CSA ISO/IEC 18033-2 :2006
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 2: ASYMMETRIC CIPHERS |
BS ISO/IEC 11770-5:2011
|
Information technology Security techniques. Key management Group key management |
03/648634 DC : 0
|
ISO/IEC 7816-4.2:2002 - IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARDS - PART 4: ORGANIZATION, SECURITY AND COMMANDS FOR INTERCHANGE |
10/30135070 DC : DRAFT NOV 2010
|
BS ISO/IEC 9797-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MESSAGE AUTHENTICATION CODES (MACS) - PART 3: MECHANISMS USING A UNIVERSAL HASH FUNCTION |
11/30231373 DC : 0
|
BS ISO 11568-2 - FINANCIAL SERVICES - KEY MANAGEMENT (RETAIL) - PART 2: SYMMETRIC CIPHERS, THEIR KEY MANAGEMENT AND LIFE CYCLE |
15/30327554 DC : 0
|
BS ISO/IEC 13157-2 - INFORMATION TECHNOLOGY - TELECOMMUNICATIONS AND INFORMATION EXCHANGE BETWEEN SYSTEMS - NFC SECURITY - PART 2: NFC-SEC CRYPTOGRAPHY STANDARD USING ECDH AND AES |
ISO/IEC 13157-2:2016
|
Information technology Telecommunications and information exchange between systems NFC Security Part 2: NFC-SEC cryptography standard using ECDH and AES |
CAN/CSA-ISO/IEC 10181-2-00 (R2013)
|
Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Authentication Framework (Adopted ISO/IEC 10181-2:1996, first edition, 1996-05-15) |
INCITS/ISO/IEC 24727-2 : 2009(R2014)
|
IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARD PROGRAMMING INTERFACES - PART 2: GENERIC CARD INTERFACE |
ETR 232 : 20001
|
SECURITY TECHNIQUES ADVISORY GROUP (STAG); GLOSSARY OF SECURITY TERMINOLOGY |
CSA ISO/IEC 9797 : 0
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DATA INTEGRITY MECHANISM USING A CRYPTOGRAPHIC CHECK FUNCTION EMPLOYING A BLOCK CIPHER ALGORITHM |
16/30304626 DC : 0
|
BS ISO 20038 - BANKING AND RELATED FINANCIAL SERVICES - KEY WRAP |
12/30266972 DC : 0
|
BS ISO/IEC 24727-1 - IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARD PROGRAMMING INTERFACES - PART 1: ARCHITECTURE |
CSA ISO/IEC 18033-1 : 2006 : INC : AMD 1 : 2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 1: GENERAL |
CSA ISO/IEC 9798-2:2010
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 2: MECHANISMS USING SYMMETRIC ENCIPHERMENT ALGORITHMS |
14/30250091 DC : 0
|
BS ISO/IEC 18033-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 1: GENERAL |
ISO/IEC 9797-3:2011
|
Information technology — Security techniques — Message Authentication Codes (MACs) — Part 3: Mechanisms using a universal hash-function |
BS EN ISO/IEC 7816/4 : 1996
|
INFORMATION TECHNOLOGY - IDENTIFICATION CARDS - INTEGRATED CIRCUIT(S) CARDS WITH CONTACTS - INTERINDUSTRY COMMANDS FOR INTERCHANGE |
BS ISO 9735-10:2014
|
Electronic data interchange for administration, commerce and transport (EDIFACT). Application level syntax rules (Syntax version number: 4, Syntax release number: 2) Syntax service directories |
CSA ISO/IEC 9798-2 : 2010 : R2015
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 2: MECHANISMS USING SYMMETRIC ENCIPHERMENT ALGORITHMS |
DIN ISO 9735-10:2015-05
|
ELECTRONIC DATA INTERCHANGE FOR ADMINISTRATION, COMMERCE AND TRANSPORT (EDIFACT) - APPLICATION LEVEL SYNTAX RULES (SYNTAX VERSION NUMBER: 4, SYNTAX RELEASE NUMBER: 2) - PART 10: SYNTAX SERVICE DIRECTORIES (ISO 9735-10:2014) |
CAN/CSA-ISO/IEC 18033-2:06 (R2016)
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 2: ASYMMETRIC CIPHERS |
BS ISO/IEC 18033-4 : 2005
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 4: STREAM CIPHERS |
