14/30275227 DC : 0
|
BS ISO/IEC 29167-17 - INFORMATION TECHNOLOGY - AUTOMATIC IDENTIFICATION AND DATA CAPTURE TECHNIQUES - PART 17: AIR INTERFACE FOR SECURITY SERVICES CRYPTO SUITE CRYPTOGPS |
ISO/IEC 29192-4:2013
|
Information technology — Security techniques — Lightweight cryptography — Part 4: Mechanisms using asymmetric techniques |
BS ISO/IEC 10118-4 : 1998
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - HASH-FUNCTIONS - PART 4: HASH-FUNCTIONS USING MODULAR ARITHMETIC |
CSA ISO/IEC 10116 : 2007 : R2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MODES OF OPERATION FOR AN N-BIT BLOCK CIPHER |
15/30288056 DC : 0
|
BS ISO/IEC 10116 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MODES OF OPERATION FOR AN N-BIT BLOCK CIPHER |
BS ISO 17068:2017
|
Information and documentation. Trusted third party repository for digital records |
UNI CEN ISO/TS 24534-4 : 2008
|
AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES - PART 4: SECURE COMMUNICATIONS USING ASYMMETRICAL TECHNIQUES |
BS ISO/IEC 29192-5:2016
|
Information technology. Security techniques. Lightweight cryptography Hash-functions |
07/30154069 DC : 0
|
BS ISO/IEC 24727-3 - IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARD PROGRAMMING INTERFACES - PART 3: APPLICATION INTERFACE |
ISO 17068:2017
|
Information and documentation — Trusted third party repository for digital records |
CSA ISO/IEC 10116 : 2007 : R2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MODES OF OPERATION FOR AN N-BIT BLOCK CIPHER |
02/652465 DC : DRAFT MAY 2002
|
ISO/IEC CD 10118-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - HASH-FUNCTIONS - PART 3: DEDICATED HASH-FUNCTIONS |
CSA ISO/IEC 11770-4 : 2007 : R2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS |
INCITS/ISO/IEC 9797-2 : 2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MESSAGE AUTHENTICATION CODES (MACS) - PART 2: MECHANISMS USING A DEDICATED HASH-FUNCTION |
INCITS/ISO/IEC 15946-3 : 2002
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC TECHNIQUES BASED ON ELLIPTIC CURVES - PART 3: KEY ESTABLISHMENT |
CSA ISO/IEC 10116 : 2007 : INC : COR 1 : 2009
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MODES OF OPERATION FOR AN N-BIT BLOCK CIPHER |
CSA ISO/IEC TR 14516 : 2004
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR THE USE AND MANAGEMENT OF TRUSTED THIRD PARTY SERVICES |
CSA ISO/IEC 13888-1 : 2010 : R2015
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NON-REPUDIATION - PART 1: GENERAL |
BS EN ISO/IEC 7816/4 : 1996
|
INFORMATION TECHNOLOGY - IDENTIFICATION CARDS - INTEGRATED CIRCUIT(S) CARDS WITH CONTACTS - INTERINDUSTRY COMMANDS FOR INTERCHANGE |
INCITS/ISO/IEC 11770-4 : 2008
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS |
CSA ISO/IEC 10118-2 : 2012 : INC : COR 1 : 2013
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - HASH-FUNCTIONS - PART 2: HASH-FUNCTIONS USING AN N-BIT BLOCK CIPHER |
BS ISO 9735-10:2014
|
Electronic data interchange for administration, commerce and transport (EDIFACT). Application level syntax rules (Syntax version number: 4, Syntax release number: 2) Syntax service directories |
CSA ISO/IEC TR 14516 : 2004 : R2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR THE USE AND MANAGEMENT OF TRUSTED THIRD PARTY SERVICES |
INCITS/ISO/IEC 15945 : 2002
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SPECIFICATION OF TTP SERVICES TO SUPPORT THE APPLICATION OF DIGITAL SIGNATURES |
DIN ISO 9735-10:2015-05
|
ELECTRONIC DATA INTERCHANGE FOR ADMINISTRATION, COMMERCE AND TRANSPORT (EDIFACT) - APPLICATION LEVEL SYNTAX RULES (SYNTAX VERSION NUMBER: 4, SYNTAX RELEASE NUMBER: 2) - PART 10: SYNTAX SERVICE DIRECTORIES (ISO 9735-10:2014) |
BS ISO/IEC 18033-4 : 2005
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 4: STREAM CIPHERS |
ISO/IEC 15945:2002
|
Information technology — Security techniques — Specification of TTP services to support the application of digital signatures |
EN ISO 24534-4:2010
|
