I.S. EN 62351-9:2017
|
POWER SYSTEMS MANAGEMENT AND ASSOCIATED INFORMATION EXCHANGE - DATA AND COMMUNICATIONS SECURITY - PART 9: CYBER SECURITY KEY MANAGEMENT FOR POWER SYSTEM EQUIPMENT |
UNI CEN ISO/TS 24534-4 : 2008
|
AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES - PART 4: SECURE COMMUNICATIONS USING ASYMMETRICAL TECHNIQUES |
11/30231373 DC : 0
|
BS ISO 11568-2 - FINANCIAL SERVICES - KEY MANAGEMENT (RETAIL) - PART 2: SYMMETRIC CIPHERS, THEIR KEY MANAGEMENT AND LIFE CYCLE |
BS ISO 11568-4:2007
|
Banking. Key management (retail) Asymmetric cryptosystems. Key management and life cycle |
12/30236961 DC : 0
|
BS ISO/IEC 20008-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ANONYMOUS DIGITAL SIGNATURES - PART 1: GENERAL |
CSA ISO/IEC 9798-2:2010
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 2: MECHANISMS USING SYMMETRIC ENCIPHERMENT ALGORITHMS |
09/30169508 DC : 0
|
BS ISO/IEC 13888-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NON-REPUDIATION - PART 2: MECHANISMS USING SYMMETRIC TECHNIQUES |
09/30204721 DC : 0
|
BS ISO/IEC 9798-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 1: GENERAL |
BS ISO/IEC 9798-1:2010
|
Information technology. Security techniques. Entity authentication General |
CSA ISO/IEC TR 14516 : 2004
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR THE USE AND MANAGEMENT OF TRUSTED THIRD PARTY SERVICES |
CAN/CSA-ISO/IEC TR 14516-04 (R2017)
|
Information Technology - Security Techniques - Guidelines for the use and Management of Trusted Third Party Services (Adopted ISO/IEC TR 14516:2002, first edition, 2002-06-15) |
CSA TELECOM ORGANIZATIONS PACKAGE : 2018
|
CONSISTS OF CAN/CSA-ISO/IEC 27000:18 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY; CAN/CSA-ISO/IEC 27001:14, INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS; CAN/CSA-ISO/IEC 27002:15 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR |
CSA ISO/IEC 15945 : 2004
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SPECIFICATION OF TTP SERVICES TO SUPPORT THE APPLICATION OF DIGITAL SIGNATURES |
INCITS/ISO/IEC 9798-2 : 2010
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 2: MECHANISMS USING SYMMETRIC ENCIPHERMENT ALGORITHMS |
CSA ISO/IEC 9798-2 : 2010 : R2015
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 2: MECHANISMS USING SYMMETRIC ENCIPHERMENT ALGORITHMS |
CSA ISO/IEC TR 14516 : 2004 : R2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR THE USE AND MANAGEMENT OF TRUSTED THIRD PARTY SERVICES |
CSA ISO/IEC 11770-1 : 2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 1: FRAMEWORK |
INCITS/ISO/IEC 15945 : 2002
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SPECIFICATION OF TTP SERVICES TO SUPPORT THE APPLICATION OF DIGITAL SIGNATURES |
ISO 15764:2004
|
Road vehicles Extended data link security |
I.S. EN 62734:2015
|
INDUSTRIAL NETWORKS - WIRELESS COMMUNICATION NETWORK AND COMMUNICATION PROFILES - ISA 100.11A |
ISO/IEC 15945:2002
|
Information technology — Security techniques — Specification of TTP services to support the application of digital signatures |
ISO 11568-4:2007
|
Banking — Key management (retail) — Part 4: Asymmetric cryptosystems — Key management and life cycle |
ISO/IEC 27002:2013
|
Information technology Security techniques Code of practice for information security controls |
EN 62734:2015
|
Industrial networks - Wireless communication network and communication profiles - ISA 100.11a |
BS ISO/IEC 9798-2:2008
|
Information technology. Security techniques. Entity authentication Mechanisms using symmetric encipherment algorithms |
09/30202174 DC : 0
|
