10/30135070 DC : DRAFT NOV 2010
|
BS ISO/IEC 9797-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MESSAGE AUTHENTICATION CODES (MACS) - PART 3: MECHANISMS USING A UNIVERSAL HASH FUNCTION |
13/30257954 DC : 0
|
BS ISO/IEC 11770-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 3: MECHANISMS USING ASYMMETRIC TECHNIQUES |
11/30231373 DC : 0
|
BS ISO 11568-2 - FINANCIAL SERVICES - KEY MANAGEMENT (RETAIL) - PART 2: SYMMETRIC CIPHERS, THEIR KEY MANAGEMENT AND LIFE CYCLE |
15/30327554 DC : 0
|
BS ISO/IEC 13157-2 - INFORMATION TECHNOLOGY - TELECOMMUNICATIONS AND INFORMATION EXCHANGE BETWEEN SYSTEMS - NFC SECURITY - PART 2: NFC-SEC CRYPTOGRAPHY STANDARD USING ECDH AND AES |
BS ISO/IEC 14888-2:2008
|
Information technology. Security techniques. Digital signatures with appendix Integer factorization based mechanisms |
ISO/IEC 13157-2:2016
|
Information technology Telecommunications and information exchange between systems NFC Security Part 2: NFC-SEC cryptography standard using ECDH and AES |
14/30249464 DC : 0
|
BS ISO/IEC 18033-5 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 5: IDENTITY-BASED CIPHERS |
ISO/IEC 9798-2:2008
|
Information technology Security techniques Entity authentication Part 2: Mechanisms using symmetric encipherment algorithms |
TS 103 532 : 1.1.1
|
CYBER; ATTRIBUTE BASED ENCRYPTION FOR ATTRIBUTE BASED ACCESS CONTROL |
CSA ISO/IEC 9798-2:2010
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 2: MECHANISMS USING SYMMETRIC ENCIPHERMENT ALGORITHMS |
09/30204721 DC : 0
|
BS ISO/IEC 9798-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 1: GENERAL |
CSA ISO/IEC 11770-4 : 2007 : R2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS |
BS ISO/IEC 9798-1:2010
|
Information technology. Security techniques. Entity authentication General |
INCITS/ISO/IEC 11770-4 : 2008
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS |
CSA ISO/IEC 9798-2 : 2010 : R2015
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 2: MECHANISMS USING SYMMETRIC ENCIPHERMENT ALGORITHMS |
CSA ISO/IEC 11770-1 : 2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 1: FRAMEWORK |
CAN/CSA-ISO/IEC 18033-2:06 (R2016)
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 2: ASYMMETRIC CIPHERS |
CSA ISO/IEC 11770-2 : 2009 : INC : COR 1 : 2010 : R2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 2: MECHANISMS USING SYMMETRIC TECHNIQUES |
BS ISO/IEC 18033-2 : 2006
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 2: ASYMMETRIC CIPHERS |
I.S. EN 62734:2015
|
INDUSTRIAL NETWORKS - WIRELESS COMMUNICATION NETWORK AND COMMUNICATION PROFILES - ISA 100.11A |
ISO/IEC 18033-2:2006
|
Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers |
ECMA 386 : 3ED 2015
|
NFC-SEC-01: NFC-SEC CRYPTOGRAPHY STANDARD USING ECDH AND AES |
CEN/TS 16702-2:2015
|
Electronic fee collection - Secure monitoring for autonomous toll systems - Part 2: Trusted recorder |
CEN ISO/TS 19299 : 2015
|
ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK (ISO/TS 19299:2015) |
EN 62734:2015
|
Industrial networks - Wireless communication network and communication profiles - ISA 100.11a |
ISO 11568-2:2012
|
Financial services — Key management (retail) — Part 2: Symmetric ciphers, their key management and life cycle |
ISO/IEC 11770-5:2011
|
Information technology Security techniques Key management Part 5: Group key management |
ISO 13491-2:2017
|
Financial services — Secure cryptographic devices (retail) — Part 2: Security compliance checklists for devices used in financial transactions |
CSA ISO/IEC 18033-2 :2006
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 2: ASYMMETRIC CIPHERS |
BS ISO/IEC 9798-2:2008
|
Information technology. Security techniques. Entity authentication Mechanisms using symmetric encipherment algorithms |
BS ISO/IEC 24713-2:2008
|
Information technology. Biometric profiles for interoperability and data interchange Physical access control for employees at airports |
