ISO/IEC 18031:2011
|
Information technology Security techniques Random bit generation
|
ISO/IEC 19772:2009
|
Information technology Security techniques Authenticated encryption
|
ISO/IEC 26907:2009
|
Information technology Telecommunications and information exchange between systems High-rate ultra-wideband PHY and MAC standard
|
ISO 18435-2:2012
|
Industrial automation systems and integration — Diagnostics, capability assessment and maintenance applications integration — Part 2: Descriptions and definitions of application domain matrix elements
|
ISO/IEC 18033-1:2015
|
Information technology Security techniques Encryption algorithms Part 1: General
|
ISO/IEC 7498-3:1997
|
Information technology Open Systems Interconnection Basic Reference Model: Naming and addressing
|
ISO/IEC 9646-7:1995
|
Information technology Open Systems Interconnection Conformance testing methodology and framework Part 7: Implementation Conformance Statements
|
ISO/IEC 7498-1:1994
|
Information technology Open Systems Interconnection Basic Reference Model: The Basic Model
|
IEC TS 62443-1-1:2009
|
Industrial communication networks - Network and system security - Part 1-1: Terminology, concepts and models
|
ISA 100.11A : 2011
|
WIRELESS SYSTEMS FOR INDUSTRIAL AUTOMATION: PROCESS CONTROL AND RELATED APPLICATIONS
|
ISO 2382-12:1988
|
Information processing systems Vocabulary Part 12: Peripheral equipment
|
ISO 11568-2:2012
|
Financial services — Key management (retail) — Part 2: Symmetric ciphers, their key management and life cycle
|
NAMUR NE 107 : 2017
|
SELF-MONITORING AND DIAGNOSIS OF FIELD DEVICES
|
ISO/IEC 11770-2:2008
|
Information technology Security techniques Key management Part 2: Mechanisms using symmetric techniques
|
IEC 62591:2016
|
Industrial networks - Wireless communication network and communication profiles - WirelessHART<sup>TM</sup>
|
IEC TR 62390:2005
|
Common automation device - Profile guideline
|
IEEE 802.3-2012
|
IEEE Standard for Ethernet
|
IEEE 802.15.4-2011
|
IEEE Standard for Local and metropolitan area networks--Part 15.4: Low-Rate Wireless Personal Area Networks (LR-WPANs)
|
EN 300 440-1 : 1.6.1
|
ELECTROMAGNETIC COMPATIBILITY AND RADIO SPECTRUM MATTERS (ERM); SHORT RANGE DEVICES; RADIO EQUIPMENT TO BE USED IN THE 1 GHZ TO 40 GHZ FREQUENCY RANGE; PART 1: TECHNICAL CHARACTERISTICS AND TEST METHODS
|
ISO/IEC 18033-2:2006
|
Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers
|
ISO/IEC 18033-3:2010
|
Information technology Security techniques Encryption algorithms Part 3: Block ciphers
|
IEC TS 62351-2:2008
|
Power systems management and associated information exchange - Data and communications security - Part 2: Glossary of terms
|
IEEE 802.1Q-2014
|
IEEE Standard for Local and metropolitan area networks--Bridges and Bridged Networks
|
EN 300 328-1 : 1.3.1
|
ELECTROMAGNETIC COMPATIBILITY AND RADIO SPECTRUM MATTERS (ERM); WIDEBAND TRANSMISSION SYSTEMS; DATA TRANSMISSION EQUIPMENT OPERATING IN THE 2,4 GHZ ISM BAND AND USING SPREAD SPECTRUM MODULATION TECHNIQUES; PART 1: TECHNICAL CHARACTERISTICS AND TEST CONDITIONS
|
IEEE 802.11-2016
|
IEEE Standard for Information technology--Telecommunications and information exchange between systems Local and metropolitan area networks--Specific requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications
|
ISO/IEC 19790:2012
|
Information technology — Security techniques — Security requirements for cryptographic modules
|
ISO/IEC 10731:1994
|
Information technology Open Systems Interconnection Basic Reference Model Conventions for the definition of OSI services
|
ISO/IEC/IEEE 60559:2011
|
Information technology Microprocessor Systems Floating-Point arithmetic
