CSA ISO/IEC 10116 : 2007 : R2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MODES OF OPERATION FOR AN N-BIT BLOCK CIPHER |
CSA ISO/IEC 18033-2 :2006
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 2: ASYMMETRIC CIPHERS |
15/30288056 DC : 0
|
BS ISO/IEC 10116 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MODES OF OPERATION FOR AN N-BIT BLOCK CIPHER |
ANSI X9.24-3 : 2017
|
RETAIL FINANCIAL SERVICES - SYMMETRIC KEY MANAGEMENT - PART 3: DERIVED UNIQUE KEY PER TRANSACTION |
BS ISO/IEC 11770-5:2011
|
Information technology Security techniques. Key management Group key management |
10/30135070 DC : DRAFT NOV 2010
|
BS ISO/IEC 9797-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MESSAGE AUTHENTICATION CODES (MACS) - PART 3: MECHANISMS USING A UNIVERSAL HASH FUNCTION |
BS ISO 11568-4:2007
|
Banking. Key management (retail) Asymmetric cryptosystems. Key management and life cycle |
BS EN 419212-1:2017
|
Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services Introduction and common definitions |
INCITS/ISO/IEC 9798-4 : 1999
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 4: MECHANISMS USING A CRYPTOGRAPHIC CHECK FUNCTION |
TS 135 204 : 13.0.0
|
UNIVERSAL MOBILE TELECOMMUNICATIONS SYSTEM (UMTS); LTE; 3G SECURITY; SPECIFICATION OF THE 3GPP CONFIDENTIALITY AND INTEGRITY ALGORITHMS; DOCUMENT 4: DESIGN CONFORMANCE TEST DATA (3GPP TS 35.204 VERSION 14.0.0 RELEASE 14) |
12/30268705 DC : 0
|
BS EN 15509 - ELECTRONIC FEE COLLECTION - INTEROPERABILITY APPLICATION PROFILE FOR DSRC |
16/30304626 DC : 0
|
BS ISO 20038 - BANKING AND RELATED FINANCIAL SERVICES - KEY WRAP |
CSA ISO/IEC 9798-2:2010
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 2: MECHANISMS USING SYMMETRIC ENCIPHERMENT ALGORITHMS |
13/30293476 DC : 0
|
BS EN 62601 - INDUSTRIAL COMMUNICATION NETWORKS - WIRELESS COMMUNICATION NETWORK AND COMMUNICATION PROFILES - WIA-PA |
BS EN 14890-1:2008
|
Application interface for smart cards used as secure signature creation devices Basic services |
PD CEN/TR 16968:2016
|
Electronic Fee Collection. Assessment of security measures for applications using Dedicated Short-Range Communication |
INCITS/ISO/IEC 9797-2 : 2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MESSAGE AUTHENTICATION CODES (MACS) - PART 2: MECHANISMS USING A DEDICATED HASH-FUNCTION |
INCITS/ISO/IEC 15946-3 : 2002
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC TECHNIQUES BASED ON ELLIPTIC CURVES - PART 3: KEY ESTABLISHMENT |
CSA ISO/IEC 10116 : 2007 : INC : COR 1 : 2009
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MODES OF OPERATION FOR AN N-BIT BLOCK CIPHER |
DD IEC PAS 62601 : DRAFT MAR 2009
|
INDUSTRIAL COMMUNICATION NETWORKS - FIELDBUS SPECIFICATIONS - WIA-PA COMMUNICATION NETWORK AND COMMUNICATION PROFILE |
CSA ISO/IEC 9798-2 : 2010 : R2015
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 2: MECHANISMS USING SYMMETRIC ENCIPHERMENT ALGORITHMS |
CAN/CSA-ISO/IEC 18033-2:06 (R2016)
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 2: ASYMMETRIC CIPHERS |
BS ISO/IEC 18033-4 : 2005
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 4: STREAM CIPHERS |
ISO/IEC 29167-10:2017
|
Information technology — Automatic identification and data capture techniques — Part 10: Crypto suite AES-128 security services for air interface communications |
I.S. EN 419212-2:2017
|
APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 2: SIGNATURE AND SEAL SERVICES |
I.S. EN 419212-1:2017
|
APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 1: INTRODUCTION AND COMMON DEFINITIONS |
CSA ISO/IEC 29167-10 : 2016
