05/30108761 DC : DRAFT JULY 2005
|
ISO/IEC 14888-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DIGITAL SIGNATURES WITH APPENDIX - PART 3: DISCRETE LOGARITHM BASED MECHANISMS |
BS ISO/IEC 14888-2:2008
|
Information technology. Security techniques. Digital signatures with appendix Integer factorization based mechanisms |
BS ISO/IEC 9796-3:2006
|
Information technology. Security techniques. Digital signature schemes giving message recovery Discrete logarithm based mechanisms |
08/30169511 DC : DRAFT DEC 2008
|
BS ISO/IEC 13888-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NON-REPUDIATION - PART 3: MECHANISMS USING ASYMMETRIC TECHNIQUES |
09/30204721 DC : 0
|
BS ISO/IEC 9798-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 1: GENERAL |
BS ISO/IEC 9798-1:2010
|
Information technology. Security techniques. Entity authentication General |
INCITS/ISO/IEC 15946-3 : 2002
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC TECHNIQUES BASED ON ELLIPTIC CURVES - PART 3: KEY ESTABLISHMENT |
BS ISO/IEC 17799 : 2005
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY MANAGEMENT |
INCITS/ISO/IEC 9796-3 : 2000
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DIGITAL SIGNATURE SCHEMES GIVING MESSAGE RECOVERY - PART 3: DISCRETE LOGARITHM BASED MECHANISMS |
INCITS/ISO/IEC 15945 : 2002
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SPECIFICATION OF TTP SERVICES TO SUPPORT THE APPLICATION OF DIGITAL SIGNATURES |
CSA ISO/IEC 14888-2 : 2009 : INC : COR 1 : 2016 : R201400
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DIGITAL SIGNATURES WITH APPENDIX - PART 2: INTEGER FACTORIZATION BASED MECHANISMS |
ISO/IEC TR 29149:2012
|
Information technology Security techniques Best practices for the provision and use of time-stamping services |
CEN ISO/TS 19299 : 2015
|
ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK (ISO/TS 19299:2015) |
08/30169505 DC : DRAFT JULY 2008
|
BS ISO/IEC 13888-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NON-REPUDIATION - PART 1: GENERAL |
10/30192164 DC : DRAFT JUNE 2010
|
BS ISO/IEC 29150 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SIGNCRYPTION |
04/30062174 DC : DRAFT JUN 2004
|
ISO/IEC FCD 17799 - INFORMATION TECHNOLOGY - CODE OF PRACTICE FOR INFORMATION SECURITY MANAGEMENT |
02/652466 DC : DRAFT MAY 2002
|
ISO/IEC FCD 15946-4 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC TECHNIQUES BASED ON ELLIPTIC CURVES - PART 4: DIGITAL SIGNATURES GIVING MESSAGE RECOVERY |
INCITS/ISO/IEC 17799 : 2005
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY MANAGEMENT |
BS ISO/IEC 15945:2002
|
Information technology. Security techniques. Specification of TTP services to support the application of digital signatures |
CAN/CSA-ISO/IEC 15945-04 (R2017)
|
Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures (Adopted ISO/IEC 15945:2002, first edition, 2002-02-01) |
CSA ISO/IEC 14888-2 : 2009 : R2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DIGITAL SIGNATURES WITH APPENDIX - PART 2: INTEGER FACTORIZATION BASED MECHANISMS |
ISO/IEC 15946-4:2004
|
Information technology Security techniques Cryptographic techniques based on elliptic curves Part 4: Digital signatures giving message recovery |
BS 7799-1(2005) : 2005
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY MANAGEMENT |
BS ISO/IEC 17960:2015
|
Information technology. Programming languages, their environments and system software interfaces. Code signing for source code |
ISO/IEC 15945:2002
|
Information technology — Security techniques — Specification of TTP services to support the application of digital signatures |
15/30286868 DC : 0
|
BS ISO/IEC 14888-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DIGITAL SIGNATURES WITH APPENDIX - PART 3: DISCRETE LOGARITHM BASED MECHANISMS |
07/30163724 DC : 0
|
BS ISO/IEC 24727-4 - IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARDS PROGRAMMING INTERFACE - PART 4: API ADMINISTRATION |
TR 102 272 : 1.1.1
|
ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); ASN.1 FORMAT FOR SIGNATURE POLICIES |
BS ISO/IEC 15946-4:2004
|
Information technology. Security techniques. Cryptographic techniques based on elliptic curves Digital signatures giving message recovery |
BS ISO/IEC 14888-3 : 2006
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DIGITAL SIGNATURES WITH APPENDIX - PART 3: DISCRETE LOGARITHM BASED MECHANISMS |
07/30161079 DC : 0
|
BS EN 14890-1 - APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES |
12/30186137 DC : 0
|
BS ISO/IEC 27002 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS |
BS ISO/IEC 29150:2011