13/30275209 DC : 0
|
BS ISO/IEC 29167-1 - INFORMATION TECHNOLOGY - AUTOMATIC IDENTIFICATION AND DATA CAPTURE TECHNIQUES - PART 1: SECURITY SERVICES FOR RFIP AIR INTERFACES |
15/30293352 DC : 0
|
BS ISO/IEC 11770-6 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 6: KEY DERIVATION |
S.R. CEN/TS 16702-2:2015
|
ELECTRONIC FEE COLLECTION - SECURE MONITORING FOR AUTONOMOUS TOLL SYSTEMS - PART 2: TRUSTED RECORDER |
BS ISO/IEC 11770-6:2016
|
Information technology. Security techniques. Key management Key derivation |
ISO/IEC 9797-3:2011
|
Information technology — Security techniques — Message Authentication Codes (MACs) — Part 3: Mechanisms using a universal hash-function |
09/30204756 DC : 0
|
BS ISO/IEC 11770-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 1: FRAMEWORK |
14/30275227 DC : 0
|
BS ISO/IEC 29167-17 - INFORMATION TECHNOLOGY - AUTOMATIC IDENTIFICATION AND DATA CAPTURE TECHNIQUES - PART 17: AIR INTERFACE FOR SECURITY SERVICES CRYPTO SUITE CRYPTOGPS |
ISO/IEC 11770-4:2017
|
Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets |
PD ISO/TS 12812-2:2017
|
Core banking. Mobile financial services Security and data protection for mobile financial services |
BS ISO/IEC 19790:2012
|
Information technology. Security techniques. Security requirements for cryptographic modules |
PD ISO/TR 14742:2010
|
Financial services. Recommendations on cryptographic algorithms and their use |
S.R. CEN/TS 16439:2013
|
ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK |
BS ISO/IEC 18367:2016
|
Information technology. Security techniques. Cryptographic algorithms and security mechanisms conformance testing |
GS NFV-SEC 012 : 3.1.1
|
NETWORK FUNCTIONS VIRTUALISATION (NFV) RELEASE 3; SECURITY; SYSTEM ARCHITECTURE SPECIFICATION FOR EXECUTION OF SENSITIVE NFV COMPONENTS |
ECMA 410 : 3ED 2017
|
NFC-SEC-03: NFC-SEC ENTITY AUTHENTICATION AND KEY AGREEMENT USING ASYMMETRIC CRYPTOGRAPHY |
BS ISO 13491-2:2017
|
Financial services. Secure cryptographic devices (retail) Security compliance checklists for devices used in financial transactions |
INCITS/ISO/IEC 9798-2 : 2010
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 2: MECHANISMS USING SYMMETRIC ENCIPHERMENT ALGORITHMS |
CSA ISO/IEC 9798-2 : 2010 : INC : COR 2 : 2013
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 2: MECHANISMS USING SYMMETRIC ENCIPHERMENT ALGORITHMS |
INCITS/ISO/IEC 18033-2 : 2008
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 2: ASYMMETRIC CIPHERS |
CSA ISO/IEC 14888-2 : 2009 : R2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DIGITAL SIGNATURES WITH APPENDIX - PART 2: INTEGER FACTORIZATION BASED MECHANISMS |
ISO/IEC 19790:2012
|
Information technology — Security techniques — Security requirements for cryptographic modules |
BS ISO 9564-1:2017
|
Financial services. Personal Identification Number (PIN) management and security Basic principles and requirements for PINs in card-based systems |
CAN/CSA-ISO/IEC 18367:18
|
Information technology — Security techniques — Cryptographic algorithms and security mechanisms conformance testing (Adopted ISO/IEC 18367:2016, first edition, 2016-12-15) |
ISO/TS 12812-2:2017
|
Core banking — Mobile financial services — Part 2: Security and data protection for mobile financial services |
ISO/IEC 18370-2:2016
|
Information technology Security techniques Blind digital signatures Part 2: Discrete logarithm based mechanisms |
ISO/IEC 18367:2016
|
Information technology Security techniques Cryptographic algorithms and security mechanisms conformance testing |
ISO 19092:2008
|
Financial services — Biometrics — Security framework |
04/30040717 DC : DRAFT JUL 2004
|
ISO/IEC 18033-2 - INFORMATION TECHNOLOGY - ENCRYPTION ALGORITHMS - PART 2: ASYMMETRIC CIPHERS |
PD CEN/TS 16702-2:2015
|
Electronic fee collection. Secure monitoring for autonomous toll systems Trusted recorder |
16/30266969 DC : 0
|