CSA ISO/IEC 11770-2 : 2009 : INC : COR 1 : 2010 : R2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 2: MECHANISMS USING SYMMETRIC TECHNIQUES |
I.S. EN 62734:2015
|
INDUSTRIAL NETWORKS - WIRELESS COMMUNICATION NETWORK AND COMMUNICATION PROFILES - ISA 100.11A |
BS ISO/IEC 24727-3 : 2008
|
IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARD PROGRAMMING INTERFACES - PART 3: APPLICATION INTERFACE |
ISO/IEC 18033-2:2006
|
Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers |
ECMA 386 : 3ED 2015
|
NFC-SEC-01: NFC-SEC CRYPTOGRAPHY STANDARD USING ECDH AND AES |
ISO/IEC 25185-1:2016
|
Identification cards Integrated circuit card authentication protocols Part 1: Protocol for Lightweight Authentication of Identity |
BIS IS 15256-4 : 2013
|
BANKING - KEY MANAGEMENT (RETAIL) - PART 4: ASYMMETRIC CRYPTOSYSTEMS - KEY MANAGEMENT AND LIFE CYCLE |
14/30249803 DC : 0
|
BS ISO/IEC 27040 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY |
CEN/TS 14821-1:2003
|
TRAFFIC AND TRAVEL INFORMATION (TTI) - TTI MESSAGES VIA CELLULAR NETWORKS - PART 1: GENERAL SPECIFICATIONS |
CEN/TS 14821-5:2003
|
TRAFFIC AND TRAVEL INFORMATION (TTI) - TTI MESSAGES VIA CELLULAR NETWORKS - PART 5: INTERNAL SERVICES |
CEN/TS 14821-8:2003
|
TRAFFIC AND TRAVEL INFORMATION (TTI) - TTI MESSAGES VIA CELLULAR NETWORKS - PART 8: GSM-SPECIFIC PARAMETERS |
CEN/TS 14821-4:2003
|
TRAFFIC AND TRAVEL INFORMATION (TTI) - TTI MESSAGES VIA CELLULAR NETWORKS - PART 4: SERVICE-INDEPENDENT PROTOCOLS |
EN 62734:2015
|
Industrial networks - Wireless communication network and communication profiles - ISA 100.11a |
CEN/TS 14821-6:2003
|
TRAFFIC AND TRAVEL INFORMATION (TTI) - TTI MESSAGES VIA CELLULAR NETWORKS - PART 6: EXTERNAL SERVICES |
ISO/IEC 11770-5:2011
|
Information technology Security techniques Key management Part 5: Group key management |
09/30202174 DC : 0
|
BS EN 50159 - RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - SAFETY RELATED COMMUNICATION IN TRANSMISSION SYSTEMS |
08/30192697 DC : 0
|
BS ISO/IEC 9797-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MESSAGE AUTHENTICATION CODES (MACS) - PART 1: MECHANISMS USING A BLOCK CIPHER |
ISO/IEC 7816-4:2013
|
Identification cards Integrated circuit cards Part 4: Organization, security and commands for interchange |
10/30228327 DC : 0
|
BS ISO/IEC 18031 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - RANDOM BIT GENERATION |
BS ISO/IEC 10181-2:1996
|
Information technology. Open systems interconnection. Security frameworks for open systems Authentication framework |
BS EN ISO 11568-2:1996
|
Banking. Key management (retail) Key management techniques for symmetric ciphers |
BS ISO 9564-2:2014
|
Financial services. Personal Identification Number (PIN) management and security Approved algorithms for PIN encipherment |
ISO/TS 21719-2:2018
|
Electronic fee collection — Personalization of on-board equipment (OBE) — Part 2: Using dedicated short-range communication |
ISO/IEC 9798-2:2008
|
Information technology Security techniques Entity authentication Part 2: Mechanisms using symmetric encipherment algorithms |
11/30228418 DC : DRAFT JUNE 2011
|
BS ISO/IEC 29192-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - LIGHTWEIGHT CRYPTOGRAPHY - PART 3: STREAM CIPHERS |
DD CEN/TS 14821-2:2003
|
Traffic and Travel Information (TTI). TTI messages via cellular networks Numbering and ADP message header |
