• There are no items in your cart

ISO/IEC 9798-1:2010

Current

Current

The latest, up-to-date edition.

Information technology Security techniques Entity authentication Part 1: General

Available format(s)

Hardcopy , PDF , PDF 3 Users , PDF 5 Users , PDF 9 Users

Language(s)

English

Published date

16-06-2010

€60.00
Excluding VAT

ISO/IEC 9798-1:2010 specifies an authentication model and general requirements and constraints for entity authentication mechanisms which use security techniques. These mechanisms are used to corroborate that an entity is the one that is claimed. An entity to be authenticated proves its identity by showing its knowledge of a secret. The mechanisms are defined as exchanges of information between entities and, where required, exchanges with a trusted third party.

The details of the mechanisms and the contents of the authentication exchanges are given in subsequent parts of ISO/IEC 9798.

DocumentType
Standard
Pages
11
PublisherName
International Organization for Standardization
Status
Current
Supersedes

ECMA 415 : 1ED 2016 NFC-SEC TEST METHODS
08/30169502 DC : 0 BS ISO/IEC 9798-5 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 5: MECHANISMS USING ZERO KNOWLEDGE TECHNIQUES
UNI CEN ISO/TS 24534-4 : 2008 AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES - PART 4: SECURE COMMUNICATIONS USING ASYMMETRICAL TECHNIQUES
12/30264383 DC : 0 BS ISO 21549-3 - HEALTH INFORMATICS - PATIENT HEALTH CARD DATA - PART 3: LIMITED CLINICAL DATA
INCITS/ISO/IEC 9798-4 : 1999 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 4: MECHANISMS USING A CRYPTOGRAPHIC CHECK FUNCTION
CAN/CSA-ISO/IEC 10181-2-00 (R2013) Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Authentication Framework (Adopted ISO/IEC 10181-2:1996, first edition, 1996-05-15)
ISO/IEC 15944-10:2013 Information technology — Business operational view — Part 10: IT-enabled coded domains as semantic components in business transactions
ETR 232 : 20001 SECURITY TECHNIQUES ADVISORY GROUP (STAG); GLOSSARY OF SECURITY TERMINOLOGY
16/30339535 DC : 0 BS EN 62056-5-3 ED 3.0 - ELECTRICITY METERING DATA EXCHANGE - THE DLMS/COSEM SUITE - PART 5-3: DLMS/COSEM APPLICATION LAYER
08/30195399 DC : 0 BS EN ISO 24534-3 - AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES - PART 3: VEHICLE DATA
CSA ISO/IEC 18033-1 : 2006 : INC : AMD 1 : 2012 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 1: GENERAL
CSA ISO/IEC 9798-2:2010 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 2: MECHANISMS USING SYMMETRIC ENCIPHERMENT ALGORITHMS
CSA ISO/IEC 9798-5 : 2010 : R2015 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 5: MECHANISMS USING ZERO-KNOWLEDGE TECHNIQUES
17/30333935 DC : 0 BS EN 1300 - SECURE STORAGE UNITS - CLASSIFICATION FOR HIGH SECURITY LOCKS ACCORDING TO THEIR RESISTANCE TO UNAUTHORIZED OPENING
BS ISO/IEC 17922:2017 Information technology. Security techniques. Telebiometric authentication framework using biometric hardware security module
14/30250091 DC : 0 BS ISO/IEC 18033-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 1: GENERAL
BS ISO/IEC 18014-1:2008 Information technology. Security techniques. Time- stamping services Framework
11/30251478 DC : 0 BS EN 1300 - SECURE STORAGE UNITS - CLASSIFICATION FOR HIGH SECURITY LOCKS ACCORDING TO THEIR RESISTANCE TO UNAUTHORIZED OPENING
UNE-EN 1300:2014 Secure storage units - Classification for high security locks according to their resistance to unauthorized opening
08/30195391 DC : 0 BS EN ISO 24534-1 - AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES - PART 1: ARCHITECTURE
CSA ISO/IEC TR 14516 : 2004 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR THE USE AND MANAGEMENT OF TRUSTED THIRD PARTY SERVICES
