQUIRED TEST RESULTS |
ISO/TS 19299:2015
|
Electronic fee collection Security framework |
IEC 62734:2014
|
Industrial networks - Wireless communication network and communication profiles - ISA 100.11a |
NASA CCSDS 352.0-B : ISSUE 1
|
CCSDS CRYPTOGRAPHIC ALGORITHMS |
EN 62320-2:2017
|
MARITIME NAVIGATION AND RADIOCOMMUNICATION EQUIPMENT AND SYSTEMS - AUTOMATIC IDENTIFICATION SYSTEM (AIS) - PART 2: AIS ATON STATIONS - OPERATIONAL AND PERFORMANCE REQUIREMENTS, METHODS OF TESTING AND REQUIRED TEST RESULTS (IEC 62320-2:2016) |
UNI EN 419212-1 : 2015
|
APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES |
UNI EN 15509 : 2014
|
ELECTRONIC FEE COLLECTION - INTEROPERABILITY APPLICATION PROFILE FOR DSRC |
UNI CEI ISO/IEC 18013-3 : 2011
|
INFORMATION TECHNOLOGY - PERSONAL IDENTIFICATION - ISO-COMPLIANT DRIVING LICENCE - PART 3: ACCESS CONTROL, AUTHENTICATION AND INTEGRITY VALIDATION |
INCITS/ISO/IEC 11889-4 : 2009(R2014)
|
INFORMATION TECHNOLOGY - TRUSTED PLATFORM MODULE - PART 4: COMMANDS |
09/30169518 DC : 0
|
BS ISO/IEC 10118-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - HASH-FUNCTIONS - PART 2: HASH-FUNCTIONS USING AN N-BIT BLOCK CIPHER |
BS 8593:2017
|
Code of practice for the deployment and use of Body Worn Video (BWV) |
BS ISO 11568-2:2012
|
Financial services. Key management (retail) Symmetric ciphers, their key management and life cycle |
PREN 419212-1 : DRAFT 2016
|
APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 1: INTRODUCTION AND COMMON DEFINITIONS |
14/30302798 DC : 0
|
BS ISO/IEC 11889-1 - INFORMATION TECHNOLOGY - TRUSTED PLATFORM MODULE - PART 1: ARCHITECTURE |
BS ISO/IEC 11770-5:2011
|
Information technology Security techniques. Key management Group key management |
ISO/IEC 24771:2014
|
Information technology Telecommunications and information exchange between systems MAC/PHY standard for ad hoc wireless network to support QoS in an industrial work environment |
BS ISO/IEC 11889-4:2009
|
Information technology. Trusted platform module Commands |
BIS IS/ISO 21188 : 2006
|
PUBLIC KEY INFRASTRUCTURE FOR FINANCIAL SERVICES - PRACTICES AND POLICY FRAMEWORK |
10/30136309 DC : 0
|
BS ISO/IEC 24745 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - BIOMETRIC INFORMATION PROTECTION |
ISO/IEC 29192-4:2013
|
Information technology — Security techniques — Lightweight cryptography — Part 4: Mechanisms using asymmetric techniques |
BS EN 419212-2:2017
|
Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services Signature and Seal Services |
UNI CEN/TS 16702-1 : 2014
|
ELECTRONIC FEE COLLECTION - SECURE MONITORING FOR AUTONOMOUS TOLL SYSTEMS - PART 1: COMPLIANCE CHECKING |
BS ISO/IEC 11889-2:2009
|
Information technology. Trusted platform module Design principles |
BS ISO/IEC 23001-7:2016
|
Information technology. MPEG systems technologies Common encryption in ISO base media file format files |
UNE-EN ISO 24534-4:2012
|
Automatic vehicle and equipment identification - Electronic Registration Identification (ERI) for vehicles - Part 4: Secure communications using asymmetrical techniques (ISO 24534-4:2010) |
DIN CEN ISO/TS 19299;DIN SPEC 74125:2016-02
|
ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK (ISO/TS 19299:2015) |
BS EN 61162-460:2015
|
Maritime navigation and radiocommunication equipment and systems. Digital interfaces Multiple talkers and multiple listeners. Ethernet interconnection. Safety and security |
16/30345811 DC : 0
|