PD ISO/TR 14742:2010
|
Financial services. Recommendations on cryptographic algorithms and their use |
BS ISO/IEC 18367:2016
|
Information technology. Security techniques. Cryptographic algorithms and security mechanisms conformance testing |
02/652661 DC : DRAFT NOV 2002
|
ISO/IEC FCD 18033-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 1: GENERAL |
INCITS/ISO/IEC 9798-2 : 2010
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 2: MECHANISMS USING SYMMETRIC ENCIPHERMENT ALGORITHMS |
CSA ISO/IEC 9798-2 : 2010 : INC : COR 2 : 2013
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 2: MECHANISMS USING SYMMETRIC ENCIPHERMENT ALGORITHMS |
INCITS/ISO/IEC 18033-2 : 2008
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 2: ASYMMETRIC CIPHERS |
IEC TS 62351-2:2008
|
Power systems management and associated information exchange - Data and communications security - Part 2: Glossary of terms |
ISO/IEC 24767-1:2008
|
Information technology Home network security Part 1: Security requirements |
BS ISO/IEC 18031 : 2011
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - RANDOM BIT GENERATION |
INCITS/ISO/IEC 9797 : 1994
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DATA INTEGRITY MECHANISM USING A CRYPTOGRAPHIC CHECK FUNCTION EMPLOYING A BLOCK CIPHER ALGORITHM |
ETR 237 : 20001
|
SECURITY TECHNIQUES ADVISORY GROUP (STAG) - BASELINE SECURITY STANDARDS - FEATURES AND MECHANISMS |
CAN/CSA-ISO/IEC 18367:18
|
Information technology — Security techniques — Cryptographic algorithms and security mechanisms conformance testing (Adopted ISO/IEC 18367:2016, first edition, 2016-12-15) |
BS ISO/IEC 24727-2 : 2008
|
IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARD PROGRAMMING INTERFACES - PART 2: GENERIC CARD INTERFACE |
PREN 50159 : DRAFT 2009
|
RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - SAFETY-RELATED COMMUNICATION IN TRANSMISSION SYSTEMS |
DIN EN ISO/IEC 27040:2016-04 (Draft)
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY (ISO/IEC 27040:2015) |
ISO/IEC 11889-1:2015
|
Information technology Trusted platform module library Part 1: Architecture |
ISO/IEC 18367:2016
|
Information technology Security techniques Cryptographic algorithms and security mechanisms conformance testing |
ISO/IEC 11889-2:2015
|
Information technology Trusted Platform Module Library Part 2: Structures |
ISO 11568-2:2012
|
Financial services — Key management (retail) — Part 2: Symmetric ciphers, their key management and life cycle |
I.S. EN ISO/IEC 7816-4:1998
|
INFORMATION TECHNOLOGY - IDENTIFICATION CARDS - INTEGRATED CIRCUIT(S) CARDS WITH CONTACTS - PART 4: INTERINDUSTRY COMMANDS FOR INTERCHANGE |
04/30040717 DC : DRAFT JUL 2004
|
ISO/IEC 18033-2 - INFORMATION TECHNOLOGY - ENCRYPTION ALGORITHMS - PART 2: ASYMMETRIC CIPHERS |
BS EN 50159-2:2001
|
Railway applications. Communication, signalling and processing systems Safety related communication in open transmission systems |
TS 123 048 : 5.9.0
|
DIGITAL CELLULAR TELECOMMUNICATIONS SYSTEM (PHASE 2+); UNIVERSAL MOBILE TELECOMMUNICATIONS SYSTEM (UMTS); SECURITY MECHANISMS FOR THE (U)SIM APPLICATION TOOLKIT; STAGE 2 |
BS ISO/IEC 29192-2:2012
|
Information technology. Security techniques. Lightweight cryptography Block ciphers |
DD CEN/TS 14821-7:2003
|
Traffic and Travel Information (TTI). TTI messages via cellular networks Performance requirements for onboard positioning |
BS ISO/IEC 9798-2:2008