BS ISO/IEC 17922 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - TELEBIOMETRIC AUTHENTICATION FRAMEWORK USING BIOMETRIC HARDWARE SECURITY MODULE |
12/30228421 DC : 0
|
BS ISO/IEC 29192-4 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - LIGHTWEIGHT CRYPTOGRAPHY - PART 4: MECHANISMS USING ASYMMETRIC TECHNIQUES |
15/30281583 DC : 0
|
BS ISO 12812-2 - CORE BANKING - MOBILE FINANCIAL SERVICES - PART 2: SECURITY AND DATA PROTECTION FOR MOBILE FINANCIAL SERVICES |
15/30323818 DC : 0
|
BS ISO 9564-1 - FINANCIAL SERVICES - PERSONAL IDENTIFICATION NUMBER (PIN) MANAGEMENT AND SECURITY - PART 1: BASIC PRINCIPLES AND REQUIREMENTS FOR PINS IN CARD-BASED SYSTEMS |
09/30201974 DC : 0
|
BS ISO 9564-1 - FINANCIAL SERVICES - PERSONAL IDENTIFICATION NUMBER (PIN) MANAGEMENT AND SECURITY - PART 1: BASIC PRINCIPLES AND REQUIREMENTS FOR PINS IN CARD BASE SYSTEMS |
18/30354751 DC : DRAFT FEB 2018
|
BS ISO/IEC 18033-6 - INFORMATION TECHNOLOGY SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 6: HOMOMORPHIC ENCRYPTION |
ISO/IEC 29167-17:2015
|
Information technology Automatic identification and data capture techniques Part 17: Crypto suite cryptoGPS security services for air interface communications |
07/30143790 DC : 0
|
BS ISO/IEC 24759 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - TEST REQUIREMENTS FOR CRYPTOGRAPHIC MODULES |
BS ISO/IEC 18033-5:2015
|
Information technology. Security techniques. Encryption algorithms Identity-based ciphers |
07/30107763 DC : 0
|
BS ISO/IEC 24713-2 - INFORMATION TECHNOLOGY - BIOMETRIC PROFILES FOR INTEROPERABILITY AND DATA INTERCHANGE - PART 2: PHYSICAL ACCESS CONTROL FOR EMPLOYEES AT AIRPORTS |
07/30167508 DC : 0
|
BS ISO/IEC 11770-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 2 - MECHANISMS USING SYMMETRIC TECHNIQUES |
CAN/CSA-ISO/IEC 11770-1:12 (R2016)
|
Information technology - Security techniques - Key management - Part 1: Framework (Adopted ISO/IEC 11770-1:2010, second edition, 2010-12-01) |
BS EN 62734:2015
|
Industrial networks. Wireless communication network and communication profiles. ISA 100.11a |
CSA ISO/IEC 9798-1 :2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 1: GENERAL |
DIN CEN ISO/TS 19299;DIN SPEC 74125:2016-02
|
ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK (ISO/TS 19299:2015) |
INCITS/ISO/IEC 11770-5 : 2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 5: GROUP KEY MANAGEMENT |
CSA ISO/IEC 14888-2 : 2009 : INC : COR 1 : 2016 : R201400
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DIGITAL SIGNATURES WITH APPENDIX - PART 2: INTEGER FACTORIZATION BASED MECHANISMS |
CSA ISO/IEC 14888-2 :2009
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DIGITAL SIGNATURES WITH APPENDIX - PART 2: INTEGER FACTORIZATION BASED MECHANISMS |
BS ISO/IEC 20008-2:2013
|
Information technology. Security techniques. Anonymous digital signatures Mechanisms using a group public key |
INCITS/ISO/IEC 24713-2 : 2009
|
INFORMATION TECHNOLOGY - BIOMETRIC PROFILES FOR INTEROPERABILITY AND DATA INTERCHANGE - PART 2: PHYSICAL ACCESS CONTROL FOR EMPLOYEES AT AIRPORTS |
BS ISO/IEC 29192-4 : 2013
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - LIGHTWEIGHT CRYPTOGRAPHY - PART 4: MECHANISMS USING ASYMMETRIC TECHNIQUES |
BS ISO/IEC 11770-3 : 2015
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 3: MECHANISMS USING ASYMMETRIC TECHNIQUES |
ECMA 409 : 2ED 2015
|
NFC-SEC-02: NFC-SEC CRYPTOGRAPHY STANDARD USING ECDH-256 AND AES-GCM |
S.R. CEN ISO/TS 19299:2015
|
ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK (ISO/TS 19299:2015) |
BS ISO/IEC 10116:2017
|
Information technology. Security techniques. Modes of operation for an n-bit block cipher |
BS ISO/IEC 11770-4:2017
|
Information technology. Security techniques. Key management Mechanisms based on weak secrets |
ISO/IEC 11770-2:2008
|
Information technology Security techniques Key management Part 2: Mechanisms using symmetric techniques |
