BS EN 50159-2:2001
|
Railway applications. Communication, signalling and processing systems Safety related communication in open transmission systems |
08/30192697 DC : 0
|
BS ISO/IEC 9797-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MESSAGE AUTHENTICATION CODES (MACS) - PART 1: MECHANISMS USING A BLOCK CIPHER |
08/30169502 DC : 0
|
BS ISO/IEC 9798-5 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 5: MECHANISMS USING ZERO KNOWLEDGE TECHNIQUES |
UNI CEN ISO/TS 24534-4 : 2008
|
AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES - PART 4: SECURE COMMUNICATIONS USING ASYMMETRICAL TECHNIQUES |
BS EN 419212-1:2017
|
Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services Introduction and common definitions |
12/30236961 DC : 0
|
BS ISO/IEC 20008-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ANONYMOUS DIGITAL SIGNATURES - PART 1: GENERAL |
15/30327554 DC : 0
|
BS ISO/IEC 13157-2 - INFORMATION TECHNOLOGY - TELECOMMUNICATIONS AND INFORMATION EXCHANGE BETWEEN SYSTEMS - NFC SECURITY - PART 2: NFC-SEC CRYPTOGRAPHY STANDARD USING ECDH AND AES |
07/30154069 DC : 0
|
BS ISO/IEC 24727-3 - IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARD PROGRAMMING INTERFACES - PART 3: APPLICATION INTERFACE |
ISO/IEC 13157-2:2016
|
Information technology Telecommunications and information exchange between systems NFC Security Part 2: NFC-SEC cryptography standard using ECDH and AES |
ANSI X9.24-2 : 2016
|
RETAIL FINANCIAL SERVICES - SYMMETRIC KEY MANAGEMENT - PART 2: USING ASYMMETRIC TECHNIQUES FOR THE DISTRIBUTION OF SYMMETRIC KEYS |
ISO/IEC 13888-2:2010
|
Information technology Security techniques Non-repudiation Part 2: Mechanisms using symmetric techniques |
CSA ISO/IEC 9798-5 : 2010 : R2015
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 5: MECHANISMS USING ZERO-KNOWLEDGE TECHNIQUES |
09/30204721 DC : 0
|
BS ISO/IEC 9798-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 1: GENERAL |
BS EN 14890-1:2008
|
APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES |
PD CEN/TS 15480-2:2012
|
Identification card systems. European Citizen Card Logical data structures and security services |
BS ISO/IEC 18014-1:2008
|
Information technology. Security techniques. Time- stamping services Framework |
INCITS/ISO/IEC 18014-3 : 2010
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - TIME-STAMPING SERVICES - PART 3: MECHANISMS PRODUCING LINKED TOKENS |
CSA ISO/IEC 11770-4 : 2007 : R2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS |
BS ISO/IEC 15946-3:2002
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC TECHNIQUES BASED ON ELLIPTIC CURVES - PART 3: KEY ESTABLISHMENT |
BS ISO/IEC 9798-1:2010
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 1: GENERAL |
INCITS/ISO/IEC 15946-3 : 2002
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC TECHNIQUES BASED ON ELLIPTIC CURVES - PART 3: KEY ESTABLISHMENT |
CSA ISO/IEC TR 14516 : 2004
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR THE USE AND MANAGEMENT OF TRUSTED THIRD PARTY SERVICES |
INCITS/ISO/IEC 9796-3 : 2000
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DIGITAL SIGNATURE SCHEMES GIVING MESSAGE RECOVERY - PART 3: DISCRETE LOGARITHM BASED MECHANISMS |
CSA TELECOM ORGANIZATIONS PACKAGE : 2018
|
CONSISTS OF CAN/CSA-ISO/IEC 27000:18 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY; CAN/CSA-ISO/IEC 27001:14, INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS; CAN/CSA-ISO/IEC 27002:15 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR |
CSA ISO/IEC TR 14516 : 2004 : R2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR THE USE AND MANAGEMENT OF TRUSTED THIRD PARTY SERVICES |
CSA ISO/IEC 11770-1 : 2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 1: FRAMEWORK |
INCITS/ISO/IEC 15945 : 2002
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SPECIFICATION OF TTP SERVICES TO SUPPORT THE APPLICATION OF DIGITAL SIGNATURES |
INCITS/ISO/IEC 11770-5 : 2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 5: GROUP KEY MANAGEMENT |