|
Information technology. Security techniques. Entity authentication Mechanisms using symmetric encipherment algorithms |
BS ISO/IEC 24745:2011
|
Information technology. Security techniques. Biometric information protection |
BS EN 50159:2010
|
Railway applications. Communication, signalling and processing systems. Safety-related communication in transmission systems |
07/30163724 DC : 0
|
BS ISO/IEC 24727-4 - IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARDS PROGRAMMING INTERFACE - PART 4: API ADMINISTRATION |
BS ISO 11568-4:2007
|
Banking. Key management (retail) Asymmetric cryptosystems. Key management and life cycle |
BS ISO 15668:1999
|
Banking. Secure file transfer (retail) |
BS ISO/IEC 9797-1:2011
|
Information technology. Security techniques. Message authentication codes (MACs) Mechanisms using a block cipher |
18/30354751 DC : DRAFT FEB 2018
|
BS ISO/IEC 18033-6 - INFORMATION TECHNOLOGY SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 6: HOMOMORPHIC ENCRYPTION |
14/30302807 DC : 0
|
BS ISO/IEC 11889-4 - INFORMATION TECHNOLOGY - TRUSTED PLATFORM MODULE - PART 4: SUPPORTING ROUTINES |
04/30040736 DC : DRAFT DEC 2004
|
ISO/IEC 18031 - INFORMATION TECHNOLOGY - RANDOM NUMBER GENERATION |
BS ISO/IEC 25185-1:2016
|
Identification cards. Integrated circuit card authentication protocols Protocol for Lightweight Authentication of Identity |
07/30161079 DC : 0
|
BS EN 14890-1 - APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES |
03/648302 DC : DRAFT JAN 2003
|
BS ISO/IEC 7816-4 - INFORMATION TECHNOLOGY - IDENTIFICATION CARDS - INTEGRATED CIRCUIT(S) CARDS WITH CONTACTS - PART 4: INTERINDUSTRY COMMANDS FOR INTERCHANGE |
BS ISO/IEC 29150:2011
|
Information technology. Security techniques. Signcryption |
DD CEN/TS 14821-3:2003
|
Traffic and Travel Information (TTI). TTI messages via cellular networks Basic information elements |
07/30167508 DC : 0
|
BS ISO/IEC 11770-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 2 - MECHANISMS USING SYMMETRIC TECHNIQUES |
CAN/CSA-ISO/IEC 9797-1:12 (R2016)
|
Information technology - Security techniques - Message authentication codes (MACs) - Part 1: Mechanisms using a block cipher (Adopted ISO/IEC 9797-1:2011, second edition, 2011-03-01) |
CAN/CSA-ISO/IEC 25185-1:18
|
Identification cards — Integrated circuit card authentication protocols — Part 1: Protocol for Lightweight Authentication of Identity (Adopted ISO/IEC 25185-1:2016, first edition, 2016-01-15) |
INCITS/ISO/IEC 24727-1 : 2008
|
IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARD PROGRAMMING INTERFACES - PART 1: ARCHITECTURE |
CSA ISO/IEC 18033-4 : 2013
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 4: STREAM CIPHERS |
BS EN 62734:2015
|
Industrial networks. Wireless communication network and communication profiles. ISA 100.11a |
CAN/CSA-ISO/IEC 18031:13 (R2017)
|
Information technology - Security techniques - Random bit generation (Adopted ISO/IEC 18031:2011, second edition, 2011-11-15) |
ISO/IEC/IEEE 8802-15-6:2017
|
Information technology — Telecommunications and information exchange between systems — Local and metropolitan area networks — Specific requirements — Part 15-6: Wireless body area network |
CSA ISO/IEC 18031 : 2013
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - RANDOM BIT GENERATION |
INCITS/ISO/IEC 11770-5 : 2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 5: GROUP KEY MANAGEMENT |