Automatic vehicle and equipment identification - Electronic Registration Identification (ERI) for vehicles - Part 4: Secure communications using asymmetrical techniques (ISO 24534-4:2010) |
ISO/IEC TR 29149:2012
|
Information technology Security techniques Best practices for the provision and use of time-stamping services |
CEN/TS 14821-5:2003
|
TRAFFIC AND TRAVEL INFORMATION (TTI) - TTI MESSAGES VIA CELLULAR NETWORKS - PART 5: INTERNAL SERVICES |
CEN/TS 419261:2015
|
Security requirements for trustworthy systems managing certificates and time-stamps |
08/30169505 DC : DRAFT JULY 2008
|
BS ISO/IEC 13888-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NON-REPUDIATION - PART 1: GENERAL |
09/30202174 DC : 0
|
BS EN 50159 - RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - SAFETY RELATED COMMUNICATION IN TRANSMISSION SYSTEMS |
INCITS/ISO/IEC 10118-2 : 2011
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - HASH-FUNCTIONS - PART 2: HASH-FUNCTIONS USING AN N-BIT BLOCK CIPHER |
CSA ISO/IEC 10118-3 : 2004
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - HASH-FUNCTIONS - PART 3: DEDICATED HASH-FUNCTIONS |
PD CEN/TS 419261:2015
|
Security requirements for trustworthy systems managing certificates and time-stamps |
11/30228418 DC : DRAFT JUNE 2011
|
BS ISO/IEC 29192-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - LIGHTWEIGHT CRYPTOGRAPHY - PART 3: STREAM CIPHERS |
CSA ISO/IEC 10118-3 : 2004 : INC : COR 1 : 2013 : R200900
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - HASH-FUNCTIONS - PART 3: DEDICATED HASH-FUNCTIONS |
BS ISO/IEC 15945:2002
|
Information technology. Security techniques. Specification of TTP services to support the application of digital signatures |
CSA ISO/IEC 9797-2:2013
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MESSAGE AUTHENTICATION CODES (MACS) - PART 2: MECHANISMS USING A DEDICATED HASH-FUNCTION |
04/30105372 DC : DRAFT DEC 2004
|
ISO/IEC 11770-4 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS |
CAN/CSA-ISO/IEC 9797-2:13 (R2017)
|
Information technology - Security techniques - Message authentication codes (MACs) - Part 2: Mechanisms using a dedicated hash-function (Adopted ISO/IEC 9797-2:2011, second edition, 2011-05-01) |
CAN/CSA-ISO/IEC 15945-04 (R2017)
|
Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures (Adopted ISO/IEC 15945:2002, first edition, 2002-02-01) |
CSA ISO/IEC 10116 : 2007
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MODES OF OPERATION FOR AN N-BIT BLOCK CIPHER |
BS ISO/IEC 18031 : 2011
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - RANDOM BIT GENERATION |
ETR 237 : 20001
|
SECURITY TECHNIQUES ADVISORY GROUP (STAG) - BASELINE SECURITY STANDARDS - FEATURES AND MECHANISMS |
BS EN ISO 24534-4:2010+A1:2019
|
Automatic vehicle and equipment identification. Electronic registration identification (ERI) for vehicles Secure communications using asymmetrical techniques |
PREN 50159 : DRAFT 2009
|
RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - SAFETY-RELATED COMMUNICATION IN TRANSMISSION SYSTEMS |
BS ISO/IEC 10118-2:2010
|
Information technology. Security techniques. Hash-functions Hash-functions using an n-bit block cipher |
I.S. EN ISO/IEC 7816-4:1998
|
INFORMATION TECHNOLOGY - IDENTIFICATION CARDS - INTEGRATED CIRCUIT(S) CARDS WITH CONTACTS - PART 4: INTERINDUSTRY COMMANDS FOR INTERCHANGE |
ISO/IEC 13888-1:2009
|
Information technology Security techniques Non-repudiation Part 1: General |
ISO 15668:1999
|
Banking Secure file transfer (retail) |
BS EN 50159-2:2001
|
Railway applications. Communication, signalling and processing systems Safety related communication in open transmission systems |
08/30135059 DC : 0
|
ISO/IEC 9797-2 (REV) - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MESSAGE AUTHENTICATION CODES (MACS) |
15/30311322 DC : 0
|
BS ISO/IEC 29192-5 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - LIGHTWEIGHT CRYPTOGRAPHY - PART 5: HASH-FUNCTIONS |