CSA ISO/IEC 9798-5 : 2010
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 5: MECHANISMS USING ZERO-KNOWLEDGE TECHNIQUES |
BS ISO/IEC 18033-4 : 2005
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 4: STREAM CIPHERS |
I.S. EN 419212-1:2017
|
APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 1: INTRODUCTION AND COMMON DEFINITIONS |
S.R. CEN/TS 15480-2:2012
|
IDENTIFICATION CARD SYSTEMS - EUROPEAN CITIZEN CARD - PART 2: LOGICAL DATA STRUCTURES AND SECURITY SERVICES |
I.S. EN 62734:2015
|
INDUSTRIAL NETWORKS - WIRELESS COMMUNICATION NETWORK AND COMMUNICATION PROFILES - ISA 100.11A |
UNI CEN/TS 15480-2 : 2012
|
IDENTIFICATION CARD SYSTEMS - EUROPEAN CITIZEN CARD - PART 2: LOGICAL DATA STRUCTURES AND SECURITY SERVICES |
ECMA 386 : 3ED 2015
|
NFC-SEC-01: NFC-SEC CRYPTOGRAPHY STANDARD USING ECDH AND AES |
IEC 62351-9:2017
|
Power systems management and associated information exchange - Data and communications security - Part 9: Cyber security key management for power system equipment |
BIS IS 15256-4 : 2013
|
BANKING - KEY MANAGEMENT (RETAIL) - PART 4: ASYMMETRIC CRYPTOSYSTEMS - KEY MANAGEMENT AND LIFE CYCLE |
ISO/IEC TR 29149:2012
|
Information technology Security techniques Best practices for the provision and use of time-stamping services |
ISO/IEC 15945:2002
|
Information technology Security techniques Specification of TTP services to support the application of digital signatures |
ISO/IEC 27002:2013
|
Information technology Security techniques Code of practice for information security controls |
CEN ISO/TS 19299 : 2015
|
ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK (ISO/TS 19299:2015) |
EN 62734:2015
|
Industrial networks - Wireless communication network and communication profiles - ISA 100.11a |
CEN/TS 15480-2:2012
|
Identification card systems - European Citizen Card - Part 2: Logical data structures and security services |
ISO/IEC 11770-5:2011
|
Information technology Security techniques Key management Part 5: Group key management |
08/30169505 DC : DRAFT JULY 2008
|
BS ISO/IEC 13888-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NON-REPUDIATION - PART 1: GENERAL |
09/30202174 DC : 0
|
BS EN 50159 - RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - SAFETY RELATED COMMUNICATION IN TRANSMISSION SYSTEMS |
ISO/IEC 13888-1:2009
|
Information technology Security techniques Non-repudiation Part 1: General |
15/30293352 DC : 0
|
BS ISO/IEC 11770-6 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 6: KEY DERIVATION |
BS ISO/IEC 11770-6:2016
|
Information technology. Security techniques. Key management Key derivation |
EG 202 009-1 : 1.3.1
|
USER GROUP; QUALITY OF TELECOM SERVICES; PART 1: METHODOLOGY FOR IDENTIFICATION OF INDICATORS RELEVANT TO THE USERS |
12/30236952 DC : 0
|
BS ISO/IEC 20009-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ANONYMOUS ENTITY AUTHENTICATION - PART 2: MECHANISMS BASED ON SIGNATURES USING A GROUP PUBLIC KEY |
INCITS/ISO/IEC 9796-3 : 2000 : R2005
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DIGITAL SIGNATURE SCHEMES GIVING MESSAGE RECOVERY - PART 3: DISCRETE LOGARITHM BASED MECHANISMS |
09/30204756 DC : 0
|
BS ISO/IEC 11770-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 1: FRAMEWORK |
16/30335567 DC : 0
|
BS ISO/IEC 15946-5 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC TECHNIQUES BASED ON ELLIPTIC CURVES - PART 5: ELLIPTIC CURVE GENERATION |
12/30259506 DC : DRAFT JAN 2012
|
BS EN 62734 - INDUSTRIAL COMMUNICATION NETWORKS - FIELDBUS SPECIFICATIONS - WIRELESS SYSTEMS FOR INDUSTRIAL AUTOMATION: PROCESS CONTROL AND RELATED APPLICATIONS (BASED ON ISA 100.11A) |
BS ISO/IEC 20008-1:2013
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ANONYMOUS DIGITAL SIGNATURES - PART 1: GENERAL |
ISO/IEC 11770-4:2017
|
Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets |
CSA ISO/IEC 27002 : 2015
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS |
BS ISO/IEC 20009-2:2013
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ANONYMOUS ENTITY AUTHENTICATION - PART 2: MECHANISMS BASED ON SIGNATURES USING A GROUP PUBLIC KEY |