ISO 15764:2004
|
Road vehicles Extended data link security |
BS ISO/IEC 24727-4 : 2008
|
IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARD PROGRAMMING INTERFACES - PART 4: APPLICATION PROGRAMMING INTERFACE (API) ADMINISTRATION |
I.S. EN 50159:2010
|
RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - SAFETY-RELATED COMMUNICATION IN TRANSMISSION SYSTEMS |
ISO/IEC 18031:2011
|
Information technology Security techniques Random bit generation |
ISO/IEC 29192-2:2012
|
Information technology Security techniques Lightweight cryptography Part 2: Block ciphers |
ISO 20038:2017
|
Banking and related financial services — Key wrap using AES |
CAN/CSA-ISO/IEC 11889-4:16
|
Information technology Trusted Platform Module Library Part 4: Supporting Routines (Adopted ISO/IEC 11889-4:2015, second edition, 2015-12-15) |
ETR 235 : 20001
|
SECURITY TECHNIQUES ADVISORY GROUP (STAG); REQUIREMENTS SPECIFICATION FOR AN ENCRYPTION ALGORITHM FOR OPERATORS OF EUROPEAN PUBLIC TELECOMMUNICATIONS NETWORKS |
ISO/IEC 24727-2:2008
|
Identification cards Integrated circuit card programming interfaces Part 2: Generic card interface |
ISO/IEC 18033-4:2011
|
Information technology — Security techniques — Encryption algorithms — Part 4: Stream ciphers |
ISO/TR 14742:2010
|
Financial services Recommendations on cryptographic algorithms and their use |
ISO/IEC 24727-4:2008
|
Identification cards Integrated circuit card programming interfaces Part 4: Application programming interface (API) administration |
ISO/TR 19038:2005
|
Banking and related financial services Triple DEA Modes of operation Implementation guidelines |
UNE-EN 50159:2011
|
Railway applications - Communication, signalling and processing systems - Safety-related communication in transmission systems |
IEC 62734:2014
|
Industrial networks - Wireless communication network and communication profiles - ISA 100.11a |
DIN EN ISO/IEC 27040 E : 2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY (ISO/IEC 27040:2015) |
CEI EN 50159 : 2012
|
RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - SAFETY-RELATED COMMUNICATION IN TRANSMISSION SYSTEMS |
DIN 6789-100:1997-06 (Draft)
|
SYSTEMATIC ARRANGEMENT OF DOCUMENTS - PART 100: BASIC CONVENTIONS FOR CALS |
07/30154069 DC : 0
|
BS ISO/IEC 24727-3 - IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARD PROGRAMMING INTERFACES - PART 3: APPLICATION INTERFACE |
BS ISO 11568-2:2012
|
Financial services. Key management (retail) Symmetric ciphers, their key management and life cycle |
14/30302798 DC : 0
|
BS ISO/IEC 11889-1 - INFORMATION TECHNOLOGY - TRUSTED PLATFORM MODULE - PART 1: ARCHITECTURE |
BS ISO/IEC 11889-4:2009
|
Information technology. Trusted platform module Commands |
10/30136309 DC : 0
|
BS ISO/IEC 24745 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - BIOMETRIC INFORMATION PROTECTION |
03/304651 DC : 0
|
ISO 16844-3 - ROAD VEHICLES - TACHOGRAPH SYSTEMS - PART 3: MOTION SENSOR INTERFACE |
ISO 15668:1999
|
Banking Secure file transfer (retail) |
BS ISO/IEC 11889-2:2009
|
Information technology. Trusted platform module Design principles |
15/30279582 DC : 0
|
BS ISO/IEC 18367 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC ALGORITHMS AND SECURITY MECHANISMS CONFORMANCE TESTING |
18/30362144 DC : 0
|
BS ISO/IEC 11770-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 2: MECHANISMS USING SYMMETRIC TECHNIQUES |
