ISO/IEC/IEEE 8802-22:2015
|
Information technology Telecommunications and information exchange between systems Local and metropolitan area networks Specific requirements Part 22: Cognitive Wireless RAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Policies and Procedures for Operation in the TV Bands |
ANSI X9.98 : 2010(R2017)
|
FINANCIAL SERVICES - LATTICE-BASED POLYNOMIAL PUBLIC KEY ESTABLISHMENT ALGORITHM FOR THE FINANCIAL SERVICES INDUSTRY |
ANSI X9.80 : 2005(R2013)
|
PRIME NUMBER GENERATION, PRIMALITY TESTING, AND PRIMALITY CERTIFICATES |
07/30135624 DC : 0
|
BS ISO/IEC 15946-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC TECHNIQUES BASED ON ELLIPTIC CURVES - PART 1: GENERAL |
BS ISO/IEC 9796-3:2006
|
Information technology. Security techniques. Digital signature schemes giving message recovery Discrete logarithm based mechanisms |
ANSI INCITS 467 : 2011
|
INFORMATION TECHNOLOGY - SCSI STREAM COMMANDS - 3 (SSC-3) |
ANSI X9.96 : 2004
|
FINANCIAL SERVICES - XML CRYPTOGRAPHIC MESSAGE SYNTAX (XCMS) |
INCITS/ISO/IEC 15946-2 : 2002
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC TECHNIQUES BASED ON ELLIPTIC CURVES - PART 2: DIGITAL SIGNATURES |
PD CEN/TS 15480-2:2012
|
Identification card systems. European Citizen Card Logical data structures and security services |
BS ISO/IEC 15946-3:2002
|
Information technology. Security techniques. Cryptographic techniques based on elliptic curves Key establishment |
INCITS/ISO/IEC 15946-3 : 2002
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC TECHNIQUES BASED ON ELLIPTIC CURVES - PART 3: KEY ESTABLISHMENT |
IEEE 1363.3-2013
|
IEEE Standard for Identity-Based Cryptographic Techniques using Pairings |
CSA ISO/IEC 15946-2 : 2004
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC TECHNIQUES BASED ON ELLIPTIC CURVES - PART 2: DIGITAL SIGNATURES |
I.S. EN 62734:2015
|
INDUSTRIAL NETWORKS - WIRELESS COMMUNICATION NETWORK AND COMMUNICATION PROFILES - ISA 100.11A |
S.R. CEN/TS 15480-2:2012
|
IDENTIFICATION CARD SYSTEMS - EUROPEAN CITIZEN CARD - PART 2: LOGICAL DATA STRUCTURES AND SECURITY SERVICES |
UNI CEN/TS 15480-2 : 2012
|
IDENTIFICATION CARD SYSTEMS - EUROPEAN CITIZEN CARD - PART 2: LOGICAL DATA STRUCTURES AND SECURITY SERVICES |
ANSI X9.44 : 2007
|
FINANCIAL SERVICES - PUBLIC-KEY CRYPTOGRAPHY FOR THE FINANCIAL SERVICES INDUSTRY - KEY ESTABLISHMENT USING INTEGER FACTORIZATION CRYPTOGRAPHY |
EN 62734:2015
|
Industrial networks - Wireless communication network and communication profiles - ISA 100.11a |
CEN/TS 15480-2:2012
|
Identification card systems - European Citizen Card - Part 2: Logical data structures and security services |
12/30259506 DC : DRAFT JAN 2012
|
BS EN 62734 - INDUSTRIAL COMMUNICATION NETWORKS - FIELDBUS SPECIFICATIONS - WIRELESS SYSTEMS FOR INDUSTRIAL AUTOMATION: PROCESS CONTROL AND RELATED APPLICATIONS (BASED ON ISA 100.11A) |
ANSI INCITS 516 : 2013(R2018)
|
INFORMATION TECHNOLOGY - SCSI STREAM COMMANDS - 4 (SSC-4) |
02/652466 DC : DRAFT MAY 2002
|
ISO/IEC FCD 15946-4 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC TECHNIQUES BASED ON ELLIPTIC CURVES - PART 4: DIGITAL SIGNATURES GIVING MESSAGE RECOVERY |
15/30318285 DC : 0
|
BS ISO/IEC 15946-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC TECHNIQUES BASED ON ELLIPTIC CURVES - PART 1: GENERAL |
ANSI X9 TR 39 : 2009
|
TG-3 RETAIL FINANCIAL SERVICES COMPLIANCE GUIDELINE - PART 1: PIN SECURITY AND KEY MANAGEMENT |
DD CEN/TS 15480-2:2007
|