BS ISO 11568-4:2007
|
Banking. Key management (retail) Asymmetric cryptosystems. Key management and life cycle |
11/30228418 DC : DRAFT JUNE 2011
|
BS ISO/IEC 29192-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - LIGHTWEIGHT CRYPTOGRAPHY - PART 3: STREAM CIPHERS |
BS EN 62351-9:2017 (published 2017-07)
|
Power systems management and associated information exchange. Data and communications security Cyber security key management for power system equipment |
BS ISO/IEC 19790:2012
|
Information technology. Security techniques. Security requirements for cryptographic modules |
PD ISO/TR 14742:2010
|
Financial services. Recommendations on cryptographic algorithms and their use |
BS ISO/IEC 15945:2002
|
Information technology. Security techniques. Specification of TTP services to support the application of digital signatures |
UNE-ISO/IEC 27002:2015
|
Information technology -- Security techniques -- Code of practice for information security controls |
BS ISO/IEC 18367:2016
|
Information technology. Security techniques. Cryptographic algorithms and security mechanisms conformance testing |
CSA ISO/IEC 9798-6 : 2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 6: MECHANISMS USING MANUAL DATA TRANSFER |
04/30105372 DC : DRAFT DEC 2004
|
ISO/IEC 11770-4 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS |
ECMA 410 : 3ED 2017
|
NFC-SEC-03: NFC-SEC ENTITY AUTHENTICATION AND KEY AGREEMENT USING ASYMMETRIC CRYPTOGRAPHY |
CSA ISO/IEC 18014-1 : 2009
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - TIME-STAMPING SERVICES - PART 1: FRAMEWORK |
CAN/CSA-ISO/IEC 15945-04 (R2017)
|
Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures (Adopted ISO/IEC 15945:2002, first edition, 2002-02-01) |
BS ISO/IEC 18031 : 2011
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - RANDOM BIT GENERATION |
ISO/IEC 19286:2018
|
Identification cards — Integrated circuit cards — Privacy-enhancing protocols and services |
BS ISO/IEC 27002 : 2013
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS |
ETR 237 : 20001
|
SECURITY TECHNIQUES ADVISORY GROUP (STAG) - BASELINE SECURITY STANDARDS - FEATURES AND MECHANISMS |
CAN/CSA-ISO/IEC 18367:18
|
Information technology — Security techniques — Cryptographic algorithms and security mechanisms conformance testing (Adopted ISO/IEC 18367:2016, first edition, 2016-12-15) |
I.S. EN 14890-1:2008
|
APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES |
UNE-EN ISO/IEC 27002:2017
|
Information technology - Security techniques - Code of practice for information security controls (ISO/IEC 27002:2013 including Cor 1:2014 and Cor 2:2015) |
BS EN ISO 24534-4:2010+A1:2019
|
Automatic vehicle and equipment identification. Electronic registration identification (ERI) for vehicles Secure communications using asymmetrical techniques |
ISO/IEC 18370-2:2016
|
Information technology Security techniques Blind digital signatures Part 2: Discrete logarithm based mechanisms |
PREN 50159 : DRAFT 2009
|
RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - SAFETY-RELATED COMMUNICATION IN TRANSMISSION SYSTEMS |
ISO/IEC 11889-1:2015
|
Information technology Trusted platform module library Part 1: Architecture |
ISO/IEC 18367:2016
|
Information technology Security techniques Cryptographic algorithms and security mechanisms conformance testing |
ISO/IEC 18014-1:2008
|
Information technology Security techniques Time-stamping services Part 1: Framework |
CEN/TS 16702-1:2014
|
Electronic fee collection - Secure monitoring for autonomous toll systems - Part 1: Compliance checking |
04/30040717 DC : DRAFT JUL 2004
|
ISO/IEC 18033-2 - INFORMATION TECHNOLOGY - ENCRYPTION ALGORITHMS - PART 2: ASYMMETRIC CIPHERS |
CSA ISO/IEC 15946-3 : 2004
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC TECHNIQUES BASED ON ELLIPTIC CURVES - PART 3: KEY ESTABLISHMENT |
DIN EN ISO/IEC 27002 E : 2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS (ISO/IEC 27002:2013 INCLUDING COR 1:2014 AND COR 2:2015) |