INCITS/ISO/IEC 18031 : 2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - RANDOM BIT GENERATION |
14/30302801 DC : 0
|
BS ISO/IEC 11889-2 - INFORMATION TECHNOLOGY - TRUSTED PLATFORM MODULE - PART 2: STRUCTURES |
BS ISO 20038:2017
|
Banking and related financial services. Key wrap using AES |
DD CEN/TS 14821-1:2003
|
Traffic and Travel Information (TTI). TTI messages via cellular networks General specifications |
ANSI INCITS 410 : 2015
|
INFORMATION TECHNOLOGY - IDENTIFICATION CARDS - LIMITED USE (LU), PROXIMITY INTEGRATED CIRCUIT CARD (PICC) |
BS ISO/IEC 9797-3:2011
|
Information technology. Security techniques. Message Authentication Codes (MACs) Mechanisms using a universal hash-function |
DD CEN/TS 14821-4:2003
|
Traffic and Travel Information (TTI). TTI messages via cellular networks Service-independent protocols |
DD IEC/TS 62351-2:2008
|
Power systems management and associated information exchange. Data and communications security Glossary of terms |
CSA ISO/IEC 9797-1:2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MESSAGE AUTHENTICATION CODES (MACS) - PART 1: MECHANISMS USING A BLOCK CIPHER |
BS ISO/IEC 11770-2:2008
|
Information technology. Security techniques. Key management Mechanisms using symmetric techniques |
DD CEN/TS 14821-6:2003
|
Traffic and Travel Information (TTI). TTI messages via cellular networks External services |
INCITS/ISO/IEC 24727-4 : 2009(R2014)
|
IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARD PROGRAMMING INTERFACES - PART 4: APPLICATION PROGRAMMING INTERFACE (API) ADMINISTRATION |
CAN/CSA-ISO/IEC 18033-4:13 (R2017)
|
Information technology - Security techniques - Encryption algorithms - Part 4: Stream ciphers (Adopted ISO/IEC 18033-4:2011, second edition, 2011-12-15) |
INCITS/ISO/IEC 18033-4 : 2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 4: STREAM CIPHERS |
ISO/IEC 19772:2009
|
Information technology Security techniques Authenticated encryption |
I.S. CWA 14890-2:2004
|
APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 2: ADDITIONAL SERVICES |
ISO/IEC 29150:2011
|
Information technology — Security techniques — Signcryption |
ISO 9735-5:2002
|
Electronic data interchange for administration, commerce and transport (EDIFACT) Application level syntax rules (Syntax version number: 4, Syntax release number: 1) Part 5: Security rules for batch EDI (authenticity, integrity and non-repudiation of origin) |
CEN ISO/TS 21719-2:2018
|
Electronic fee collection - Personalization of on-board equipment (OBE) - Part 2: Using dedicated short-range communication (ISO/TS 21719-2:2018) |
ISO/IEC 24727-1:2014
|
Identification cards Integrated circuit card programming interfaces Part 1: Architecture |
ISO/IEC 18033-1:2015
|
Information technology Security techniques Encryption algorithms Part 1: General |
ISO/IEC 24727-3:2008
|
Identification cards Integrated circuit card programming interfaces Part 3: Application interface |
I.S. EN ISO 11568-2:1997
|
BANKING - KEY MANAGEMENT (RETAIL) - PART 2: KEY MANAGEMENT TECHNIQUES FOR SYMMETRIC CIPHERS |
IEC 62280:2014
|
Railway applications - Communication, signalling and processing systems - Safety related communication in transmission systems |
EN 50159:2010
|
Railway applications - Communication, signalling and processing systems - Safety-related communication in transmission systems |
BS ISO/IEC 27040 : 2015
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY |
BS EN ISO/IEC 27040:2016
|
Information technology. Security techniques. Storage security |
ISO/IEC 27040:2015
|
Information technology — Security techniques — Storage security |
CEN/TS 14821-3:2003
|
TRAFFIC AND TRAVEL INFORMATION (TTI) - TTI MESSAGES VIA CELLULAR NETWORKS - PART 3: BASIC INFORMATION ELEMENTS |
EN ISO 11568-2 : 1996
|
BANKING - KEY MANAGEMENT (RETAIL) - PART 2: KEY MANAGEMENT TECHNIQUES FOR SYMMETRIC CIPHERS |
EN ISO/IEC 7816-4 : 1996
|
INFORMATION TECHNOLOGY - IDENTIFICATION CARDS - INTEGRATED CIRCUIT(S) CARDS WITH CONTACTS - PART 4: INTERINDUSTRY COMMANDS FOR INTERCHANGE |
EN ISO/IEC 27040:2016
|
Information technology - Security techniques - Storage security (ISO/IEC 27040:2015) |
ISO/IEC 11770-2:2008
|
Information technology Security techniques Key management Part 2: Mechanisms using symmetric techniques |
BS ISO 9735-5:2002
|
Electronic data interchange for administration, commerce and transport (EDIFACT). Application level syntax rules Security rules for batch EDI (authenticity, integrity and non-repudiation of origin) |
CSA ISO/IEC 7816-4 : 2015
|
IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARDS - PART 4: ORGANIZATION, SECURITY AND COMMANDS FOR INTERCHANGE |
BS ISO/IEC 19772:2009
|
Information technology. Security techniques. Authenticated encryption |
BS ISO/IEC 9797:1994
|
Information technology. Security techniques. Data integrity mechanism using a cryptographic check function employing a block cipher algorithm |
BS ISO/IEC 11889-1:2009
|
Information technology. Trusted platform module Overview |
INCITS/ISO/IEC 18033-1 : 2005
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 1: GENERAL |
INCITS/ISO/IEC 24745 : 2012(R2017)
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - BIOMETRIC INFORMATION PROTECTION |
BS ISO/IEC 24727-1:2014
|
Identification cards. Integrated circuit card programming interfaces Architecture |
10/30228415 DC : DRAFT NOV 2010
|
BS ISO/IEC 29192-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - LIGHTWEIGHT CRYPTOGRAPHY - PART 2: BLOCK CIPHERS |
INCITS/ISO/IEC 24727-3 : 2009(R2014)
|
IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARD PROGRAMMING INTERFACES - PART 3: APPLICATION INTERFACE |
BS ISO/IEC 18033-1:2015
|
Information technology. Security techniques. Encryption algorithms General |
11/30237119 DC : 0
|
BS ISO/IEC 7816-4 - IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARDS - PART 4: ORGANIZATION, SECURITY AND COMMANDS FOR INTERCHANGE |
04/30082429 DC : DRAFT JUL 2004
|
ISO/IEC 18033-4 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 4: STREAM CIPHERS |
BS ISO/IEC 18033-2 : 2006
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 2: ASYMMETRIC CIPHERS |
INCITS/ISO/IEC 27040 : 2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY |
DD CEN/TS 14821-5:2003
|
Traffic and Travel Information (TTI). TTI messages via cellular networks Internal services |
05/30112566 DC : DRAFT JAN 2005
|
ISO 11568-4 - BANKING - KEY MANAGEMENT (RETAIL) - PART 4: ASYMMETRIC CRYPTOSYSTEMS - KEY MANAGEMENT AND LIFE CYCLE |
07/30105115 DC : 0
|
BS ISO/IEC 19772 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - AUTHENTICATED ENCRYPTION |
DD CEN/TS 14821-8:2003
|
Traffic and Travel Information (TTI). TTI messages via cellular networks GSM-specific parameters |
CSA ISO/IEC 11770-2 : 2009
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 2: MECHANISMS USING SYMMETRIC TECHNIQUES |