CSA ISO/IEC 10118-3 : 2004 : INC : AMD 1 : 2007 : R2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - HASH-FUNCTIONS - PART 3: DEDICATED HASH-FUNCTIONS |
ISO/IEC 29167-17:2015
|
Information technology Automatic identification and data capture techniques Part 17: Crypto suite cryptoGPS security services for air interface communications |
ISO 10118-2 : 1994
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - HASH-FUNCTIONS - HASH-FUNCTIONS USING AN N-BIT BLOCK CIPHER ALGORITHM |
BS EN 50159:2010
|
Railway applications. Communication, signalling and processing systems. Safety-related communication in transmission systems |
07/30163724 DC : 0
|
BS ISO/IEC 24727-4 - IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARDS PROGRAMMING INTERFACE - PART 4: API ADMINISTRATION |
12/30228421 DC : 0
|
BS ISO/IEC 29192-4 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - LIGHTWEIGHT CRYPTOGRAPHY - PART 4: MECHANISMS USING ASYMMETRIC TECHNIQUES |
BS ISO 15668:1999
|
Banking. Secure file transfer (retail) |
TR 102 272 : 1.1.1
|
ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); ASN.1 FORMAT FOR SIGNATURE POLICIES |
08/30180103 DC : DRAFT MAR 2008
|
BS EN 50136-1 - ALARM SYSTEMS - ALARM TRANSMISSION SYSTEMS - PART 1: GENERAL REQUIREMENTS FOR ALARM TRANSMISSION SYSTEMS |
07/30161079 DC : 0
|
BS EN 14890-1 - APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES |
BS ISO/IEC 29150:2011
|
Information technology. Security techniques. Signcryption |
ISO/IEC 29192-5:2016
|
Information technology Security techniques Lightweight cryptography Part 5: Hash-functions |
CAN/CSA-ISO/IEC 10118-2:12 (R2016)
|
Information technology - Security techniques - Hash-functions - Part 2: Hash-functions using an n-bit block cipher (Adopted ISO/IEC 10118-2:2010, third edition, 2010-10-15) |
CSA ISO/IEC 18033-4 : 2013
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 4: STREAM CIPHERS |
CAN/CSA-ISO/IEC 18031:13 (R2017)
|
Information technology - Security techniques - Random bit generation (Adopted ISO/IEC 18031:2011, second edition, 2011-11-15) |
CSA ISO/IEC 18031 : 2013
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - RANDOM BIT GENERATION |
ISO/IEC 10118-3:2004
|
Information technology Security techniques Hash-functions Part 3: Dedicated hash-functions |
BS ISO/IEC 13888-1:2009
|
Information technology. Security techniques. Non-repudiation General |
BS ISO/IEC 29192-4 : 2013
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - LIGHTWEIGHT CRYPTOGRAPHY - PART 4: MECHANISMS USING ASYMMETRIC TECHNIQUES |
I.S. EN 50159:2010
|
RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - SAFETY-RELATED COMMUNICATION IN TRANSMISSION SYSTEMS |
ISO/IEC 18031:2011
|
Information technology Security techniques Random bit generation |
BS ISO/IEC 10116:2017
|
Information technology. Security techniques. Modes of operation for an n-bit block cipher |
ISO/IEC 18033-4:2011
|
Information technology — Security techniques — Encryption algorithms — Part 4: Stream ciphers |
ISO 24534-4:2010
|
Automatic vehicle and equipment identification — Electronic registration identification (ERI) for vehicles — Part 4: Secure communications using asymmetrical techniques |
ISO/IEC 9797-2:2011
|
Information technology Security techniques Message Authentication Codes (MACs) Part 2: Mechanisms using a dedicated hash-function |
S.R. CEN ISO/TS 24534-4:2008
|
AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES - PART 4: SECURE COMMUNICATIONS USING ASYMMETRICAL TECHNIQUES |
UNE-EN 50159:2011
|
Railway applications - Communication, signalling and processing systems - Safety-related communication in transmission systems |
CEI EN 50159 : 2012
|
RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - SAFETY-RELATED COMMUNICATION IN TRANSMISSION SYSTEMS |
09/30169518 DC : 0
|
BS ISO/IEC 10118-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - HASH-FUNCTIONS - PART 2: HASH-FUNCTIONS USING AN N-BIT BLOCK CIPHER |
16/30337318 DC : 0
|
BS ISO/IEC 10118-3 - INFORMATION TECHNOLOGIES - SECURITY TECHNIQUES - HASHFUNCTIONS - PART 3: DEDICATED HASH-FUNCTIONS |