|
INFORMATION TECHNOLOGY - AUTOMATIC IDENTIFICATION AND DATA CAPTURE TECHNIQUES - PART 10: CRYPTO SUITE AES-128 SECURITY SERVICES FOR AIR INTERFACE COMMUNICATIONS |
I.S. EN 62734:2015
|
INDUSTRIAL NETWORKS - WIRELESS COMMUNICATION NETWORK AND COMMUNICATION PROFILES - ISA 100.11A |
PREN 419212-5 : DRAFT 2016
|
APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 5: TRUSTED ESERVICE |
ISO 11568-4:2007
|
Banking — Key management (retail) — Part 4: Asymmetric cryptosystems — Key management and life cycle |
ISO/IEC TR 29149:2012
|
Information technology Security techniques Best practices for the provision and use of time-stamping services |
CEN/TS 16702-2:2015
|
Electronic fee collection - Secure monitoring for autonomous toll systems - Part 2: Trusted recorder |
I.S. EN 15509:2014
|
ELECTRONIC FEE COLLECTION - INTEROPERABILITY APPLICATION PROFILE FOR DSRC |
CEN ISO/TS 19299 : 2015
|
ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK (ISO/TS 19299:2015) |
CEN ISO/TS 17574:2017
|
Electronic fee collection - Guidelines for security protection profiles (ISO/TS 17574:2017) |
CEN/TS 14821-5:2003
|
TRAFFIC AND TRAVEL INFORMATION (TTI) - TTI MESSAGES VIA CELLULAR NETWORKS - PART 5: INTERNAL SERVICES |
EN 62734:2015
|
Industrial networks - Wireless communication network and communication profiles - ISA 100.11a |
EN 62601:2016
|
Industrial networks - Wireless communication network and communication profiles - WIA-PA |
ISO/IEC 11770-5:2011
|
Information technology Security techniques Key management Part 5: Group key management |
TS 103 484-2 : 9.0.0
|
SMART CARDS; TEST SPECIFICATION FOR THE SECURE CHANNEL INTERFACE; PART 2: UICC FEATURES (RELEASE 9) |
BS ISO/IEC 9798-2:2008
|
Information technology. Security techniques. Entity authentication Mechanisms using symmetric encipherment algorithms |
09/30202174 DC : 0
|
BS EN 50159 - RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - SAFETY RELATED COMMUNICATION IN TRANSMISSION SYSTEMS |
INCITS/ISO/IEC 9798-4 : 1999 : R2005
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 4: MECHANISMS USING A CRYPTOGRAPHIC CHECK FUNCTION |
ISO/IEC 24771:2014
|
Information technology Telecommunications and information exchange between systems MAC/PHY standard for ad hoc wireless network to support QoS in an industrial work environment |
ISO/IEC 18013-3:2017
|
Information technology — Personal identification — ISO-compliant driving licence — Part 3: Access control, authentication and integrity validation |
I.S. EN 419212-5:2018
|
APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 5: TRUSTED ESERVICE |
S.R. CEN/TS 16702-2:2015
|
ELECTRONIC FEE COLLECTION - SECURE MONITORING FOR AUTONOMOUS TOLL SYSTEMS - PART 2: TRUSTED RECORDER |
EG 202 009-1 : 1.3.1
|
USER GROUP; QUALITY OF TELECOM SERVICES; PART 1: METHODOLOGY FOR IDENTIFICATION OF INDICATORS RELEVANT TO THE USERS |
12/30236952 DC : 0
|
BS ISO/IEC 20009-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ANONYMOUS ENTITY AUTHENTICATION - PART 2: MECHANISMS BASED ON SIGNATURES USING A GROUP PUBLIC KEY |
ISO/IEC 9797-3:2011
|
Information technology — Security techniques — Message Authentication Codes (MACs) — Part 3: Mechanisms using a universal hash-function |
BS EN ISO 13141 : 2015
|
ELECTRONIC FEE COLLECTION - LOCALISATION AUGMENTATION COMMUNICATION FOR AUTONOMOUS SYSTEMS |
BS ISO/IEC 20009-2:2013
|
Information technology. Security techniques. Anonymous entity authentication Mechanisms based on signatures using a group public key |
14/30275432 DC : 0
|