CAN/CSA-ISO/IEC 11889-2:16
|
Information technology Trusted Platform Module Library Part 2: Structures (Adopted ISO/IEC 11889-2:2015, second edition, 2015-12-15) |
TS 101 181 : 8.9.0
|
DIGITAL CELLULAR TELECOMMUNICATIONS SYSTEM (PHASE 2+); SECURITY MECHANISMS FOR SIM APPLICATION TOOLKIT; STAGE 2 |
CSA ISO/IEC 18033-1 : 2006
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 1: GENERAL |
CSA ISO/IEC 18033-1 : 2006 : INC : AMD 1 : 2012 : R2016
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 1: GENERAL |
BS ISO/IEC 7816-4 : 2013
|
IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARDS - PART 4: ORGANIZATION, SECURITY AND COMMANDS FOR INTERCHANGE |
TS 143 048 : 4.0.0
|
DIGITAL CELLULAR TELECOMMUNICATIONS SYSTEM (PHASE 2+); SECURITY MECHANISMS FOR THE SIM APPLICATION TOOLKIT; STAGE 2 |
ISO/IEC 10181-2:1996
|
Information technology Open Systems Interconnection Security frameworks for open systems: Authentication framework |
I.S. EN 50159-2:2001
|
RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - PART 2: SAFETY RELATED COMMUNICATION IN OPEN TRANSMISSION SYSTEMS |
ISO 16844-3:2004
|
Road vehicles Tachograph systems Part 3: Motion sensor interface |
CAN/CSA-ISO/IEC 11889-1:16
|
Information technology Trusted Platform Module Library Part 1: Architecture (Adopted ISO/IEC 11889-1:2015, second edition, 2015-12-15) |
ISO/IEC 24767-2:2009
|
Information technology Home network security Part 2: Internal security services: Secure Communication Protocol for Middleware (SCPM) |
I.S. EN ISO/IEC 27040:2016
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY (ISO/IEC 27040:2015) |
S.R. CEN ISO/TS 21719-2:2018
|
ELECTRONIC FEE COLLECTION - PERSONALIZATION OF ON-BOARD EQUIPMENT (OBE) - PART 2: USING DEDICATED SHORT-RANGE COMMUNICATION (ISO/TS 21719-2:2018) |
ISO 9735-10:2014
|
Electronic data interchange for administration, commerce and transport (EDIFACT) — Application level syntax rules (Syntax version number: 4, Syntax release number: 2) — Part 10: Syntax service directories |
ISO 9564-2:2014
|
Financial services — Personal Identification Number (PIN) management and security — Part 2: Approved algorithms for PIN encipherment |
ISO 11568-4:2007
|
Banking — Key management (retail) — Part 4: Asymmetric cryptosystems — Key management and life cycle |
ISO/IEC 24745:2011
|
Information technology Security techniques Biometric information protection |
ISO/IEC 9797-1:2011
|
Information technology Security techniques Message Authentication Codes (MACs) Part 1: Mechanisms using a block cipher |
ISO/IEC 11889-4:2015
|
Information technology Trusted Platform Module Library Part 4: Supporting Routines |
DIN ISO 9735-5:2004-01
|
Electronic data interchange for administration, commerce and transport (EDIFACT) - Application level syntax rules (Syntax version number: 4, Syntax release number: 1) - Part 5: Security rules for batch EDI (authenticity, integrity and non-repudiation of origin) (ISO 9735-5:2002) |
CEN/TS 14821-2:2003
|
TRAFFIC AND TRAVEL INFORMATION (TTI) - TTI MESSAGES VIA CELLULAR NETWORKS - PART 2: NUMBERING AND ADP MESSAGE HEADER |
CEN/TS 14821-7:2003
|
TRAFFIC AND TRAVEL INFORMATION (TTI) - TTI MESSAGES VIA CELLULAR NETWORKS - PART 7: PERFORMANCE REQUIREMENTS FOR ONBOARD POSITIONING |
EN 50159-2 : 2001 COR 2010
|
RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - PART 2: SAFETY RELATED COMMUNICATION IN OPEN TRANSMISSION SYSTEMS |