INCITS/ISO/IEC 10118-3 : 2003
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - HASH-FUNCTIONS - PART 3: DEDICATED HASH-FUNCTIONS |
DD ENV 13729:2000
|
Health informatics. Secure user identification. Strong authentication microprocessor cards |
BS ISO/IEC 10118-3 : 2004
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - HASH-FUNCTIONS - PART 3: DEDICATED HASH-FUNCTIONS |
BS ISO/IEC TR 14516:2002
|
Information technology. Security techniques. Guidelines for the use and management of trusted third party services |
DD CEN ISO/TS 17574:2009
|
Electronic fee collection. Guidelines for security protection profiles |
UNE-EN ISO 24534-4:2012
|
Automatic vehicle and equipment identification - Electronic Registration Identification (ERI) for vehicles - Part 4: Secure communications using asymmetrical techniques (ISO 24534-4:2010) |
DD CEN ISO/TS 24534-4:2008
|
Automatic vehicle and equipment identification. Electronic registration identification (ERI) for vehicles Secure communications using asymmetrical techniques |
INCITS/ISO/IEC 18031 : 2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - RANDOM BIT GENERATION |
07/30173155 DC : 0
|
BS ISO/IEC 9798-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 2: MECHANISMS USING SYMMETRIC ENCIPHERMENT ALGORITHMS |
08/30195403 DC : 0
|
BS EN ISO 24534-4 - AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES - PART 4: SECURE COMMUNICATIONS USING ASYMMETRICAL TECHNIQUES |
CSA ISO/IEC 13888-1:2010
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NON-REPUDIATION - PART 1: GENERAL |
03/652682 DC : DRAFT NOV 2003
|
BS ISO/IEC TR 15446 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDE FOR THE PRODUCTION OF PROTECTION PROFILES AND SECURITY TARGETS |
CSA ISO/IEC 11770-4 : 2007
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS |
CSA ISO/IEC 15945 : 2004
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SPECIFICATION OF TTP SERVICES TO SUPPORT THE APPLICATION OF DIGITAL SIGNATURES |
INCITS/ISO/IEC 10116 : 2008
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MODES OF OPERATION FOR AN N-BIT BLOCK CIPHER |
CAN/CSA-ISO/IEC 18033-4:13 (R2017)
|
Information technology - Security techniques - Encryption algorithms - Part 4: Stream ciphers (Adopted ISO/IEC 18033-4:2011, second edition, 2011-12-15) |
CSA ISO/IEC 11770-4 : 2007 : INC : COR 1 : 2010
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS |
CSA ISO/IEC 11770-4 : 2007 : R2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS |
I.S. CWA 14171:2004
|
GENERAL GUIDELINES FOR ELECTRONIC SIGNATURE VERIFICATION |
ISO/IEC TR 14516:2002
|
Information technology Security techniques Guidelines for the use and management of Trusted Third Party services |
ISO/IEC 10116:2017
|
Information technology — Security techniques — Modes of operation for an n-bit block cipher |
CAN/CSA-ISO/IEC 29167-17:16
|
Information technology Automatic identification and data capture techniques Part 17: Crypto suite cryptoGPS security services for air interface communications (Adopted ISO/IEC 29167-17:2015, first edition, 2015-06-01) |
INCITS/ISO/IEC 18033-4 : 2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 4: STREAM CIPHERS |
IEEE 1377-2012
|
IEEE Standard for Utility Industry Metering Communication Protocol Application Layer (End Device Data Tables) |
I.S. CWA 14890-2:2004
|
APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 2: ADDITIONAL SERVICES |
UNI EN ISO 24534-4 : 2011
|
AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES - PART 4: SECURE COMMUNICATIONS USING ASYMMETRICAL TECHNIQUES |
ISO/IEC 29150:2011
|
Information technology — Security techniques — Signcryption |
I.S. EN ISO 24534-4:2010&A1:2019
|
AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES - PART 4: SECURE COMMUNICATIONS USING ASYMMETRICAL TECHNIQUES |
ISO/IEC 15444-8:2007
|
Information technology — JPEG 2000 image coding system: Secure JPEG 2000 — Part 8: |
IEC 62280:2014
|