ISO/TR 14742:2010
|
Financial services Recommendations on cryptographic algorithms and their use |
ISO/TS 19299:2015
|
Electronic fee collection Security framework |
IEC 62734:2014
|
Industrial networks - Wireless communication network and communication profiles - ISA 100.11a |
ONORM ONR CEN/TS 16702-2 : 2015
|
ELECTRONIC FEE COLLECTION - SECURE MONITORING FOR AUTONOMOUS TOLL SYSTEMS - PART 2: TRUSTED RECORDER (CEN/TS 16702-2:2015) |
BS ISO/IEC 11770-1:2010
|
Information technology. Security techniques. Key management Framework |
BS ISO/IEC 18370-2:2016
|
Information technology. Security techniques. Blind digital signatures Discrete logarithm based mechanisms |
BS ISO 11568-2:2012
|
Financial services. Key management (retail) Symmetric ciphers, their key management and life cycle |
BS ISO/IEC 11770-5:2011
|
Information technology Security techniques. Key management Group key management |
ISO/IEC 19592-2:2017
|
Information technology — Security techniques — Secret sharing — Part 2: Fundamental mechanisms |
12/30236955 DC : 0
|
BS ISO/IEC 20008-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ANONYMOUS DIGITAL SIGNATURE - PART 2: MECHANISMS USING A GROUP PUBLIC KEY |
ISO 9564-1:2017
|
Financial services — Personal Identification Number (PIN) management and security — Part 1: Basic principles and requirements for PINs in card-based systems |
15/30279582 DC : 0
|
BS ISO/IEC 18367 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC ALGORITHMS AND SECURITY MECHANISMS CONFORMANCE TESTING |
18/30362144 DC : 0
|
BS ISO/IEC 11770-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 2: MECHANISMS USING SYMMETRIC TECHNIQUES |
DIN CEN ISO/TS 19299;DIN SPEC 74125:2016-02
|
ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK (ISO/TS 19299:2015) |
PD CEN ISO/TS 19299:2015
|
Electronic fee collection. Security framework |
07/30173155 DC : 0
|
BS ISO/IEC 9798-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 2: MECHANISMS USING SYMMETRIC ENCIPHERMENT ALGORITHMS |
BS ISO/IEC 9797-3:2011
|
Information technology. Security techniques. Message Authentication Codes (MACs) Mechanisms using a universal hash-function |
UNI CEN/TS 16439 : 2013
|
ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK |
03/652682 DC : DRAFT NOV 2003
|
BS ISO/IEC TR 15446 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDE FOR THE PRODUCTION OF PROTECTION PROFILES AND SECURITY TARGETS |
BS ISO/IEC 11770-2:2008
|
Information technology. Security techniques. Key management Mechanisms using symmetric techniques |
BS ISO/IEC 19592-2:2017
|
Information technology. Security techniques. Secret sharing Fundamental mechanisms |
CAN/CSA-ISO/IEC 9798-1:12 (R2016)
|
Information technology - Security techniques - Entity authentication - Part 1: General (Adopted ISO/IEC 9798-1:2010, third edition, 2010-07-01) |
CSA ISO/IEC 11770-4 : 2007
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS |
16/30335688 DC : 0
|
BS ISO/IEC 11770-4 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS |
CSA ISO/IEC 11770-4 : 2007 : INC : COR 1 : 2010
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS |
CSA ISO/IEC 11770-4 : 2007 : R2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS |
ISO/IEC 20008-2:2013
|
Information technology — Security techniques — Anonymous digital signatures — Part 2: Mechanisms using a group public key |
CAN/CSA-ISO/IEC 29167-17:16
|
Information technology Automatic identification and data capture techniques Part 17: Crypto suite cryptoGPS security services for air interface communications (Adopted ISO/IEC 29167-17:2015, first edition, 2015-06-01) |
ISO/IEC 18033-5:2015
|
Information technology Security techniques Encryption algorithms Part 5: Identity-based ciphers |
ISO 19092-1:2006
|
Financial services Biometrics Part 1: Security framework |
ANSI X9.8-1 : 2015
|
FINANCIAL SERVICES - PERSONAL IDENTIFICATION NUMBER (PIN) MANAGEMENT AND SECURITY - PART 1: BASIC PRINCIPLES AND REQUIREMENTS FOR PINS IN CARD-BASED SYSTEMS |