15/30286868 DC : 0
|
BS ISO/IEC 14888-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DIGITAL SIGNATURES WITH APPENDIX - PART 3: DISCRETE LOGARITHM BASED MECHANISMS |
PD IEC/TS 62351-5:2013
|
Power systems management and associated information exchange. Data and communications security Security for IEC 60870-5 and derivatives |
03/652695 DC : 0
|
ISO/IEC 9798-5 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 5: MECHANISMS USING ZERO KNOWLEDGE TECHNIQUES |
BS EN ISO/IEC 27002:2017
|
Information technology. Security techniques. Code of practice for information security controls |
BS EN 50159:2010
|
RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - SAFETY-RELATED COMMUNICATION IN TRANSMISSION SYSTEMS |
07/30163724 DC : 0
|
BS ISO/IEC 24727-4 - IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARDS PROGRAMMING INTERFACE - PART 4: API ADMINISTRATION |
BS ISO/IEC 15946-5:2017 (published 2017-09)
|
Information technology. Security techniques. Cryptographic techniques based on elliptic curves Elliptic curve generation |
PD CEN/TS 16702-1:2014
|
Electronic fee collection. Secure monitoring for autonomous toll system Compliance checking |
DIN EN 14890-1:2009-03
|
APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES |
EN ISO 24534-4:2010
|
Automatic vehicle and equipment identification - Electronic Registration Identification (ERI) for vehicles - Part 4: Secure communications using asymmetrical techniques (ISO 24534-4:2010) |
07/30135157 DC : 0
|
BS ISO/IEC 18014-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - TIME-STAMPING SERVICES - PART 1: FRAMEWORK |
INCITS/ISO/IEC 18031 : 2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - RANDOM BIT GENERATION |
BS ISO/IEC 14888-3 : 2006
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DIGITAL SIGNATURES WITH APPENDIX - PART 3: DISCRETE LOGARITHM BASED MECHANISMS |
07/30161079 DC : 0
|
BS EN 14890-1 - APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES |
12/30255293 DC : 0
|
BS EN 14890-1 - APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES |
16/30345808 DC : 0
|
BS EN 419212-1 - APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 1: INTRODUCTION AND COMMON DEFINITIONS |
BS ISO/IEC 29150:2011
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SIGNCRYPTION |
BS ISO/IEC 19286:2018
|
Identification cards. Integrated circuit cards. Privacy-enhancing protocols and services |
CAN/CSA-ISO/IEC 11770-1:12 (R2016)
|
Information technology - Security techniques - Key management - Part 1: Framework (Adopted ISO/IEC 11770-1:2010, second edition, 2010-12-01) |
BS EN ISO 12855:2015
|
Electronic fee collection. Information exchange between service provision and toll charging |
DIN EN ISO/IEC 27002:2017-06
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS (ISO/IEC 27002:2013 INCLUDING COR 1:2014 AND COR 2:2015) |
CSA ISO/IEC 18033-4 : 2013
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 4: STREAM CIPHERS |
CAN/CSA-ISO/IEC 18031:13 (R2017)
|
Information technology - Security techniques - Random bit generation (Adopted ISO/IEC 18031:2011, second edition, 2011-11-15) |
BS EN 62734:2015
|
Industrial networks. Wireless communication network and communication profiles. ISA 100.11a |
CSA ISO/IEC 9798-1 :2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 1: GENERAL |
DIN CEN ISO/TS 19299;DIN SPEC 74125:2016-02
|
ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK (ISO/TS 19299:2015) |
CSA ISO/IEC 18031 : 2013
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - RANDOM BIT GENERATION |
CSA ISO/IEC 14888-3 : 2018
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DIGITAL SIGNATURES WITH APPENDIX - PART 3: DISCRETE LOGARITHM BASED MECHANISMS |
BS ISO/IEC 13888-1:2009
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NON-REPUDIATION - PART 1: GENERAL |
INCITS/ISO/IEC 9798-6 : 2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 6: MECHANISMS USING MANUAL DATA TRANSFER |
ISO 15764:2004
|
Road vehicles Extended data link security |