BS EN 419212-2 - APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 2: SIGNATURE AND SEAL SERVICES |
14/30302801 DC : 0
|
BS ISO/IEC 11889-2 - INFORMATION TECHNOLOGY - TRUSTED PLATFORM MODULE - PART 2: STRUCTURES |
BS ISO 20038:2017
|
Banking and related financial services. Key wrap using AES |
PD CEN ISO/TS 19299:2015
|
Electronic fee collection. Security framework |
07/30173155 DC : 0
|
BS ISO/IEC 9798-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 2: MECHANISMS USING SYMMETRIC ENCIPHERMENT ALGORITHMS |
BS ISO/IEC 9797-3:2011
|
Information technology. Security techniques. Message Authentication Codes (MACs) Mechanisms using a universal hash-function |
ECMA 392 : 2ED 2012
|
MAC AND PHY FOR OPERATION IN TV WHITE SPACE |
NF EN 14890-1 : 2009
|
APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES |
04/30093313 DC : DRAFT JUN 2004
|
ISO/IEC 9798-6 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 6: MECHANISMS USING MANUAL DATA TRANSFER |
CSA ISO/IEC 9797-1:2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MESSAGE AUTHENTICATION CODES (MACS) - PART 1: MECHANISMS USING A BLOCK CIPHER |
UNI CEN/TS 16439 : 2013
|
ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK |
CSA ISO/IEC 26907 : 2010 : R2015
|
INFORMATION TECHNOLOGY - TELECOMMUNICATIONS AND INFORMATION EXCHANGE BETWEEN SYSTEMS - HIGH-RATE ULTRA-WIDEBAND PHY AND MAC STANDARD |
I.S. EN 13757-7:2018
|
COMMUNICATION SYSTEMS FOR METERS - PART 7: TRANSPORT AND SECURITY SERVICES |
CAN/CSA-ISO/IEC 29167-14:16
|
Information technology Automatic identification and data capture techniques Part 14: Crypto suite AES OFB security services for air interface communications (Adopted ISO/IEC 29167-14:2015, first edition, 2015-10-15) |
ANSI INCITS 422 : 2007
|
APPLICATION PROFILE FOR COMMERCIAL BIOMETRIC PHYSICAL ACCESS CONTROL |
CAN/CSA-ISO/IEC 9798-6:12 (R2016)
|
Information technology - Security techniques - Entity authentication - Part 6: Mechanisms using manual data transfer (Adopted ISO/IEC 9798-6:2010, second edition, 2010-12-01) |
INCITS/ISO/IEC 10116 : 2008
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MODES OF OPERATION FOR AN N-BIT BLOCK CIPHER |
ISO/IEC 24767-2:2009
|
Information technology Home network security Part 2: Internal security services: Secure Communication Protocol for Middleware (SCPM) |
ISO/IEC/IEEE 8802-1X:2013
|
Telecommunications and exchange between information technology systems Requirements for local and metropolitan area networks Part 1X: Port-based network access control |
ISO/IEC 18033-5:2015
|
Information technology Security techniques Encryption algorithms Part 5: Identity-based ciphers |
S.R. CEN/TR 17167:2018
|
COMMUNICATION SYSTEM FOR METERS - ACCOMPANYING TR TO EN 13757-2,-3 AND -7, EXAMPLES AND SUPPLEMENTARY INFORMATION |
ISO/IEC 19772:2009
|
Information technology Security techniques Authenticated encryption |
UNI EN ISO 24534-4 : 2011
|
AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES - PART 4: SECURE COMMUNICATIONS USING ASYMMETRICAL TECHNIQUES |
ISO/IEC 9798-6:2010
|
Information technology Security techniques Entity authentication Part 6: Mechanisms using manual data transfer |
ISO/IEC 26907:2009
|
Information technology Telecommunications and information exchange between systems High-rate ultra-wideband PHY and MAC standard |
ISO/IEC 14543-5-1:2010
|
Information technology Home electronic system (HES) architecture Part 5-1: Intelligent grouping and resource sharing for Class 2 and Class 3 Core protocol |