BS EN 50159 - RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - SAFETY RELATED COMMUNICATION IN TRANSMISSION SYSTEMS |
08/30192697 DC : 0
|
BS ISO/IEC 9797-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MESSAGE AUTHENTICATION CODES (MACS) - PART 1: MECHANISMS USING A BLOCK CIPHER |
ISO/IEC 18013-3:2017
|
Information technology — Personal identification — ISO-compliant driving licence — Part 3: Access control, authentication and integrity validation |
BS ISO 24534-5:2011
|
Intelligent transport systems. Automatic vehicle and equipment identification. Electronic Registration Identification (ERI) for vehicles Secure communications using symmetrical techniques |
10/30204613 DC : 0
|
BS ISO 24534-5 - AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES - PART 5: SECURE COMMUNICATIONS USING SYMMETRICAL TECHNIQUES |
BS ISO/IEC 11770-6:2016
|
Information technology. Security techniques. Key management Key derivation |
09/30204756 DC : 0
|
BS ISO/IEC 11770-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 1: FRAMEWORK |
12/30259506 DC : DRAFT JAN 2012
|
BS EN 62734 - INDUSTRIAL COMMUNICATION NETWORKS - FIELDBUS SPECIFICATIONS - WIRELESS SYSTEMS FOR INDUSTRIAL AUTOMATION: PROCESS CONTROL AND RELATED APPLICATIONS (BASED ON ISA 100.11A) |
BS ISO/IEC 20008-1:2013
|
Information technology. Security techniques. Anonymous digital signatures General |
CSA ISO/IEC 27002 : 2015
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS |
PD ISO/TR 14742:2010
|
Financial services. Recommendations on cryptographic algorithms and their use |
UNE-ISO/IEC 27002:2015
|
Information technology -- Security techniques -- Code of practice for information security controls |
BS ISO/IEC 15945:2002
|
Information technology. Security techniques. Specification of TTP services to support the application of digital signatures |
CSA ISO/IEC 9798-2 : 2010 : INC : COR 2 : 2013
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 2: MECHANISMS USING SYMMETRIC ENCIPHERMENT ALGORITHMS |
CAN/CSA-ISO/IEC 15945-04 (R2017)
|
Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures (Adopted ISO/IEC 15945:2002, first edition, 2002-02-01) |
ISO/IEC 19790:2012
|
Information technology Security techniques Security requirements for cryptographic modules |
ISO 24534-5:2011
|
Intelligent transport systems — Automatic vehicle and equipment identification — Electronic Registration Identification (ERI) for vehicles — Part 5: Secure communications using symmetrical techniques |
BS ISO/IEC 27002 : 2013
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS |
BS ISO/IEC 18013-3:2017
|
Information technology. Personal identification. ISO-compliant driving licence Access control, authentication and integrity validation |
ETR 237 : 20001
|
SECURITY TECHNIQUES ADVISORY GROUP (STAG) - BASELINE SECURITY STANDARDS - FEATURES AND MECHANISMS |
UNE-EN ISO/IEC 27002:2017
|
Information technology - Security techniques - Code of practice for information security controls (ISO/IEC 27002:2013 including Cor 1:2014 and Cor 2:2015) |
BS EN ISO 24534-4:2010+A1:2019
|
Automatic vehicle and equipment identification. Electronic registration identification (ERI) for vehicles Secure communications using asymmetrical techniques |
PREN 50159 : DRAFT 2009
|
RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - SAFETY-RELATED COMMUNICATION IN TRANSMISSION SYSTEMS |
IEC 62351-9:2017
|
Power systems management and associated information exchange - Data and communications security - Part 9: Cyber security key management for power system equipment |
EN ISO 24534-4:2010
|