INCITS/ISO/IEC 15946-1 : 2002
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC TECHNIQUES BASED ON ELLIPTIC CURVES - PART 1: GENERAL |
S.R. CEN/TS 16702-1:2014
|
ELECTRONIC FEE COLLECTION - SECURE MONITORING FOR AUTONOMOUS TOLL SYSTEMS - PART 1: COMPLIANCE CHECKING |
ISO/IEC 18031:2011
|
Information technology Security techniques Random bit generation |
ECMA 409 : 2ED 2015
|
NFC-SEC-02: NFC-SEC CRYPTOGRAPHY STANDARD USING ECDH-256 AND AES-GCM |
S.R. CEN ISO/TS 19299:2015
|
ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK (ISO/TS 19299:2015) |
ISO/IEC 15946-5:2017
|
Information technology Security techniques Cryptographic techniques based on elliptic curves Part 5: Elliptic curve generation |
BS ISO/IEC 11770-4:2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS |
NF ISO 11568-4 : 1999
|
BANKING - KEY MANAGEMENT (RETAIL) - PART 4: KEY MANAGEMENT TECHNIQUES FOR PUBLIC KEY CRYPTOSYSTEMS |
ISO 24534-4:2010
|
Automatic vehicle and equipment identification — Electronic registration identification (ERI) for vehicles — Part 4: Secure communications using asymmetrical techniques |
ISO/IEC 18033-4:2011
|
Information technology — Security techniques — Encryption algorithms — Part 4: Stream ciphers |
ISO/IEC 9798-5:2009
|
Information technology Security techniques Entity authentication Part 5: Mechanisms using zero-knowledge techniques |
ISO/TR 14742:2010
|
Financial services Recommendations on cryptographic algorithms and their use |
IEC TS 62351-5:2013
|
Power systems management and associated information exchange - Data and communications security - Part 5: Security for IEC 60870-5 and derivatives |
S.R. CEN ISO/TS 24534-4:2008
|
AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES - PART 4: SECURE COMMUNICATIONS USING ASYMMETRICAL TECHNIQUES |
ISO/TS 19299:2015
|
Electronic fee collection Security framework |
UNE-EN 50159:2011
|
Railway applications - Communication, signalling and processing systems - Safety-related communication in transmission systems |
IEC 62734:2014
|
Industrial networks - Wireless communication network and communication profiles - ISA 100.11a |
CEI EN 50159 : 2012
|
RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - SAFETY-RELATED COMMUNICATION IN TRANSMISSION SYSTEMS |
UNI EN 419212-1 : 2015
|
APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES |
UNI CEI ISO/IEC 18013-3 : 2011
|
INFORMATION TECHNOLOGY - PERSONAL IDENTIFICATION - ISO-COMPLIANT DRIVING LICENCE - PART 3: ACCESS CONTROL, AUTHENTICATION AND INTEGRITY VALIDATION |
BS ISO/IEC 11770-1:2010
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 1: FRAMEWORK |
16/30343872 DC : DRAFT JUNE 2016
|
BS EN 62351-9 ED1 - POWER SYSTEMS MANAGEMENT AND ASSOCIATED INFORMATION EXCHANGE - DATA ANDCOMMUNICATIONS SECURITY - PART 9: CYBER SECURITY KEY MANAGEMENT FOR POWER SYSTEM EQUIPMENT |
BS ISO/IEC 18370-2:2016
|
Information technology. Security techniques. Blind digital signatures Discrete logarithm based mechanisms |
PREN 419212-1 : DRAFT 2016
|
APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 1: INTRODUCTION AND COMMON DEFINITIONS |
07/30153606 DC : 0
|
BS ISO 22895 - FINANCIAL SERVICES - SECURITY - CRYPTOGRAPHIC SYNTAX SCHEME |
BS ISO/IEC 11770-5:2011
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 5: GROUP KEY MANAGEMENT |
CSA INFORMATION SECURITY PACKAGE : 2018
|
CONSISTS OF CAN/CSA-ISO/IEC 27000:18 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY; CAN/CSA-ISO/IEC 27001:14, INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS; CAN/CSA-ISO/IEC 27002:15 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION |
INCITS/ISO/IEC 27002 : 2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS |
BS ISO/IEC TR 14516:2002
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR THE USE AND MANAGEMENT OF TRUSTED THIRD PARTY SERVICES |
CSA ISO/IEC 18014-1 : 2009 : R2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - TIME-STAMPING SERVICES - PART 1: FRAMEWORK |
UNI CEN/TS 16702-1 : 2014
|