CEN ISO/TS 21719-2:2018
|
Electronic fee collection - Personalization of on-board equipment (OBE) - Part 2: Using dedicated short-range communication (ISO/TS 21719-2:2018) |
I.S. EN ISO 24534-4:2010&A1:2019
|
AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES - PART 4: SECURE COMMUNICATIONS USING ASYMMETRICAL TECHNIQUES |
ISO/IEC 11889-4:2015
|
Information technology Trusted Platform Module Library Part 4: Supporting Routines |
IEC 62320-2 REDLINE : 2ED 2016
|
MARITIME NAVIGATION AND RADIOCOMMUNICATION EQUIPMENT AND SYSTEMS - AUTOMATIC IDENTIFICATION SYSTEM (AIS) - PART 2: AIS ATON STATIONS - OPERATIONAL AND PERFORMANCE REQUIREMENTS, METHODS OF TESTING AND REQUIRED TEST RESULTS |
ISO/IEC 15444-8:2007
|
Information technology — JPEG 2000 image coding system: Secure JPEG 2000 — Part 8: |
IEC 62320-2:2016
|
Maritime navigation and radiocommunication equipment and systems - Automatic identification system (AIS) - Part 2: AIS AtoN Stations - Operational and performance requirements, methods of testing and required test results |
EN 15509:2014
|
Electronic fee collection - Interoperability application profile for DSRC |
EN 419212-1:2017
|
Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services - Part 1: Introduction and common definitions |
EN 419212-2:2017
|
Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services - Part 2: Signature and Seal Services |
EN 14890-1:2008
|
Application Interface for smart cards used as Secure Signature Creation Devices - Part 1: Basic services |
BS EN 14890-1:2008
|
Application interface for smart cards used as secure signature creation devices Basic services |
BS ISO/IEC 19772:2009
|
Information technology. Security techniques. Authenticated encryption |
BS ISO/IEC 11889-1:2009
|
Information technology. Trusted platform module Overview |
11/30231411 DC : 0
|
BS ISO 16609 - FINANCIAL SERVICES - REQUIREMENTS FOR MESSAGE AUTHENTICATION USING SYMMETRIC TECHNIQUES |
BS EN 62320-2:2017
|
Maritime navigation and radiocommunication equipment and systems. Automatic identification system (AIS) AIS AtoN Stations. Operational and performance requirements, methods of testing and required test results |
13/30266949 DC : 0
|
BS EN 61162-460 ED1.0 - MARITIME NAVIGATION AND RADIOCOMMUNICATION EQUIPMENT AND SYSTEMS - DIGITAL INTERFACE - PART 460: MULTIPLE TAKER AND MULTIPLE LISTENERS - ETHERNET INTERCONNECTION - SAFETY AND SECURITY |
14/30249464 DC : 0
|
BS ISO/IEC 18033-5 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 5: IDENTITY-BASED CIPHERS |
15/30317654 DC : 0
|
BS ISO/IEC 23001-7 - INFORMATION TECHNOLOGY - MPEG SYSTEMS TECHNOLOGIES - PART 7: COMMON ENCRYPTION IN ISO BASE MEDIA FILE FORMAT FILES |
04/30082429 DC : DRAFT JUL 2004
|
ISO/IEC 18033-4 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 4: STREAM CIPHERS |
14/30285138 DC : 0
|
BS ISO/IEC 29167-14 - INFORMATION TECHNOLOGY - AUTOMATIC IDENTIFICATION AND DATA CAPTURE TECHNIQUES - PART 14: CRYPTO SUITE AES OFB SECURITY SERVICES FOR AIR INTERFACE COMMUNICATIONS |
BS ISO/IEC 18033-2 : 2006
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 2: ASYMMETRIC CIPHERS |
IEEE 802.1X-2010
|
IEEE Standard for Local and metropolitan area networks--Port-Based Network Access Control |
ECMA 411 : 3ED 2017
|
NFC-SEC-04: NFC-SEC ENTITY AUTHENTICATION AND KEY AGREEMENT USING SYMMETRIC CRYPTOGRAPHY |