Automatic vehicle and equipment identification - Electronic Registration Identification (ERI) for vehicles - Part 4: Secure communications using asymmetrical techniques (ISO 24534-4:2010) |
DIN EN ISO/IEC 27002 E : 2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS (ISO/IEC 27002:2013 INCLUDING COR 1:2014 AND COR 2:2015) |
04/30040717 DC : DRAFT JUL 2004
|
ISO/IEC 18033-2 - INFORMATION TECHNOLOGY - ENCRYPTION ALGORITHMS - PART 2: ASYMMETRIC CIPHERS |
BS ISO/IEC 18370-1:2016
|
Information technology. Security techniques. Blind digital signatures General |
BS EN 50159-2:2001
|
Railway applications. Communication, signalling and processing systems Safety related communication in open transmission systems |
ISO 24534-4:2010
|
Automatic vehicle and equipment identification — Electronic registration identification (ERI) for vehicles — Part 4: Secure communications using asymmetrical techniques |
PD IEC/TS 62351-5:2013
|
Power systems management and associated information exchange. Data and communications security Security for IEC 60870-5 and derivatives |
BS EN ISO/IEC 27002:2017
|
Information technology. Security techniques. Code of practice for information security controls |
07/30163724 DC : 0
|
BS ISO/IEC 24727-4 - IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARDS PROGRAMMING INTERFACE - PART 4: API ADMINISTRATION |
BS EN 62351-9:2017
|
Power systems management and associated information exchange. Data and communications security Cyber security key management for power system equipment |
ISO/IEC TR 14516:2002
|
Information technology Security techniques Guidelines for the use and management of Trusted Third Party services |
CAN/CSA-ISO/IEC 11770-1:12 (R2016)
|
Information technology - Security techniques - Key management - Part 1: Framework (Adopted ISO/IEC 11770-1:2010, second edition, 2010-12-01) |
DIN EN ISO/IEC 27002:2017-06
|
Information technology - Security techniques - Code of practice for information security controls (ISO/IEC 27002:2013 including Cor 1:2014 and Cor 2:2015) |
ISO/IEC 13888-2:2010
|
Information technology Security techniques Non-repudiation Part 2: Mechanisms using symmetric techniques |
CSA ISO/IEC 9798-1 :2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 1: GENERAL |
I.S. EN 50159:2010
|
RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - SAFETY-RELATED COMMUNICATION IN TRANSMISSION SYSTEMS |
ISO/IEC 11770-1:2010
|
Information technology Security techniques Key management Part 1: Framework |
ISO/IEC 18370-1:2016
|
Information technology Security techniques Blind digital signatures Part 1: General |
ISO/TR 14742:2010
|
Financial services Recommendations on cryptographic algorithms and their use |
IEC TS 62351-5:2013
|
Power systems management and associated information exchange - Data and communications security - Part 5: Security for IEC 60870-5 and derivatives |
S.R. CEN ISO/TS 24534-4:2008
|
AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES - PART 4: SECURE COMMUNICATIONS USING ASYMMETRICAL TECHNIQUES |
UNE-EN 50159:2011
|
Railway applications - Communication, signalling and processing systems - Safety-related communication in transmission systems |
IEC 62734:2014
|
Industrial networks - Wireless communication network and communication profiles - ISA 100.11a |
CEI EN 50159 : 2012
|
RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - SAFETY-RELATED COMMUNICATION IN TRANSMISSION SYSTEMS |
UNI CEI ISO/IEC 18013-3 : 2011
|
INFORMATION TECHNOLOGY - PERSONAL IDENTIFICATION - ISO-COMPLIANT DRIVING LICENCE - PART 3: ACCESS CONTROL, AUTHENTICATION AND INTEGRITY VALIDATION |
BS ISO/IEC 11770-1:2010
|
Information technology. Security techniques. Key management Framework |
07/30154069 DC : 0
|