BS ISO/IEC 29167-10 - INFORMATION TECHNOLOGY - AUTOMATIC IDENTIFICATION AND DATA CAPTURE TECHNIQUES - PART 10: CRYPTO SUITE AES-128 SECURITY SERVICES FOR AIR INTERFACE COMMUNICATIONS |
ISO/TS 21719-2:2018
|
Electronic fee collection — Personalization of on-board equipment (OBE) — Part 2: Using dedicated short-range communication |
11/30228418 DC : DRAFT JUNE 2011
|
BS ISO/IEC 29192-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - LIGHTWEIGHT CRYPTOGRAPHY - PART 3: STREAM CIPHERS |
TS 103 484-1 : 9.0.0
|
SMART CARDS; TEST SPECIFICATION FOR THE SECURE CHANNEL INTERFACE; PART 1: TERMINAL FEATURES (RELEASE 9) |
PD ISO/TR 14742:2010
|
Financial services. Recommendations on cryptographic algorithms and their use |
BS ISO/IEC 18367:2016
|
Information technology. Security techniques. Cryptographic algorithms and security mechanisms conformance testing |
CSA ISO/IEC 10116 : 2007 : R2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MODES OF OPERATION FOR AN N-BIT BLOCK CIPHER |
CSA ISO/IEC 9797-2:2013
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MESSAGE AUTHENTICATION CODES (MACS) - PART 2: MECHANISMS USING A DEDICATED HASH-FUNCTION |
ISO/TR 11633-2:2009
|
Health informatics Information security management for remote maintenance of medical devices and medical information systems Part 2: Implementation of an information security management system (ISMS) |
CAN/CSA-ISO/IEC 9797-2:13 (R2017)
|
Information technology - Security techniques - Message authentication codes (MACs) - Part 2: Mechanisms using a dedicated hash-function (Adopted ISO/IEC 9797-2:2011, second edition, 2011-05-01) |
CSA ISO/IEC 9798-2 : 2010 : INC : COR 2 : 2013
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 2: MECHANISMS USING SYMMETRIC ENCIPHERMENT ALGORITHMS |
CSA ISO/IEC 10116 : 2007
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MODES OF OPERATION FOR AN N-BIT BLOCK CIPHER |
INCITS/ISO/IEC 18033-2 : 2008
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 2: ASYMMETRIC CIPHERS |
I.S. EN ISO 13141:2015
|
ELECTRONIC FEE COLLECTION - LOCALISATION AUGMENTATION COMMUNICATION FOR AUTONOMOUS SYSTEMS (ISO 13141:2015) |
ISO/TR 11633-1:2009
|
Health informatics Information security management for remote maintenance of medical devices and medical information systems Part 1: Requirements and risk analysis |
BS ISO/IEC 18013-3:2017
|
Information technology. Personal identification. ISO-compliant driving licence Access control, authentication and integrity validation |
CAN/CSA-ISO/IEC 18367:18
|
Information technology — Security techniques — Cryptographic algorithms and security mechanisms conformance testing (Adopted ISO/IEC 18367:2016, first edition, 2016-12-15) |
I.S. EN 14890-1:2008
|
APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES |
I.S. EN 62601:2016
|
INDUSTRIAL NETWORKS - WIRELESS COMMUNICATION NETWORK AND COMMUNICATION PROFILES - WIA-PA |
PREN 50159 : DRAFT 2009
|
RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - SAFETY-RELATED COMMUNICATION IN TRANSMISSION SYSTEMS |
ISO/IEC 18367:2016
|
Information technology Security techniques Cryptographic algorithms and security mechanisms conformance testing |
CEN/TS 16702-1:2014
|
Electronic fee collection - Secure monitoring for autonomous toll systems - Part 1: Compliance checking |
04/30040717 DC : DRAFT JUL 2004
|
ISO/IEC 18033-2 - INFORMATION TECHNOLOGY - ENCRYPTION ALGORITHMS - PART 2: ASYMMETRIC CIPHERS |
08/30135059 DC : 0
|
ISO/IEC 9797-2 (REV) - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MESSAGE AUTHENTICATION CODES (MACS) |
TS 135 201 : 13.0.0
|