ANSI X9.97-2 : 2009(R2017)
|
BANKING - SECURE CRYPTOGRAPHIC DEVICES (RETAIL) - PART 2: SECURITY COMPLIANCE CHECKLISTS FOR DEVICES USED IN FINANCIAL TRANSACTIONS |
ISO/IEC 14543-5-1:2010
|
Information technology Home electronic system (HES) architecture Part 5-1: Intelligent grouping and resource sharing for Class 2 and Class 3 Core protocol |
ISO/IEC 14888-2:2008
|
Information technology Security techniques Digital signatures with appendix Part 2: Integer factorization based mechanisms |
ISO/IEC 29167-16:2015
|
Information technology — Automatic identification and data capture techniques — Part 16: Crypto suite ECDSA-ECDH security services for air interface communications |
ISO/IEC 9798-1:2010
|
Information technology Security techniques Entity authentication Part 1: General |
18/30356051 DC : DRAFT APR 2018
|
BS ISO/IEC 20543 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - TEST AND ANALYSIS METHODS FOR RANDOM BIT GENERATORS WITHIN ISO/IEC 19790 AND ISO/IEC 15408 |
ISO/IEC 11770-6:2016
|
Information technology Security techniques Key management Part 6: Key derivation |
ISO/IEC 29192-4:2013
|
Information technology — Security techniques — Lightweight cryptography — Part 4: Mechanisms using asymmetric techniques |
INCITS/ISO/IEC 29192-4 : 2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - LIGHTWEIGHT CRYPTOGRAPHY - PART 4: MECHANISMS USING ASYMMETRIC TECHNIQUES |
ISO/IEC 13157-4:2016
|
Information technology Telecommunications and information exchange between systems NFC Security Part 4: NFC-SEC entity authentication and key agreement using asymmetric cryptography |
16/30327837 DC : 0
|
BS ISO/IEC 19592-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SECRET SHARING - PART 2: FUNDAMENTAL MECHANISMS |
CAN/CSA-ISO/IEC 11770-3:16
|
Information technology - Security techniques - Key management - Part 3: Mechanisms using asymmetric techniques (Adopted ISO/IEC 11770-3:2015, third edition, 2015-08-01) |
ECMA 411 : 3ED 2017
|
NFC-SEC-04: NFC-SEC ENTITY AUTHENTICATION AND KEY AGREEMENT USING SYMMETRIC CRYPTOGRAPHY |
ISO/IEC 24713-2:2008
|
Information technology Biometric profiles for interoperability and data interchange Part 2: Physical access control for employees at airports |
15/30268565 DC : 0
|
BS ISO/IEC 18370-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - BLIND DIGITAL SIGNATURES - PART 2: DISCRETE LOGARITHM BASED MECHANISMS |
PD CEN/TS 16439:2013
|
Electronic fee collection. Security framework |
05/30116896 DC : DRAFT SEP 2005
|
ISO 19092-1 - FINANCIAL SERVICES - BIOMETRICS - PART 1: SECURITY FRAMEWORK |
CSA ISO/IEC 11770-2 : 2009
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 2: MECHANISMS USING SYMMETRIC TECHNIQUES |
ISO/IEC 13157-5:2016
|
Information technology Telecommunications and information exchange between systems NFC Security Part 5: NFC-SEC entity authentication and key agreement using symmetric cryptography |
ISO/IEC 11770-3:2015
|
Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques |
ISO/IEC 10116:2017
|
Information technology — Security techniques — Modes of operation for an n-bit block cipher |
ISO/IEC 13157-3:2016
|
Information technology Telecommunications and information exchange between systems NFC Security Part 3: NFC-SEC cryptography standard using ECDH-256 and AES-GCM |
TS 119 312 : 1.2.1
|
ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); CRYPTOGRAPHIC SUITES |
ISO/IEC 29167-1:2014
|
Information technology Automatic identification and data capture techniques Part 1: Security services for RFID air interfaces |
CAN/CSA-ISO/IEC 29167-16:16
|
Information technology Automatic identification and data capture techniques Part 16: Crypto suite ECDSA-ECDH security services for air interface communications (Adopted ISO/IEC 29167-16:2015, first edition, 2015-11-15) |
CEN/TS 16439:2013
|
Electronic fee collection - Security framework |