BS ISO/IEC 24727-3 - IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARD PROGRAMMING INTERFACES - PART 3: APPLICATION INTERFACE |
ANSI X9.65 : 2004
|
TRIPLE DATA ENCRYPTION ALGORITHM (TDEA), IMPLEMENTATION STANDARD |
ISO/TS 24534-5:2008
|
Automatic vehicle and equipment identification Electronic Registration Identification (ERI) for vehicles Part 5: Secure communications using symmetrical techniques |
07/30153606 DC : 0
|
BS ISO 22895 - FINANCIAL SERVICES - SECURITY - CRYPTOGRAPHIC SYNTAX SCHEME |
CSA INFORMATION SECURITY PACKAGE : 2018
|
CONSISTS OF CAN/CSA-ISO/IEC 27000:18 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY; CAN/CSA-ISO/IEC 27001:14, INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS; CAN/CSA-ISO/IEC 27002:15 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION |
INCITS/ISO/IEC 27002 : 2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS |
BS ISO/IEC TR 14516:2002
|
Information technology. Security techniques. Guidelines for the use and management of trusted third party services |
BS ISO/IEC 13888-2:2010
|
Information technology. Security techniques. Non-repudiation Mechanisms using symmetric techniques |
ISO/IEC 9798-2:2008
|
Information technology Security techniques Entity authentication Part 2: Mechanisms using symmetric encipherment algorithms |
DD CEN ISO/TS 24534-4:2008
|
Automatic vehicle and equipment identification. Electronic registration identification (ERI) for vehicles Secure communications using asymmetrical techniques |
BS EN 62734:2015
|
Industrial networks. Wireless communication network and communication profiles. ISA 100.11a |
BS ISO/IEC 19790:2012
|
Information technology. Security techniques. Security requirements for cryptographic modules |
07/30173155 DC : 0
|
BS ISO/IEC 9798-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 2: MECHANISMS USING SYMMETRIC ENCIPHERMENT ALGORITHMS |
08/30195403 DC : 0
|
BS EN ISO 24534-4 - AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES - PART 4: SECURE COMMUNICATIONS USING ASYMMETRICAL TECHNIQUES |
BS EN ISO 27799:2008
|
Health informatics. Information security management in health using ISO/IEC 27002 |
CAN/CSA-ISO/IEC 9798-1:12 (R2016)
|
Information technology - Security techniques - Entity authentication - Part 1: General (Adopted ISO/IEC 9798-1:2010, third edition, 2010-07-01) |
INCITS/ISO/IEC 15945 : 2002 : R2007
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SPECIFICATION OF TTP SERVICES TO SUPPORT THE APPLICATION OF DIGITAL SIGNATURES |
ISO/IEC 11770-6:2016
|
Information technology Security techniques Key management Part 6: Key derivation |
DD ISO/TS 24534-5:2008
|
Automatic vehicle and equipment identification. Electronic Registration Identification (ERI) for vehicles Secure communications using symmetrical techniques |
ISO/IEC 20008-1:2013
|
Information technology Security techniques Anonymous digital signatures Part 1: General |
I.S. EN ISO/IEC 27002:2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS (ISO/IEC 27002:2013 INCLUDING COR 1:2014 AND COR 2:2015) |
I.S. ISO/IEC 27002:2013
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS |
UNI EN ISO 24534-4 : 2011
|
AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES - PART 4: SECURE COMMUNICATIONS USING ASYMMETRICAL TECHNIQUES |
CEI UNI ISO/IEC 27002 : 2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS |
I.S. EN ISO 24534-4:2010&A1:2019
|
AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES - PART 4: SECURE COMMUNICATIONS USING ASYMMETRICAL TECHNIQUES |
ISO/IEC 9798-1:2010
|
Information technology Security techniques Entity authentication Part 1: General |