Railway applications - Communication, signalling and processing systems - Safety related communication in transmission systems |
EN 50159:2010
|
Railway applications - Communication, signalling and processing systems - Safety-related communication in transmission systems |
ISO/TS 24534-4:2008
|
Automatic vehicle and equipment identification Electronic Registration Identification (ERI) for vehicles Part 4: Secure communications using asymmetrical techniques |
UNE-ETSI/TS 101733 V1.2.2:2011
|
Electronic signature formats. |
EN ISO/IEC 7816-4 : 1996
|
INFORMATION TECHNOLOGY - IDENTIFICATION CARDS - INTEGRATED CIRCUIT(S) CARDS WITH CONTACTS - PART 4: INTERINDUSTRY COMMANDS FOR INTERCHANGE |
BS ISO/TR 19121:2000
|
Geographic information. Imagery and gridded data |
NF EN ISO/IEC 7816-4 : 1996
|
INFORMATION TECHNOLOGY - IDENTIFICATION CARDS - INTEGRATED CIRCUIT(S) CARDS WITH CONTACTS - PART 4: INTERINDUSTRY COMMANDS FOR INTERCHANGE |
INCITS/ISO/IEC 29192-4 : 2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - LIGHTWEIGHT CRYPTOGRAPHY - PART 4: MECHANISMS USING ASYMMETRIC TECHNIQUES |
BS ISO/IEC 14888-1:1998
|
Information technology. Security techniques. Digital signatures with appendix General |
06/30108755 DC : DRAFT FEB 2006
|
ISO/IEC 14888-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DIGITAL SIGNATURES WITH APPENDIX - PART 1: GENERAL |
PD ISO/IEC TR 29149:2012
|
Information technology. Security techniques. Best practices for the provision and use of time-stamping services |
CSA ISO/IEC 15945 : 2004 : R2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SPECIFICATION OF TTP SERVICES TO SUPPORT THE APPLICATION OF DIGITAL SIGNATURES |
DD CEN/TS 14821-5:2003
|
Traffic and Travel Information (TTI). TTI messages via cellular networks Internal services |
BS ISO/IEC 9797-2:2011
|
Information technology. Security techniques. Message Authentication Codes (MACs) Mechanisms using a dedicated hash-function |
09/30199552 DC : DRAFT FEB 2009
|
BS ISO/IEC 18014-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - TIME-STAMPING SERVICES - PART 3: MECHANISMS PRODUCING LINKED TOKENS |
07/30105115 DC : 0
|
BS ISO/IEC 19772 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - AUTHENTICATED ENCRYPTION |
CAN/CSA-ISO/IEC TR 14516-04 (R2017)
|
Information Technology - Security Techniques - Guidelines for the use and Management of Trusted Third Party Services (Adopted ISO/IEC TR 14516:2002, first edition, 2002-06-15) |
07/30161232 DC : 0
|
BS ISO/IEC 11770-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 3: MECHANISMS USING ASYMMETRIC TECHNIQUES |
ISO 11568-6:1998
|
Banking Key management (retail) Part 6: Key management schemes |
CSA ISO/IEC 10118-2 : 2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - HASH-FUNCTIONS - PART 2: HASH-FUNCTIONS USING AN N-BIT BLOCK CIPHER |
INCITS/ISO/IEC 15945 : 2002 : R2007
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SPECIFICATION OF TTP SERVICES TO SUPPORT THE APPLICATION OF DIGITAL SIGNATURES |
I.S. EN 50159-2:2001
|
RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - PART 2: SAFETY RELATED COMMUNICATION IN OPEN TRANSMISSION SYSTEMS |
INCITS/ISO/IEC 10118-4 : 1998
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - HASH-FUNCTIONS - PART 4: HASH-FUNCTIONS USING MODULAR ARITHMETIC |
ISO 9735-10:2014
|
Electronic data interchange for administration, commerce and transport (EDIFACT) — Application level syntax rules (Syntax version number: 4, Syntax release number: 2) — Part 10: Syntax service directories |
S.R. CEN/TS 419261:2015
|
SECURITY REQUIREMENTS FOR TRUSTWORTHY SYSTEMS MANAGING CERTIFICATES AND TIME-STAMPS |
EN 50159-2 : 2001 COR 2010
|
RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - PART 2: SAFETY RELATED COMMUNICATION IN OPEN TRANSMISSION SYSTEMS |
CEN ISO/TS 24534-4:2008
|
Automatic vehicle and equipment identification - Electronic Registration Identification (ERI) for vehicles - Part 4: Secure communications using asymmetrical techniques (ISO/TS 24534-4:2008) |