UNIVERSAL MOBILE TELECOMMUNICATIONS SYSTEM (UMTS); LTE; 3G SECURITY; SPECIFICATION OF THE 3GPP CONFIDENTIALITY AND INTEGRITY ALGORITHMS; DOCUMENT 1: F8 AND F9 SPECIFICATION (3GPP TS 35.201 VERSION 14.0.0 RELEASE 14) |
BS ISO/IEC 29192-2:2012
|
Information technology. Security techniques. Lightweight cryptography Block ciphers |
PD CEN/TS 16702-2:2015
|
Electronic fee collection. Secure monitoring for autonomous toll systems Trusted recorder |
DIN EN 62601:2016-10
|
Industrial networks - Wireless communication network and communication profiles - WIA-PA (IEC 62601:2015); English version EN 62601:2016 |
BS EN 50159:2010
|
Railway applications. Communication, signalling and processing systems. Safety-related communication in transmission systems |
07/30163724 DC : 0
|
BS ISO/IEC 24727-4 - IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARDS PROGRAMMING INTERFACE - PART 4: API ADMINISTRATION |
16/30332188 DC : 0
|
BS ISO/IEC 29167-10 - INFORMATION TECHNOLOGY - AUTOMATIC IDENTIFICATION AND DATA CAPTURE TECHNIQUES - PART 10: CRYPTO SUITE AES-128 SECURITY SERVICES FOR AIR INTERFACE COMMUNICATIONS |
TS 131 113 : 8.0.0
|
UNIVERSAL MOBILE TELECOMMUNICATIONS SYSTEM (UMTS); LTE; UNIVERSAL SUBSCRIBER IDENTITY MODULE APPLICATION TOOLKIT (USAT) INTERPRETER BYTE CODES |
PD CEN/TS 16702-1:2014
|
Electronic fee collection. Secure monitoring for autonomous toll system Compliance checking |
DIN EN 14890-1:2009-03
|
APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES |
07/30162384 DC : 0
|
BS ISO/IEC 7501-1 - IDENTIFICATION CARDS - MACHINE READABLE TRAVEL DOCUMENTS - PART 1: MACHINE READABLE PASSPORT |
18/30354751 DC : DRAFT FEB 2018
|
BS ISO/IEC 18033-6 - INFORMATION TECHNOLOGY SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 6: HOMOMORPHIC ENCRYPTION |
BS ISO/IEC 25185-1:2016
|
Identification cards. Integrated circuit card authentication protocols Protocol for Lightweight Authentication of Identity |
07/30161079 DC : 0
|
BS EN 14890-1 - APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES |
PD ISO/TR 11633-2:2009
|
Health informatics. Information security management for remote maintenance of medical devices and medical information systems Implementation of an information security management system (ISMS) |
12/30255293 DC : 0
|
BS EN 14890-1 - APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES |
16/30345808 DC : 0
|
BS EN 419212-1 - APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 1: INTRODUCTION AND COMMON DEFINITIONS |
BS ISO/IEC 29150:2011
|
Information technology. Security techniques. Signcryption |
CAN/CSA-ISO/IEC 25185-1:18
|
Identification cards — Integrated circuit card authentication protocols — Part 1: Protocol for Lightweight Authentication of Identity (Adopted ISO/IEC 25185-1:2016, first edition, 2016-01-15) |
IEC PAS 62601:2009
|
Industrial communication networks - Fieldbus specifications - WIA-PA communication network and communication profile |
CSA ISO/IEC 18033-4 : 2013
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 4: STREAM CIPHERS |
BS EN 62734:2015
|
Industrial networks. Wireless communication network and communication profiles. ISA 100.11a |
DIN CEN ISO/TS 19299;DIN SPEC 74125:2016-02
|
ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK (ISO/TS 19299:2015) |
INCITS/ISO/IEC 9798-2 : 2010
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 2: MECHANISMS USING SYMMETRIC ENCIPHERMENT ALGORITHMS |
INCITS/ISO/IEC 11770-5 : 2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 5: GROUP KEY MANAGEMENT |
BS ISO/IEC 29167-10:2017
|