|
Information technology. Security techniques. Signcryption |
CSA ISO/IEC 9798-1 :2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 1: GENERAL |
DIN CEN ISO/TS 19299;DIN SPEC 74125:2016-02
|
ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK (ISO/TS 19299:2015) |
INCITS/ISO/IEC 15945 : 2002 : R2007
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SPECIFICATION OF TTP SERVICES TO SUPPORT THE APPLICATION OF DIGITAL SIGNATURES |
CSA ISO/IEC 14888-3 : 2018
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DIGITAL SIGNATURES WITH APPENDIX - PART 3: DISCRETE LOGARITHM BASED MECHANISMS |
ISO 15764:2004
|
Road vehicles Extended data link security |
S.R. CEN ISO/TS 19299:2015
|
ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK (ISO/TS 19299:2015) |
CAN/CSA-ISO/IEC 17960:16
|
Information technology Programming languages, their environments and system software interfaces Code signing for source code (Adopted ISO/IEC 17960:2015, first edition, 2015-09-01) |
ISO/TS 19299:2015
|
Electronic fee collection Security framework |
07/30154069 DC : 0
|
BS ISO/IEC 24727-3 - IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARD PROGRAMMING INTERFACES - PART 3: APPLICATION INTERFACE |
04/30117200 DC : DRAFT DEC 2004
|
ISO/IEC 9796-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DIGITAL SIGNATURE SCHEMES GIVING MESSAGE RECOVERY - PART 3: DISCRETE LOGARITHM BASED MECHANISMS |
CSA ISO/IEC 15946-4 : 2005
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC TECHNIQUES BASED ON ELLIPTIC CURVES - PART 4: DIGITAL SIGNATURES GIVING MESSAGE RECOVERY |
DIN CEN ISO/TS 19299;DIN SPEC 74125:2016-02
|
ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK (ISO/TS 19299:2015) |
PD CEN ISO/TS 19299:2015
|
Electronic fee collection. Security framework |
UNI CEN/TS 16439 : 2013
|
ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK |
03/652682 DC : DRAFT NOV 2003
|
BS ISO/IEC TR 15446 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDE FOR THE PRODUCTION OF PROTECTION PROFILES AND SECURITY TARGETS |
06/30108758 DC : DRAFT JAN 2006
|
ISO/IEC 14888-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DIGITAL SIGNATURES WITH APPENDIX - PART 2: INTEGER FACTORIZATION BASED MECHANISMS |
ISO/IEC 9796-3:2006
|
Information technology — Security techniques — Digital signature schemes giving message recovery — Part 3: Discrete logarithm based mechanisms |
07/30161082 DC : 0
|
BS EN 14890-2 - APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 2: ADDITIONAL SERVICES |
CAN/CSA-ISO/IEC 9798-1:12 (R2016)
|
Information technology - Security techniques - Entity authentication - Part 1: General (Adopted ISO/IEC 9798-1:2010, third edition, 2010-07-01) |
CSA ISO/IEC 15945 : 2004
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SPECIFICATION OF TTP SERVICES TO SUPPORT THE APPLICATION OF DIGITAL SIGNATURES |
CSA ISO/IEC 14888-2 :2009
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DIGITAL SIGNATURES WITH APPENDIX - PART 2: INTEGER FACTORIZATION BASED MECHANISMS |
ISO/IEC 17799:2005
|
Information technology Security techniques Code of practice for information security management |
ISO/IEC 17960:2015
|
Information technology Programming languages, their environments and system software interfaces Code signing for source code |
ISO/IEC 14888-2:2008
|
Information technology Security techniques Digital signatures with appendix Part 2: Integer factorization based mechanisms |
ISO/IEC 14888-3:2016
|
Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms |
ISO/IEC 9798-1:2010
|
Information technology Security techniques Entity authentication Part 1: General |
ISO/IEC 15444-8:2007
|
Information technology — JPEG 2000 image coding system: Secure JPEG 2000 — Part 8: |
UNE-ETSI/TS 101733 V1.2.2:2011
|
Electronic signature formats. |
INCITS/ISO/IEC 9796-3 : 2000 : R2005
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DIGITAL SIGNATURE SCHEMES GIVING MESSAGE RECOVERY - PART 3: DISCRETE LOGARITHM BASED MECHANISMS |
PD ISO/IEC TR 29149:2012
|
Information technology. Security techniques. Best practices for the provision and use of time-stamping services |
CSA ISO/IEC 15945 : 2004 : R2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SPECIFICATION OF TTP SERVICES TO SUPPORT THE APPLICATION OF DIGITAL SIGNATURES |
PD CEN/TS 16439:2013
|
Electronic fee collection. Security framework |
S.R. CEN/TS 16439:2013
|
ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK |
ISO/IEC 29150:2011
|
Information technology — Security techniques — Signcryption |
CEN/TS 16439:2013
|
Electronic fee collection - Security framework |