Identification card systems. European Citizen Card Logical data structures and card services |
BS ISO/IEC 15946-1:2016
|
Information technology. Security techniques. Cryptographic techniques based on elliptic curves General |
ANSI X9.92-1 : 2009
|
PUBLIC KEY CRYPTOGRAPHY FOR THE FINANCIAL SERVICES INDUSTRY - DIGITAL SIGNATURE ALGORITHMS GIVING PARTIAL MESSAGE RECOVERY - PART 1: ELLIPTIC CURVE PINTSOV-VANSTONE SIGNATURES (ECPVS) |
S.R. CEN/TS 15480-3:2014
|
IDENTIFICATION CARD SYSTEMS - EUROPEAN CITIZEN CARD - PART 3: EUROPEAN CITIZEN CARD INTEROPERABILITY USING AN APPLICATION INTERFACE |
ARINC 823-1 : 2007
|
DATALINK SECURITY - PART 1: ACARS MESSAGE SECURITY |
ISO/IEC 15946-4:2004
|
Information technology Security techniques Cryptographic techniques based on elliptic curves Part 4: Digital signatures giving message recovery |
CSA ISO/IEC 15946-3 : 2004
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC TECHNIQUES BASED ON ELLIPTIC CURVES - PART 3: KEY ESTABLISHMENT |
BS ISO/IEC/IEEE 8802-22:2015
|
Information technology. Telecommunications and information exchange between systems. Local and metropolitan area networks. Specific requirements Cognitive Wireless RAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Policies and Procedures for Operation in the TV Bands |
PD CEN/TS 15480-3:2014
|
Identification card systems. European Citizen Card European Citizen Card Interoperability using an application interface |
BS ISO/IEC 15946-4:2004
|
Information technology. Security techniques. Cryptographic techniques based on elliptic curves Digital signatures giving message recovery |
10/30218910 DC : 0
|
BS ISO/IEC IEEE 8802-15-4 - INFORMATION TECHNOLOGY - TELECOMMUNICATIONS AND INFORMATION EXCHANGE BETWEEN SYSTEMS - LOCAL AND METROPOLITAN AREA NETWORKS - SPECIFIC REQUIREMENTS - PART 15-4: WIRELESS MEDIUM ACCESS CONTROL (MAC) AND PHYSICAL LAYER (PHY) SPECIFICATIONS FOR LOW-RATE WIRELESS PERSONAL AREA NETWORKS (WPANS) |
07/30161079 DC : 0
|
BS EN 14890-1 - APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES |
INCITS/ISO/IEC 15946-1 : 2002
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC TECHNIQUES BASED ON ELLIPTIC CURVES - PART 1: GENERAL |
BS ISO/IEC 11770-3 : 2015
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 3: MECHANISMS USING ASYMMETRIC TECHNIQUES |
IEC 62734:2014
|
Industrial networks - Wireless communication network and communication profiles - ISA 100.11a |
ANSI X9.65 : 2004
|
TRIPLE DATA ENCRYPTION ALGORITHM (TDEA), IMPLEMENTATION STANDARD |
04/30117200 DC : DRAFT DEC 2004
|
ISO/IEC 9796-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DIGITAL SIGNATURE SCHEMES GIVING MESSAGE RECOVERY - PART 3: DISCRETE LOGARITHM BASED MECHANISMS |
CSA ISO/IEC 15946-4 : 2005
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC TECHNIQUES BASED ON ELLIPTIC CURVES - PART 4: DIGITAL SIGNATURES GIVING MESSAGE RECOVERY |
CAN/CSA-ISO/IEC 11770-3:16
|
Information technology - Security techniques - Key management - Part 3: Mechanisms using asymmetric techniques (Adopted ISO/IEC 11770-3:2015, third edition, 2015-08-01) |
BS EN 62734:2015
|
Industrial networks. Wireless communication network and communication profiles. ISA 100.11a |
ISO/IEC 9796-3:2006
|
Information technology — Security techniques — Digital signature schemes giving message recovery — Part 3: Discrete logarithm based mechanisms |
07/30161082 DC : 0
|
BS EN 14890-2 - APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 2: ADDITIONAL SERVICES |
ANSI X9/TG-3 : 2006