ELECTRONIC FEE COLLECTION - SECURE MONITORING FOR AUTONOMOUS TOLL SYSTEMS - PART 1: COMPLIANCE CHECKING |
BS ISO/IEC 13888-2:2010
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NON-REPUDIATION - PART 2: MECHANISMS USING SYMMETRIC TECHNIQUES |
DIN EN 14890-1 E : 2009
|
APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES |
UNE-EN ISO 24534-4:2012
|
Automatic vehicle and equipment identification - Electronic Registration Identification (ERI) for vehicles - Part 4: Secure communications using asymmetrical techniques (ISO 24534-4:2010) |
DIN CEN ISO/TS 19299;DIN SPEC 74125:2016-02
|
ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK (ISO/TS 19299:2015) |
DD CEN ISO/TS 24534-4:2008
|
AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES - PART 4: SECURE COMMUNICATIONS USING ASYMMETRICAL TECHNIQUES |
02/652659 DC : DRAFT NOV 2002
|
ISO/IEC FCD 13888-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NON-REPUDIATION - PART 1: GENERAL |
PD CEN ISO/TS 19299:2015
|
Electronic fee collection. Security framework |
08/30195403 DC : 0
|
BS EN ISO 24534-4 - AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES - PART 4: SECURE COMMUNICATIONS USING ASYMMETRICAL TECHNIQUES |
BS EN ISO 27799:2008
|
HEALTH INFORMATICS - INFORMATION SECURITY MANAGEMENT IN HEALTH USING ISO/IEC 27002 (ISO 27799:2016) |
04/30093313 DC : DRAFT JUN 2004
|
ISO/IEC 9798-6 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 6: MECHANISMS USING MANUAL DATA TRANSFER |
CSA ISO/IEC 13888-1:2010
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NON-REPUDIATION - PART 1: GENERAL |
UNI CEN/TS 16439 : 2013
|
ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK |
I.S. EN ISO 12855:2015
|
ELECTRONIC FEE COLLECTION - INFORMATION EXCHANGE BETWEEN SERVICE PROVISION AND TOLL CHARGING (ISO 12855:2015) |
07/30161082 DC : 0
|
BS EN 14890-2 - APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 2: ADDITIONAL SERVICES |
CAN/CSA-ISO/IEC 9798-1:12 (R2016)
|
Information technology - Security techniques - Entity authentication - Part 1: General (Adopted ISO/IEC 9798-1:2010, third edition, 2010-07-01) |
CAN/CSA-ISO/IEC 9798-6:12 (R2016)
|
Information technology - Security techniques - Entity authentication - Part 6: Mechanisms using manual data transfer (Adopted ISO/IEC 9798-6:2010, second edition, 2010-12-01) |
CSA ISO/IEC 11770-4 : 2007
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS |
CSA ISO/IEC 15945 : 2004
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SPECIFICATION OF TTP SERVICES TO SUPPORT THE APPLICATION OF DIGITAL SIGNATURES |
CAN/CSA-ISO/IEC 18033-4:13 (R2017)
|
Information technology - Security techniques - Encryption algorithms - Part 4: Stream ciphers (Adopted ISO/IEC 18033-4:2011, second edition, 2011-12-15) |
16/30335688 DC : 0
|
BS ISO/IEC 11770-4 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS |
CSA ISO/IEC 11770-4 : 2007 : R2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS |
CSA ISO/IEC 11770-4 : 2007 : INC : COR 1 : 2010
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS |
ISO/IEC 11770-6:2016
|
Information technology Security techniques Key management Part 6: Key derivation |
INCITS/ISO/IEC 18033-4 : 2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 4: STREAM CIPHERS |
ISO/IEC 19790:2012
|
Information technology Security techniques Security requirements for cryptographic modules |
I.S. EN ISO/IEC 27002:2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS (ISO/IEC 27002:2013 INCLUDING COR 1:2014 AND COR 2:2015) |
I.S. ISO/IEC 27002:2013
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS |
UNI EN ISO 24534-4 : 2011
|
AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES - PART 4: SECURE COMMUNICATIONS USING ASYMMETRICAL TECHNIQUES |
CEI UNI ISO/IEC 27002 : 2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS |
ISO/IEC 9798-6:2010
|
Information technology Security techniques Entity authentication Part 6: Mechanisms using manual data transfer |
ISO/IEC 14888-3:2016
|
Information technology Security techniques Digital signatures with appendix Part 3: Discrete logarithm based mechanisms |