CSA ISO/IEC 9798-3 : 2002 : ADD A : INC : AMD 1 : 2012 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 3: MECHANISMS USING DIGITAL SIGNATURE TECHNIQUES
CAN/CSA-ISO/IEC TR 14516-04 (R2017) Information Technology - Security Techniques - Guidelines for the use and Management of Trusted Third Party Services (Adopted ISO/IEC TR 14516:2002, first edition, 2002-06-15)
DD ENV 12017:1998 Medical informatics. Medical informatics vocabulary (MIVoc)
CSA ISO/IEC TR 14516 : 2004 : R2012 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR THE USE AND MANAGEMENT OF TRUSTED THIRD PARTY SERVICES
CSA ISO/IEC 9798-2 : 2010 : R2015 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 2: MECHANISMS USING SYMMETRIC ENCIPHERMENT ALGORITHMS
CSA ISO/IEC 9798-5 : 2010 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 5: MECHANISMS USING ZERO-KNOWLEDGE TECHNIQUES
ANSI X9.117 : 2012 SECURE REMOTE ACCESS - MUTUAL AUTHENTICATION
I.S. EN 62056-5-3:2017 ELECTRICITY METERING DATA EXCHANGE - THE DLMS/COSEM SUITE - PART 5-3: DLMS/COSEM APPLICATION LAYER
I.S. EN 62734:2015 INDUSTRIAL NETWORKS - WIRELESS COMMUNICATION NETWORK AND COMMUNICATION PROFILES - ISA 100.11A
BS ISO/IEC 9796-2:2010 Information technology. Security techniques. Digital signature schemes giving message recovery Integer factorization based mechanisms
IEC 62056-5-3:2017 Electrcity metering data exchange - The DLMS/COSEM suite - Part 5-3: DLMS/COSEM application layer
I.S. EN ISO 24534-3:2016 INTELLIGENT TRANSPORT SYSTEMS - AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES - PART 3: VEHICLE DATA (ISO 24534-3:2016)
BS EN ISO 21549-7:2016 Health informatics. Patient healthcard data Medication data
CEN/TS 419261:2015 Security requirements for trustworthy systems managing certificates and time-stamps
CEN ISO/TS 24534-1:2007 Automatic vehicle and equipment identification - Electronic Registration Identification (ERI) for vehicles - Part 1: Architecture (ISO/TS 24534-1:2007)
EN 62734:2015 Industrial networks - Wireless communication network and communication profiles - ISA 100.11a
EN 62056-5-3:2017 Electricity metering data exchange - The DLMS/COSEM suite - Part 5-3: DLMS/COSEM application layer
BS ISO/IEC 9798-2:2008 Information technology. Security techniques. Entity authentication Mechanisms using symmetric encipherment algorithms
08/30169505 DC : DRAFT JULY 2008 BS ISO/IEC 13888-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NON-REPUDIATION - PART 1: GENERAL
INCITS/ISO/IEC 9798-4 : 1999 : R2005 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 4: MECHANISMS USING A CRYPTOGRAPHIC CHECK FUNCTION
08/30192697 DC : 0 BS ISO/IEC 9797-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MESSAGE AUTHENTICATION CODES (MACS) - PART 1: MECHANISMS USING A BLOCK CIPHER
BS ISO 24534-5:2011 Intelligent transport systems. Automatic vehicle and equipment identification. Electronic Registration Identification (ERI) for vehicles Secure communications using symmetrical techniques
10/30204613 DC : 0 BS ISO 24534-5 - AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES - PART 5: SECURE COMMUNICATIONS USING SYMMETRICAL TECHNIQUES
ISO/IEC 9796-2:2010 Information technology Security techniques Digital signature schemes giving message recovery Part 2: Integer factorization based mechanisms
BS EN ISO 24534-3:2016 Intelligent transport systems. Automatic vehicle and equipment identification. Electronic registration identification (ERI) for vehicles Vehicle data
BS ISO/IEC 10181-1:1996 Information technology. Open systems interconnection. Security frameworks for open systems Overview
12/30236952 DC : 0 BS ISO/IEC 20009-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ANONYMOUS ENTITY AUTHENTICATION - PART 2: MECHANISMS BASED ON SIGNATURES USING A GROUP PUBLIC KEY