|
RETAIL FINANCIAL SERVICES COMPLIANCE GUIDELINE - ONLINE PIN SECURITY AND KEY MANAGEMENT |
ISO/IEC 14776-333:2013
|
Information technology Small Computer System Interface (SCSI) Part 333: SCSI Stream Commands - 3 (SSC-3) |
IEC PAS 62734:2012
|
Industrial communication networks - Fieldbus specifications - Wireless systems for industrial automation: process control and related applications |
PD IEC/PAS 62734:2012
|
Industrial communication networks. Fieldbus specifications. Wireless systems for industrial automation: process control and related applications |
UNI CEN/TS 15480-3 : 2014
|
IDENTIFICATION CARD SYSTEMS - EUROPEAN CITIZEN CARD - PART 3: EUROPEAN CITIZEN CARD INTEROPERABILITY USING AN APPLICATION INTERFACE |
TR 103 200 : 1.1.1
|
METHODS FOR TESTING AND SPECIFICATION (MTS); EPASSPORT READERS INTEROPERABILITY SUPPORT; FRAMEWORK FOR DEVELOPING CONFORMANCE TEST SPECIFICATIONS |
IEEE 802.15.4-2011
|
IEEE Standard for Local and metropolitan area networks--Part 15.4: Low-Rate Wireless Personal Area Networks (LR-WPANs) |
13/30257954 DC : 0
|
BS ISO/IEC 11770-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 3: MECHANISMS USING ASYMMETRIC TECHNIQUES |
DD CEN/TS 15480-3:2010
|
Identification card systems. European citizen card European citizen card interoperability using an application interface |
BS ISO/IEC 15946-2:2002
|
Information technology. Security techniques. Cryptographic techniques based on elliptic curves Digital signatures |
07/30161232 DC : 0
|
BS ISO/IEC 11770-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 3: MECHANISMS USING ASYMMETRIC TECHNIQUES |
CAN/CSA-ISO/IEC 15946-1:18
|
Information technology - Security techniques - Cryptographic techniques based on elliptic curves - Part 1: General (Adopted ISO/IEC 15946-1:2016, third edition, 2016-07-01) |
CAN/CSA-ISO/IEC/IEEE 8802-22:16
|
Information technology Telecommunications and information exchange between systems Local and metropolitan area networks Specific requirements Part 22: Cognitive Wireless RAN Medium Access Control (MCA) and Physical Layer (PHY) Specifications: Policies and Procedures for Operation in the TV Bands (Adopted ISO/IEC/IEEE 8802-22:2015, first edition, 2015-05-01) |
IEEE 802.22-2011
|
IEEE Standard for Information technology-- Local and metropolitan area networks-- Specific requirements-- Part 22: Cognitive Wireless RAN Medium Access Control (MAC) and Physical Layer (PHY) specifications: Policies and procedures for operation in the TV Bands |
ISO/IEC/IEEE 8802-15-4:2018
|
Information technology — Telecommunications and information exchange between systems — Local and metropolitan area networks — Specific requirements — Part 15-4: Wireless medium access control (MAC) and physical layer (PHY) specifications for low-rate wireless personal area networks (WPANs) |
ISO/IEC 15946-2:2002
|
Information technology Security techniques Cryptographic techniques based on elliptic curves Part 2: Digital signatures |
ISO/IEC 11770-3:2015
|
Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques |
ISO/IEC 15946-1:2016
|
Information technology Security techniques Cryptographic techniques based on elliptic curves Part 1: General |
ISO/IEC 15946-3:2002
|
Information technology Security techniques Cryptographic techniques based on elliptic curves Part 3: Key establishment |
CEN/TS 15480-3:2014
|
Identification card systems - European Citizen Card - Part 3: European Citizen Card Interoperability using an application interface |