15/30324800 DC : 0
|
BS ISO/IEC 16512-2 - INFORMATION TECHNOLOGY - RELAYED MULTICAST PROTOCOL: SPECIFICATION FOR SIMPLEX GROUP APPLICATIONS |
10/30135070 DC : DRAFT NOV 2010
|
BS ISO/IEC 9797-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MESSAGE AUTHENTICATION CODES (MACS) - PART 3: MECHANISMS USING A UNIVERSAL HASH FUNCTION |
07/30154069 DC : 0
|
BS ISO/IEC 24727-3 - IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARD PROGRAMMING INTERFACES - PART 3: APPLICATION INTERFACE |
BS ISO 21188:2006
|
Public key infrastructure for financial services. Practices and policy framework |
INCITS/ISO/IEC 24745 : 2012(R2017)
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - BIOMETRIC INFORMATION PROTECTION |
ISO/IEC 9797-3:2011
|
Information technology — Security techniques — Message Authentication Codes (MACs) — Part 3: Mechanisms using a universal hash-function |
INCITS/ISO/IEC 29192-3 : 2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - LIGHTWEIGHT CRYPTOGRAPHY - PART 3: STREAM CIPHERS |
INCITS/ISO/IEC 11770-5 : 2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 5: GROUP KEY MANAGEMENT |
ISO/IEC 11770-5:2011
|
Information technology Security techniques Key management Part 5: Group key management |
ISO/IEC 16512-2:2016
|
Information technology Relayed multicast protocol: Specification for simplex group applications Part 2: |
BS ISO/IEC 19790:2012
|
Information technology. Security techniques. Security requirements for cryptographic modules |
PD ISO/TR 14742:2010
|
Financial services. Recommendations on cryptographic algorithms and their use |
CSA ISO/IEC 9798-6 : 2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 6: MECHANISMS USING MANUAL DATA TRANSFER |
ISO 21188:2018
|
Public key infrastructure for financial services — Practices and policy framework |
BS ISO/IEC 16512-2:2016
|
Information technology. Relayed multicast protocol: Specification for simplex group applications |
17/30281253 DC : 0
|
BS ISO 21188 - PUBLIC KEY INFRASTRUCTURE FOR FINANCIAL SERVICES - PRACTICES AND POLICY FRAMEWORK |
BS ISO/IEC 24745:2011
|
Information technology. Security techniques. Biometric information protection |
07/30163724 DC : 0
|
BS ISO/IEC 24727-4 - IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARDS PROGRAMMING INTERFACE - PART 4: API ADMINISTRATION |
08/30180103 DC : DRAFT MAR 2008
|
BS EN 50136-1 - ALARM SYSTEMS - ALARM TRANSMISSION SYSTEMS - PART 1: GENERAL REQUIREMENTS FOR ALARM TRANSMISSION SYSTEMS |
BS ISO/IEC 20009-4:2017
|
Information technology. Security techniques. Anonymous entity authentication Mechanisms based on weak secrets |
18/30354751 DC : DRAFT FEB 2018
|
BS ISO/IEC 18033-6 - INFORMATION TECHNOLOGY SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 6: HOMOMORPHIC ENCRYPTION |
INCITS/ISO/IEC 9798-6 : 2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 6: MECHANISMS USING MANUAL DATA TRANSFER |
ISO/IEC 29192-3:2012
|
Information technology — Security techniques — Lightweight cryptography — Part 3: Stream ciphers |
ISO/TR 14742:2010
|
Financial services Recommendations on cryptographic algorithms and their use |
BS ISO/IEC 11770-5:2011
|
Information technology Security techniques. Key management Group key management |
BIS IS/ISO 21188 : 2006
|
PUBLIC KEY INFRASTRUCTURE FOR FINANCIAL SERVICES - PRACTICES AND POLICY FRAMEWORK |
10/30136309 DC : 0
|
BS ISO/IEC 24745 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - BIOMETRIC INFORMATION PROTECTION |
BS ISO/IEC 29192-3:2012
|
Information technology. Security techniques. Lightweight cryptography Stream ciphers |
07/30173155 DC : 0
|
BS ISO/IEC 9798-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 2: MECHANISMS USING SYMMETRIC ENCIPHERMENT ALGORITHMS |
BS ISO/IEC 9797-3:2011
|
Information technology. Security techniques. Message Authentication Codes (MACs) Mechanisms using a universal hash-function |
04/30093313 DC : DRAFT JUN 2004
|
ISO/IEC 9798-6 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 6: MECHANISMS USING MANUAL DATA TRANSFER |
CAN/CSA-ISO/IEC 9798-6:12 (R2016)
|
Information technology - Security techniques - Entity authentication - Part 6: Mechanisms using manual data transfer (Adopted ISO/IEC 9798-6:2010, second edition, 2010-12-01) |
ISO/IEC 19790:2012
|
Information technology Security techniques Security requirements for cryptographic modules |
ISO/IEC 9798-6:2010
|
Information technology Security techniques Entity authentication Part 6: Mechanisms using manual data transfer |
ISO/IEC 15444-8:2007
|
Information technology — JPEG 2000 image coding system: Secure JPEG 2000 — Part 8: |
05/30144066 DC : DRAFT DEC 2005
|
ISO 13492 - FINANCIAL SERVICES - KEY MANAGEMENT RELATED DATA ELEMENT - APPLICATION AND USAGE OF ISO 8353 DATA ELEMENTS 53 AND 96 |
CAN/CSA-ISO/IEC 16512-2:18
|
Information technology — Relayed multicast protocol: Specification for simplex group applications (Adopted ISO/IEC 16512-2:2016, third edition, 2016-04-01) |
BS ISO/IEC 9798-6:2010
|
Information technology. Security techniques. Entity authentication Mechanisms using manual data transfer |
ISO/IEC 20009-4:2017
|
Information technology — Security techniques — Anonymous entity authentication — Part 4: Mechanisms based on weak secrets |
ISO/IEC 24745:2011
|
Information technology Security techniques Biometric information protection |