Information technology. Automatic identification and data capture techniques Crypto suite AES-128 security services for air interface communications |
ANSI X9.58 : 2013
|
FINANCIAL TRANSACTION MESSAGES - ELECTRONIC BENEFITS TRANSFER (EBT) - SUPPLEMENTAL NUTRITION ASSISTANCE PROGRAM (SNAP) AND CASH BENEFIT PROGRAMS |
ISO 15764:2004
|
Road vehicles Extended data link security |
S.R. CEN/TS 16702-1:2014
|
ELECTRONIC FEE COLLECTION - SECURE MONITORING FOR AUTONOMOUS TOLL SYSTEMS - PART 1: COMPLIANCE CHECKING |
BS ISO/IEC 24727-4 : 2008
|
IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARD PROGRAMMING INTERFACES - PART 4: APPLICATION PROGRAMMING INTERFACE (API) ADMINISTRATION |
ISO/IEC 25185-1:2016
|
Identification cards Integrated circuit card authentication protocols Part 1: Protocol for Lightweight Authentication of Identity |
I.S. EN 50159:2010
|
RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - SAFETY-RELATED COMMUNICATION IN TRANSMISSION SYSTEMS |
CEN/TR 16968:2016
|
Electronic Fee Collection - Assessment of security measures for applications using Dedicated Short-Range Communication |
S.R. CWA 16926-65:2015
|
EXTENSIONS FOR FINANCIAL SERVICES (XFS) INTERFACE SPECIFICATION RELEASE 3.30 - PART 65: PIN KEYPAD DEVICE CLASS INTERFACE - MIGRATION FROM VERSION 3.20 (CWA 16374) TO VERSION 3.30 (THIS CWA) - PROGRAMMER'S REFERENCE |
ISO/IEC 29192-2:2012
|
Information technology Security techniques Lightweight cryptography Part 2: Block ciphers |
ECMA 409 : 2ED 2015
|
NFC-SEC-02: NFC-SEC CRYPTOGRAPHY STANDARD USING ECDH-256 AND AES-GCM |
S.R. CWA 16374-65:2011
|
EXTENSIONS FOR FINANCIAL SERVICES (XFS) INTERFACE SPECIFICATION RELEASE 3.20 - PART 65: PIN KEYPAD DEVICE CLASS INTERFACE MIGRATION FROM VERSION 3.10 (CWA 15748) TO VERSION 3.20 (THIS CWA) PROGRAMMER'S REFERENCE |
ISO 16609:2012
|
Financial services — Requirements for message authentication using symmetric techniques |
ANSI X9.24-1 : 2017
|
RETAIL FINANCIAL SERVICES - SYMMETRIC KEY MANAGEMENT - PART 1: USING SYMMETRIC TECHNIQUES |
ISO 20038:2017
|
Banking and related financial services — Key wrap using AES |
S.R. CEN ISO/TS 19299:2015
|
ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK (ISO/TS 19299:2015) |
BS ISO 16609:2012
|
Financial services. Requirements for message authentication using symmetric techniques |
S.R. CWA 15748-65:2008
|
EXTENSIONS FOR FINANCIAL SERVICES (XFS) INTERFACE SPECIFICATION - RELEASE 3.10 - PART 65: PIN KEYPAD DEVICE CLASS INTERFACE - MIGRATION FROM VERSION 3.03 (CWA 14050) TO VERSION 3.10 (THIS CWA) - PROGRAMMER'S REFERENCE |
BS ISO/IEC 10116:2017
|
Information technology. Security techniques. Modes of operation for an n-bit block cipher |
ISO/IEC 18033-4:2011
|
Information technology — Security techniques — Encryption algorithms — Part 4: Stream ciphers |
ISO/TR 14742:2010
|
Financial services Recommendations on cryptographic algorithms and their use |
ISO/IEC 24727-4:2008
|
Identification cards Integrated circuit card programming interfaces Part 4: Application programming interface (API) administration |
ISO/IEC 9797-2:2011
|
Information technology Security techniques Message Authentication Codes (MACs) Part 2: Mechanisms using a dedicated hash-function |
ISO/TR 19038:2005
|
Banking and related financial services Triple DEA Modes of operation Implementation guidelines |
ISO/TS 19299:2015
|
Electronic fee collection Security framework |
UNE-EN 50159:2011
|
Railway applications - Communication, signalling and processing systems - Safety-related communication in transmission systems |
IEC 62734:2014
|
Industrial networks - Wireless communication network and communication profiles - ISA 100.11a |