I.S. CWA 14890-2:2004
|
APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 2: ADDITIONAL SERVICES |
ISO/IEC 29167-16:2015
|
Information technology — Automatic identification and data capture techniques — Part 16: Crypto suite ECDSA-ECDH security services for air interface communications |
I.S. EN ISO 24534-4:2010&A1:2019
|
AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES - PART 4: SECURE COMMUNICATIONS USING ASYMMETRICAL TECHNIQUES |
ISO/IEC 11770-1:2010
|
Information technology Security techniques Key management Part 1: Framework |
ISO/IEC 9798-1:2010
|
Information technology Security techniques Entity authentication Part 1: General |
ISO/IEC 15444-8:2007
|
Information technology JPEG 2000 image coding system: Secure JPEG 2000 Part 8: |
IEC 62280:2014
|
Railway applications - Communication, signalling and processing systems - Safety related communication in transmission systems |
EN 50159:2010
|
Railway applications - Communication, signalling and processing systems - Safety-related communication in transmission systems |
ISO 12855:2015
|
Electronic fee collection Information exchange between service provision and toll charging |
ISO/TS 24534-4:2008
|
Automatic vehicle and equipment identification Electronic Registration Identification (ERI) for vehicles Part 4: Secure communications using asymmetrical techniques |
EN ISO/IEC 27002:2017
|
Information technology - Security techniques - Code of practice for information security controls (ISO/IEC 27002:2013 including Cor 1:2014 and Cor 2:2015) |
EN ISO 27799:2016
|
Health informatics - Information security management in health using ISO/IEC 27002 (ISO 27799:2016) |
EN 419212-1:2017
|
Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services - Part 1: Introduction and common definitions |
EN ISO 12855:2015 (edition 2)
|
Electronic fee collection - Information exchange between service provision and toll charging (ISO 12855:2015) |
EN 14890-1:2008
|
Application Interface for smart cards used as Secure Signature Creation Devices - Part 1: Basic services |
15/30268544 DC : 0
|
BS ISO/IEC 18370-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - BLIND DIGITAL SIGNATURES - PART 1: GENERAL |
INCITS/ISO/IEC 9798-5 : 2010
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 5: MECHANISMS USING ZERO-KNOWLEDGE TECHNIQUES |
ISO/IEC TR 14516:2002
|
Information technology Security techniques Guidelines for the use and management of Trusted Third Party services |
ISO/IEC 14888-1:2008
|
Information technology Security techniques Digital signatures with appendix Part 1: General |
BS ISO/IEC 11889-1:2009
|
INFORMATION TECHNOLOGY - TRUSTED PLATFORM MODULE - PART 1: LIBRARY - ARCHITECTURE |
I.S. EN 62351-9:2017
|
POWER SYSTEMS MANAGEMENT AND ASSOCIATED INFORMATION EXCHANGE - DATA AND COMMUNICATIONS SECURITY - PART 9: CYBER SECURITY KEY MANAGEMENT FOR POWER SYSTEM EQUIPMENT |
ISO/IEC 13157-4:2016
|
Information technology Telecommunications and information exchange between systems NFC Security Part 4: NFC-SEC entity authentication and key agreement using asymmetric cryptography |
BS ISO/IEC 9798-5:2009
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 5: MECHANISMS USING ZERO-KNOWLEDGE TECHNIQUES |
BS ISO/IEC 14888-1:1998
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DIGITAL SIGNATURES WITH APPENDIX - GENERAL |
ANSI X9.42 : 2003(R2013)
|
PUBLIC KEY CRYPTOGRAPHY FOR THE FINANCIAL SERVICES: AGREEMENT OF SYMMETRIC KEYS USING DISCRETE LOGARITHM CRYPTOGRAPHY |
PD ISO/IEC TR 29149:2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - BEST PRACTICES FOR THE PROVISION AND USE OF TIME-STAMPING SERVICES |
09/30169508 DC : 0
|
BS ISO/IEC 13888-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NON-REPUDIATION - PART 2: MECHANISMS USING SYMMETRIC TECHNIQUES |
ECMA 411 : 3ED 2017
|
NFC-SEC-04: NFC-SEC ENTITY AUTHENTICATION AND KEY AGREEMENT USING SYMMETRIC CRYPTOGRAPHY |