ISO/IEC 15444-8:2007
|
Information technology — JPEG 2000 image coding system: Secure JPEG 2000 — Part 8: |
IEC 62280:2014
|
Railway applications - Communication, signalling and processing systems - Safety related communication in transmission systems |
EN 50159:2010
|
Railway applications - Communication, signalling and processing systems - Safety-related communication in transmission systems |
ISO/TS 24534-4:2008
|
Automatic vehicle and equipment identification Electronic Registration Identification (ERI) for vehicles Part 4: Secure communications using asymmetrical techniques |
EN ISO/IEC 27002:2017
|
Information technology - Security techniques - Code of practice for information security controls (ISO/IEC 27002:2013 including Cor 1:2014 and Cor 2:2015) |
EN ISO 27799:2016
|
Health informatics - Information security management in health using ISO/IEC 27002 (ISO 27799:2016) |
15/30268544 DC : 0
|
BS ISO/IEC 18370-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - BLIND DIGITAL SIGNATURES - PART 1: GENERAL |
16/30343872 DC : DRAFT JUNE 2016
|
BS EN 62351-9 ED1 - POWER SYSTEMS MANAGEMENT AND ASSOCIATED INFORMATION EXCHANGE - DATA ANDCOMMUNICATIONS SECURITY - PART 9: CYBER SECURITY KEY MANAGEMENT FOR POWER SYSTEM EQUIPMENT |
BS EN 50159:2010
|
Railway applications. Communication, signalling and processing systems. Safety-related communication in transmission systems |
UNE-EN ISO 24534-4:2012
|
Automatic vehicle and equipment identification - Electronic Registration Identification (ERI) for vehicles - Part 4: Secure communications using asymmetrical techniques (ISO 24534-4:2010) |
ECMA 411 : 3ED 2017
|
NFC-SEC-04: NFC-SEC ENTITY AUTHENTICATION AND KEY AGREEMENT USING SYMMETRIC CRYPTOGRAPHY |
15/30268565 DC : 0
|
BS ISO/IEC 18370-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - BLIND DIGITAL SIGNATURES - PART 2: DISCRETE LOGARITHM BASED MECHANISMS |
CSA ISO/IEC 15945 : 2004 : R2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SPECIFICATION OF TTP SERVICES TO SUPPORT THE APPLICATION OF DIGITAL SIGNATURES |
05/30112566 DC : DRAFT JAN 2005
|
ISO 11568-4 - BANKING - KEY MANAGEMENT (RETAIL) - PART 4: ASYMMETRIC CRYPTOSYSTEMS - KEY MANAGEMENT AND LIFE CYCLE |
05/30116896 DC : DRAFT SEP 2005
|
ISO 19092-1 - FINANCIAL SERVICES - BIOMETRICS - PART 1: SECURITY FRAMEWORK |
07/30105115 DC : 0
|
BS ISO/IEC 19772 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - AUTHENTICATED ENCRYPTION |
ISO 11568-6:1998
|
Banking Key management (retail) Part 6: Key management schemes |
ISO/IEC 13157-5:2016
|
Information technology Telecommunications and information exchange between systems NFC Security Part 5: NFC-SEC entity authentication and key agreement using symmetric cryptography |
I.S. EN 50159-2:2001
|
RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - PART 2: SAFETY RELATED COMMUNICATION IN OPEN TRANSMISSION SYSTEMS |
IEEE 1815-2012 REDLINE
|
IEEE Standard for Electric Power Systems Communications-Distributed Network Protocol (DNP3) |
UNI CEI ISO/IEC 27002 : 2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS |
EN 50159-2 : 2001 COR 2010
|
RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - PART 2: SAFETY RELATED COMMUNICATION IN OPEN TRANSMISSION SYSTEMS |
CEN ISO/TS 24534-4:2008
|
Automatic vehicle and equipment identification - Electronic Registration Identification (ERI) for vehicles - Part 4: Secure communications using asymmetrical techniques (ISO/TS 24534-4:2008) |
EN 62351-9:2017
|
Power systems management and associated information exchange - Data and communications security - Part 9: Cyber security key management for power system equipment |