CEI EN 50159 : 2012
|
RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - SAFETY-RELATED COMMUNICATION IN TRANSMISSION SYSTEMS |
UNI EN 419212-1 : 2015
|
APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES |
UNI EN 15509 : 2014
|
ELECTRONIC FEE COLLECTION - INTEROPERABILITY APPLICATION PROFILE FOR DSRC |
UNI CEI ISO/IEC 18013-3 : 2011
|
INFORMATION TECHNOLOGY - PERSONAL IDENTIFICATION - ISO-COMPLIANT DRIVING LICENCE - PART 3: ACCESS CONTROL, AUTHENTICATION AND INTEGRITY VALIDATION |
PREN 419212-1 : DRAFT 2016
|
APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 1: INTRODUCTION AND COMMON DEFINITIONS |
BS IEC 62601:2011
|
Industrial communication networks. Fieldbus specifications. WIA-PA communication network and communication profile |
BS EN 419212-2:2017
|
Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services Signature and Seal Services |
BS ISO/IEC 29192-1:2012
|
Information technology. Security techniques. Lightweight cryptography General |
PD ISO/TR 11633-1:2009
|
Health informatics. Information security management for remote maintenance of medical devices and medical information systems Requirements and risk analysis |
UNI CEN/TS 16702-1 : 2014
|
ELECTRONIC FEE COLLECTION - SECURE MONITORING FOR AUTONOMOUS TOLL SYSTEMS - PART 1: COMPLIANCE CHECKING |
BS EN 62601:2016
|
Industrial networks. Wireless communication network and communication profiles. WIA-PA |
ISO/IEC 9798-2:2008
|
Information technology Security techniques Entity authentication Part 2: Mechanisms using symmetric encipherment algorithms |
DIN EN 14890-1 E : 2009
|
APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES |
DD CEN ISO/TS 17574:2009
|
Electronic fee collection. Guidelines for security protection profiles |
DIN CEN ISO/TS 19299;DIN SPEC 74125:2016-02
|
ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK (ISO/TS 19299:2015) |
16/30345811 DC : 0
|
BS EN 419212-2 - APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 2: SIGNATURE AND SEAL SERVICES |
BS ISO 20038:2017
|
Banking and related financial services. Key wrap using AES |
PD CEN ISO/TS 19299:2015
|
Electronic fee collection. Security framework |
07/30173155 DC : 0
|
BS ISO/IEC 9798-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 2: MECHANISMS USING SYMMETRIC ENCIPHERMENT ALGORITHMS |
TS 135 202 : 13.0.0
|
UNIVERSAL MOBILE TELECOMMUNICATIONS SYSTEM (UMTS); LTE; 3G SECURITY; SPECIFICATION OF THE 3GPP CONFIDENTIALITY AND INTEGRITY ALGORITHMS; DOCUMENT 2: KASUMI SPECIFICATION (3GPP TS 35.202 VERSION 14.0.0 RELEASE 14) |
09/30207165 DC : 0
|
BS EN 62601 - INDUSTRIAL COMMUNICATION NETWORKS - FIELDBUS SPECIFICATIONS - WIA-PA COMMUNICATION NETWORK AND COMMUNICATION PROFILE |
BS ISO/IEC 9797-3:2011
|
Information technology. Security techniques. Message Authentication Codes (MACs) Mechanisms using a universal hash-function |
11/30204850 DC : 0
|
BS ISO/IEC 29192-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - LIGHTWEIGHT CRYPTOGRAPHY - PART 1: GENERAL |
UNI CEN/TS 16439 : 2013
|
ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK |
EN 300 674-3-1 : 3.0.0 DRAFT
|
INTELLIGENT TRANSPORT SYSTEMS (ITS); ROAD TRANSPORT AND TRAFFIC TELEMATICS (RTTT); DEDICATED SHORT RANGE COMMUNICATIONS (DSRC); PART 3-1: TECHNICAL CHARACTERISTICS AND TEST METHODS FOR HIGH DATA RATE (HDR) DATA TRANSMISSION EQUIPMENT OPERATING IN THE 5,8 GHZ INDUSTRIAL, SCIENTIFIC AND MEDICAL (ISM) BAND |
07/30161082 DC : 0
|
BS EN 14890-2 - APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 2: ADDITIONAL SERVICES |