CSA ISO/IEC 15945 : 2004 : R2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SPECIFICATION OF TTP SERVICES TO SUPPORT THE APPLICATION OF DIGITAL SIGNATURES |
PD CEN/TS 16439:2013
|
Electronic fee collection. Security framework |
05/30112566 DC : DRAFT JAN 2005
|
ISO 11568-4 - BANKING - KEY MANAGEMENT (RETAIL) - PART 4: ASYMMETRIC CRYPTOSYSTEMS - KEY MANAGEMENT AND LIFE CYCLE |
BS ISO/IEC 9798-6:2010
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 6: MECHANISMS USING MANUAL DATA TRANSFER |
05/30116896 DC : DRAFT SEP 2005
|
ISO 19092-1 - FINANCIAL SERVICES - BIOMETRICS - PART 1: SECURITY FRAMEWORK |
07/30105115 DC : 0
|
BS ISO/IEC 19772 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - AUTHENTICATED ENCRYPTION |
CAN/CSA-ISO/IEC TR 14516-04 (R2017)
|
Information Technology - Security Techniques - Guidelines for the use and Management of Trusted Third Party Services (Adopted ISO/IEC TR 14516:2002, first edition, 2002-06-15) |
CSA ISO/IEC 13888-1 : 2010 : R2015
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NON-REPUDIATION - PART 1: GENERAL |
INCITS/ISO/IEC 11770-4 : 2008
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS |
INCITS/ISO/IEC 15945 : 2002 : R2007
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SPECIFICATION OF TTP SERVICES TO SUPPORT THE APPLICATION OF DIGITAL SIGNATURES |
ISO/IEC 20009-2:2013
|
Information technology Security techniques Anonymous entity authentication Part 2: Mechanisms based on signatures using a group public key |
ISO/IEC 13157-5:2016
|
Information technology Telecommunications and information exchange between systems NFC Security Part 5: NFC-SEC entity authentication and key agreement using symmetric cryptography |
I.S. EN 50159-2:2001
|
RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - PART 2: SAFETY RELATED COMMUNICATION IN OPEN TRANSMISSION SYSTEMS |
CAN/CSA-ISO/IEC 11889-1:16
|
Information technology Trusted Platform Module Library Part 1: Architecture (Adopted ISO/IEC 11889-1:2015, second edition, 2015-12-15) |
ISO/IEC 24767-2:2009
|
Information technology Home network security Part 2: Internal security services: Secure Communication Protocol for Middleware (SCPM) |
IEEE 1815 : 2012
|
ELECTRIC POWER SYSTEMS COMMUNICATIONS - DISTRIBUTED NETWORK PROTOCOL (DNP3) |
ISO/IEC 20008-1:2013
|
Information technology Security techniques Anonymous digital signatures Part 1: General |
S.R. CEN/TS 16439:2013
|
ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK |
ISO/IEC 13157-3:2016
|
Information technology Telecommunications and information exchange between systems NFC Security Part 3: NFC-SEC cryptography standard using ECDH-256 and AES-GCM |
ISO/IEC 15946-3:2002
|
Information technology Security techniques Cryptographic techniques based on elliptic curves Part 3: Key establishment |
CAN/CSA-ISO/IEC 29167-16:16
|
Information technology Automatic identification and data capture techniques Part 16: Crypto suite ECDSA-ECDH security services for air interface communications (Adopted ISO/IEC 29167-16:2015, first edition, 2015-11-15) |
UNI CEI ISO/IEC 27002 : 2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS |
I.S. EN 50159:2010
|
RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - SAFETY-RELATED COMMUNICATION IN TRANSMISSION SYSTEMS |
ISO/IEC 29150:2011
|
Information technology — Security techniques — Signcryption |
ISO 11568-4:2007
|
Banking — Key management (retail) — Part 4: Asymmetric cryptosystems — Key management and life cycle |
CEN/TS 16439:2013
|
Electronic fee collection - Security framework |
EN 50159-2 : 2001 COR 2010
|
RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - PART 2: SAFETY RELATED COMMUNICATION IN OPEN TRANSMISSION SYSTEMS |
CEN ISO/TS 24534-4:2008
|
Automatic vehicle and equipment identification - Electronic Registration Identification (ERI) for vehicles - Part 4: Secure communications using asymmetrical techniques (ISO/TS 24534-4:2008) |
EN 62351-9:2017
|
Power systems management and associated information exchange - Data and communications security - Part 9: Cyber security key management for power system equipment |