INCITS/ISO/IEC 29192-4 : 2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - LIGHTWEIGHT CRYPTOGRAPHY - PART 4: MECHANISMS USING ASYMMETRIC TECHNIQUES |
PD CEN/TS 16439:2013
|
Electronic fee collection. Security framework |
CAN/CSA-ISO/IEC 16512-2:18
|
Information technology — Relayed multicast protocol: Specification for simplex group applications (Adopted ISO/IEC 16512-2:2016, third edition, 2016-04-01) |
BS ISO/IEC 9798-6:2010
|
Information technology. Security techniques. Entity authentication Mechanisms using manual data transfer |
17/30345717 DC : 0
|
BS 8593 - CODE OF PRACTICE FOR THE DEPLOYMENT AND USE OF BODY WORN VIDEO (BWV) |
07/30105115 DC : 0
|
BS ISO/IEC 19772 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - AUTHENTICATED ENCRYPTION |
INCITS/ISO/IEC 18028-4 : 2005
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - IT NETWORK SECURITY - PART 4: SECURING REMOTE ACCESS |
CAN/CSA-ISO/IEC 11889-2:16
|
Information technology Trusted Platform Module Library Part 2: Structures (Adopted ISO/IEC 11889-2:2015, second edition, 2015-12-15) |
CSA ISO/IEC 10118-2 : 2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - HASH-FUNCTIONS - PART 2: HASH-FUNCTIONS USING AN N-BIT BLOCK CIPHER |
IEC 62055-41:2018 RLV
|
Electricity metering - Payment systems - Part 41: Standard transfer specification (STS) - Application layer protocol for one-way token carrier systems |
CAN/CSA-ISO/IEC 11889-1:16
|
Information technology Trusted Platform Module Library Part 1: Architecture (Adopted ISO/IEC 11889-1:2015, second edition, 2015-12-15) |
S.R. CEN/TR 16968:2016
|
ELECTRONIC FEE COLLECTION - ASSESSMENT OF SECURITY MEASURES FOR APPLICATIONS USING DEDICATED SHORT-RANGE COMMUNICATION |
ISO/IEC 10116:2017
|
Information technology — Security techniques — Modes of operation for an n-bit block cipher |
ISO/IEC 4909:2006
|
Identification cards Financial transaction cards Magnetic stripe data content for track 3 |
ISO 16609:2012
|
Financial services — Requirements for message authentication using symmetric techniques |
ISO/IEC 13157-3:2016
|
Information technology Telecommunications and information exchange between systems NFC Security Part 3: NFC-SEC cryptography standard using ECDH-256 and AES-GCM |
ISO 9564-2:2014
|
Financial services — Personal Identification Number (PIN) management and security — Part 2: Approved algorithms for PIN encipherment |
ISO/IEC 24745:2011
|
Information technology Security techniques Biometric information protection |
IEC 62055-41 REDLINE : 3ED 2018
|
ELECTRICITY METERING - PAYMENT SYSTEMS - PART 41: STANDARD TRANSFER SPECIFICATION (STS) - APPLICATION LAYER PROTOCOL FOR ONE-WAY TOKEN CARRIER SYSTEMS |
ISO/IEC 9797-1:2011
|
Information technology Security techniques Message Authentication Codes (MACs) Part 1: Mechanisms using a block cipher |
EN 62320-2:2017
|
MARITIME NAVIGATION AND RADIOCOMMUNICATION EQUIPMENT AND SYSTEMS - AUTOMATIC IDENTIFICATION SYSTEM (AIS) - PART 2: AIS ATON STATIONS - OPERATIONAL AND PERFORMANCE REQUIREMENTS, METHODS OF TESTING AND REQUIRED TEST RESULTS (IEC 62320-2:2016) |
BS EN 15509:2014
|
Electronic fee collection. Interoperability application profile for DSRC |
ISO 13141:2015
|
Electronic fee collection — Localisation augmentation communication for autonomous systems |
CEN/TS 16439:2013
|
Electronic fee collection - Security framework |
EN ISO 13141:2015/A1:2017
|
ELECTRONIC FEE COLLECTION - LOCALISATION AUGMENTATION COMMUNICATION FOR AUTONOMOUS SYSTEMS (ISO 13141:2015/AMD 1:2017) |