PREN 15509 : DRAFT 2012
|
ELECTRONIC FEE COLLECTION - INTEROPERABILITY APPLICATION PROFILE FOR DSRC |
INCITS/ISO/IEC 10116 : 2008
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MODES OF OPERATION FOR AN N-BIT BLOCK CIPHER |
CAN/CSA-ISO/IEC 18033-4:13 (R2017)
|
Information technology - Security techniques - Encryption algorithms - Part 4: Stream ciphers (Adopted ISO/IEC 18033-4:2011, second edition, 2011-12-15) |
S.R. CEN/TS 16439:2013
|
ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK |
S.R. CEN ISO/TS 17574:2017
|
ELECTRONIC FEE COLLECTION - GUIDELINES FOR SECURITY PROTECTION PROFILES (ISO/TS 17574:2017) |
ISO/IEC 10116:2017
|
Information technology — Security techniques — Modes of operation for an n-bit block cipher |
INCITS/ISO/IEC 18033-4 : 2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 4: STREAM CIPHERS |
S.R. CWA 16926-6:2015
|
EXTENSIONS FOR FINANCIAL SERVICES (XFS) INTERFACE SPECIFICATION RELEASE 3.30 - PART 6: PIN KEYPAD DEVICE CLASS INTERFACE - PROGRAMMER'S REFERENCE |
ISO/IEC 19772:2009
|
Information technology Security techniques Authenticated encryption |
S.R. CWA 15748-6:2008
|
EXTENSIONS FOR FINANCIAL SERVICES (XFS) INTERFACE SPECIFICATION - RELEASE 3.10 - PART 6: PIN KEYPAD DEVICE CLASS INTERFACE - PROGRAMMER'S REFERENCE |
I.S. CWA 14890-2:2004
|
APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 2: ADDITIONAL SERVICES |
ISO/IEC 7501-1:2008
|
Identification cards Machine readable travel documents Part 1: Machine readable passport |
ISO/IEC 29150:2011
|
Information technology — Security techniques — Signcryption |
CEN ISO/TS 21719-2:2018
|
Electronic fee collection - Personalization of on-board equipment (OBE) - Part 2: Using dedicated short-range communication (ISO/TS 21719-2:2018) |
ISO/IEC 29192-1:2012
|
Information technology — Security techniques — Lightweight cryptography — Part 1: General |
ISO/IEC 15444-8:2007
|
Information technology — JPEG 2000 image coding system: Secure JPEG 2000 — Part 8: |
IEC 62280:2014
|
Railway applications - Communication, signalling and processing systems - Safety related communication in transmission systems |
EN 50159:2010
|
Railway applications - Communication, signalling and processing systems - Safety-related communication in transmission systems |
IEC 62601:2015
|
Industrial networks - Wireless communication network and communication profiles - WIA-PA |
ISO/TS 17574:2017
|
Electronic fee collection — Guidelines for security protection profiles |
EN 15509:2014
|
Electronic fee collection - Interoperability application profile for DSRC |
EN 419212-1:2017
|
Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services - Part 1: Introduction and common definitions |
EN 419212-2:2017
|
Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services - Part 2: Signature and Seal Services |
EN 14890-1:2008
|
Application Interface for smart cards used as Secure Signature Creation Devices - Part 1: Basic services |
08/30175546 DC : DRAFT SEP 2008
|
BS ISO/IEC 19785-4 - INFORMATION TECHNOLOGY - COMMON BIOMETRIC EXCHANGE FORMATS FRAMEWORK - PART 4: SECURITY BLOCK FORMAT SPECIFICATIONS |
BS ISO/IEC 19772:2009
|
Information technology. Security techniques. Authenticated encryption |
11/30231411 DC : 0
|
BS ISO 16609 - FINANCIAL SERVICES - REQUIREMENTS FOR MESSAGE AUTHENTICATION USING SYMMETRIC TECHNIQUES |
10/30228415 DC : DRAFT NOV 2010
|
BS ISO/IEC 29192-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - LIGHTWEIGHT CRYPTOGRAPHY - PART 2: BLOCK CIPHERS |
PD ISO/IEC TR 29149:2012
|