|
IEC 62657-2:2017
|
Industrial communication networks - Wireless communication networks - Part 2: Coexistence management
|
NAMUR NE 105 : 2016
|
SPECIFICATIONS FOR INTEGRATING FIELDBUS DEVICES IN ENGINEERING TOOLS FOR FIELD DEVICES
|
ISO/IEC 10181-1:1996
|
Information technology Open Systems Interconnection Security frameworks for open systems: Overview
|
FIPS PUB 197 : 2001
|
ADVANCED ENCRYPTION STANDARD (AES)
|
IEC 62601:2015
|
Industrial networks - Wireless communication network and communication profiles - WIA-PA
|
IEC 61512-1:1997
|
Batch control - Part 1: Models and terminology
|
IEC 62264-1:2013
|
Enterprise-control system integration - Part 1: Models and terminology
|
IEC 61804-3:2015
|
Function Blocks (FB) for process control and Electronic Device Description Language (EDDL) - Part 3: EDDL syntax and semantics
|
ISO/IEC 2375:2003
|
Information technology — Procedure for registration of escape sequences and coded character sets
|
IEEE 802.16-2012
|
IEEE Standard for Air Interface for Broadband Wireless Access Systems
|
ISO/IEC 9796-2:2010
|
Information technology Security techniques Digital signature schemes giving message recovery Part 2: Integer factorization based mechanisms
|
ISO/IEC 646:1991
|
Information technology ISO 7-bit coded character set for information interchange
|
FIPS PUB 186 : 0
|
DIGITAL SIGNATURE STANDARD (DSS)
|
ISO/IEC 9797-1:2011
|
Information technology Security techniques Message Authentication Codes (MACs) Part 1: Mechanisms using a block cipher
|
ISO/IEC 10118-3:2004
|
Information technology Security techniques Hash-functions Part 3: Dedicated hash-functions
|
ISO 3166-1:2013
|
Codes for the representation of names of countries and their subdivisions Part 1: Country codes
|
ISA TR100.00.01 : 2006
|
THE AUTOMATION ENGINEER'S GUIDE TO WIRELESS TECHNOLOGY - PART 1: THE PHYSICS OF RADIO, A TUTORIAL
|
ISO 21188:2006
|
Public key infrastructure for financial services Practices and policy framework
|
ISO/IEC 2382-14:1997
|
Information technology Vocabulary Part 14: Reliability, maintainability and availability
|
ISO 11568-4:2007
|
Banking — Key management (retail) — Part 4: Asymmetric cryptosystems — Key management and life cycle
|
ISO/IEC 10118-2:2010
|
Information technology Security techniques Hash-functions Part 2: Hash-functions using an n-bit block cipher
|
ANSI X9.63 : 2011
|
FINANCIAL SERVICES - PUBLIC KEY CRYPTOGRAPHY FOR THE FINANCIAL SERVICES INDUSTRY, KEY AGREEMENT AND KEY TRANSPORT USING ELLIPTIC CURVE CRYPTOGRAPHY
|
ISO/IEC 7498-4:1989
|
Information processing systems Open Systems Interconnection Basic Reference Model Part 4: Management framework
|
ISO/IEC 9797-2:2011
|
Information technology Security techniques Message Authentication Codes (MACs) Part 2: Mechanisms using a dedicated hash-function
|
ISO/IEC 10116:2017
|
Information technology — Security techniques — Modes of operation for an n-bit block cipher
|
ISO/IEC 27000:2016
|
Information technology Security techniques Information security management systems Overview and vocabulary
|
ISO/IEC 11770-1:2010
|
Information technology Security techniques Key management Part 1: Framework
|
IEC 61499-4:2013
|
Function blocks - Part 4: Rules for compliance profiles
|
ANSI X9.82-1 : 2006(R2013)
|
RANDOM NUMBER GENERATION - PART 1: OVERVIEW AND BASIC PRINCIPLES
|
ISO/IEC 18028-3:2005
|
Information technology Security techniques IT network security Part 3: Securing communications between networks using security gateways
|
ISO/IEC 11770-3:2015
|
Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques
|
ISO/IEC 9798-1:2010
|
Information technology Security techniques Entity authentication Part 1: General
|