Information technology. Security techniques. Best practices for the provision and use of time-stamping services |
BS ISO/IEC 18033-2 : 2006
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 2: ASYMMETRIC CIPHERS |
S.R. CWA 16374-6:2011
|
EXTENSIONS FOR FINANCIAL SERVICES (XFS) INTERFACE SPECIFICATION RELEASE 3.20 - PART 6: PIN KEYPAD DEVICE CLASS INTERFACE PROGRAMMER'S REFERENCE |
ISO/IEC 20009-2:2013
|
Information technology Security techniques Anonymous entity authentication Part 2: Mechanisms based on signatures using a group public key |
ISO/IEC 18033-2:2006
|
Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers |
PD CEN/TS 16439:2013
|
Electronic fee collection. Security framework |
DD CEN/TS 14821-5:2003
|
Traffic and Travel Information (TTI). TTI messages via cellular networks Internal services |
BS ISO/IEC 9797-2:2011
|
Information technology. Security techniques. Message Authentication Codes (MACs) Mechanisms using a dedicated hash-function |
PD CEN ISO/TS 17574:2017
|
Electronic fee collection. Guidelines for security protection profiles |
07/30105115 DC : 0
|
BS ISO/IEC 19772 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - AUTHENTICATED ENCRYPTION |
INCITS/ISO/IEC 24727-4 : 2009(R2014)
|
IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARD PROGRAMMING INTERFACES - PART 4: APPLICATION PROGRAMMING INTERFACE (API) ADMINISTRATION |
UNI 11310 : 2013
|
ROAD TRAFFIC AND TRANSPORT TELEMATICS - AUTOMATIC DYNAMIC DEBITING SYSTEMS AND AUTOMATIC ACCESS CONTROL SYSTEMS USING DEDICATED SHORT-RANGE COMMUNICATION AT 5,8 GHZ - INTEROPERABILITY APPLICATION PROFILE FOR EETS |
ES 200 674-1 : 2.4.1
|
INTELLIGENT TRANSPORT SYSTEMS (ITS); ROAD TRANSPORT AND TRAFFIC TELEMATICS (RTTT); DEDICATED SHORT RANGE COMMUNICATIONS (DSRC); PART 1: TECHNICAL CHARACTERISTICS AND TEST METHODS FOR HIGH DATA RATE (HDR) DATA TRANSMISSION EQUIPMENT OPERATING IN THE 5,8 GHZ INDUSTRIAL, SCIENTIFIC AND MEDICAL (ISM) BAND |
TS 135 203 : 13.0.0
|
UNIVERSAL MOBILE TELECOMMUNICATIONS SYSTEM (UMTS); LTE; 3G SECURITY; SPECIFICATION OF THE 3GPP CONFIDENTIALITY AND INTEGRITY ALGORITHMS; DOCUMENT 3: IMPLEMENTORS' TEST DATA (3GPP TS 35.203 VERSION 14.0.0 RELEASE 14) |
ANSI X9 TR 31 : 2010
|
INTEROPERABLE SECURE KEY EXCHANGE KEY BLOCK SPECIFICATION FOR SYMMETRIC ALGORITHMS |
EN 419212-5:2018
|
Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services - Part 5: Trusted eService |
ISO/IEC 24767-2:2009
|
Information technology Home network security Part 2: Internal security services: Secure Communication Protocol for Middleware (SCPM) |
S.R. CEN/TR 16968:2016
|
ELECTRONIC FEE COLLECTION - ASSESSMENT OF SECURITY MEASURES FOR APPLICATIONS USING DEDICATED SHORT-RANGE COMMUNICATION |
S.R. CEN ISO/TS 21719-2:2018
|
ELECTRONIC FEE COLLECTION - PERSONALIZATION OF ON-BOARD EQUIPMENT (OBE) - PART 2: USING DEDICATED SHORT-RANGE COMMUNICATION (ISO/TS 21719-2:2018) |
ISO/IEC 13157-3:2016
|
Information technology Telecommunications and information exchange between systems NFC Security Part 3: NFC-SEC cryptography standard using ECDH-256 and AES-GCM |
16/30345819 DC : 0
|
BS EN 419212-5 - APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 5: TRUSTED ESERVICE |
BS EN 15509:2014
|
Electronic fee collection. Interoperability application profile for DSRC |
ISO 13141:2015
|
Electronic fee collection — Localisation augmentation communication for autonomous systems |
CEN/TS 16439:2013
|
Electronic fee collection - Security framework |
EN ISO 13141:2015/A1:2017
|
ELECTRONIC FEE COLLECTION - LOCALISATION AUGMENTATION COMMUNICATION FOR AUTONOMOUS SYSTEMS (ISO 13141:2015/AMD 1:2017) |