BS ISO/IEC 9798-3 : 1998 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 3: MECHANISMS USING DIGITAL SIGNATURE TECHNIQUES
09/30204756 DC : 0 BS ISO/IEC 11770-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 1: FRAMEWORK
ISO/IEC 15944-7:2009 Information technology — Business operational view — Part 7: eBusiness vocabulary
16/30313398 DC : 0 BS ISO/IEC 15944-12 - INFORMATION TECHNOLOGY - BUSINESS OPERATIONAL VIEW - PART 12: PRIVACY PROTECTION REQUIREMENTS ON INFORMATION LIFE CYCLE MANAGEMENT (ILCM) AND EDI OF PERSONAL INFORMATION
DD ISO/TS 24534-1:2007 Automatic vehicle and equipment identification. Electronic registration identification (ERI) for vehicles Architecture
ISO/IEC 13157-4:2016 Information technology — Telecommunications and information exchange between systems — NFC Security — Part 4: NFC-SEC entity authentication and key agreement using asymmetric cryptography
BS ISO/IEC 10181-2:1996 Information technology. Open systems interconnection. Security frameworks for open systems Authentication framework
07/30107757 DC : 0 BS ISO/IEC 24708 - INFORMATION TECHNOLOGY - BIOAPI INTERWORKING PROTOCOL
BS EN 62056-5-3:2017 Electrcity metering data exchange. The DLMS/COSEM suite DLMS/COSEM application layer
11/30227809 DC : 0 BS ISO/IEC 15944-10 - INFORMATION TECHNOLOGY - BUSINESS OPERATIONAL VIEW - PART 10: IT-ENABLED CODED DOMAINS AS SEMANTIC COMPONENTS IN BUSINESS TRANSACTIONS
DD ENV 12018:1998 Identification, administrative, and common clinical data structure for intermittently connected devices used in healthcare (including machine readable cards)
02/653358 DC : DRAFT NOV 2002 ISO/DIS 21549-2 - HEALTH INFORMATICS - PATIENT HEALTHCARE DATA - PART 2: COMMON OBJECTS
BS ISO/IEC 20009-2:2013 Information technology. Security techniques. Anonymous entity authentication Mechanisms based on signatures using a group public key
INCITS/ISO/IEC 15944-5 : 2008(R2013) INFORMATION TECHNOLOGY - BUSINESS OPERATIONAL VIEW - PART 5: IDENTIFICATION AND REFERENCING OF REQUIREMENTS OF JURISDICTIONAL DOMAINS AS SOURCES OF EXTERNAL CONSTRAINTS
17/30349181 DC : 0 BS ISO/IEC 24760-1 AMENDMENT 1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - A FRAMEWORK FOR IDENTITY MANAGEMENT - PART 1: TERMINOLOGY AND CONCEPTS
PD CEN/TS 419261:2015 Security requirements for trustworthy systems managing certificates and time-stamps
BS ISO/IEC 22425:2017 Information technology. Telecommunications and information exchange between systems. NFC-SEC Test Methods
BS ISO/IEC 15944-1:2011 Information technology. Business operational view Operational aspects of Open-edi for implementation
BS ISO/IEC 15944-5:2008 Information technology. Business operational view Identification and referencing of requirements of jurisdictional domains as sources of external constraints
04/30126440 DC : DRAFT DEC 2004 ISO 21549-4 - HEALTH INFORMATICS - PATIENT HEALTHCARD DATA - PART 4: EXTENDED CLINICAL DATA
PD ISO/TR 14742:2010 Financial services. Recommendations on cryptographic algorithms and their use
UNI EN ISO 24534-1 : 2011 AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES - PART 1: ARCHITECTURE
CSA ISO/IEC 9798-6 : 2012 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 6: MECHANISMS USING MANUAL DATA TRANSFER
02/652661 DC : DRAFT NOV 2002 ISO/IEC FCD 18033-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 1: GENERAL
CAN/CSA-ISO/IEC 9798-4-02 (R2016) INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 4: MECHANISMS USING A CRYPTOGRAPHIC CHECK FUNCTION
INCITS/ISO/IEC 20009-1 : 2014 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ANONYMOUS ENTITY AUTHENTICATION - PART 1: GENERAL
CAN/CSA-ISO/IEC 15944-1:13 (R2017) Information technology - Business operational view - Part 1: Operational aspects of open-edi for implementation (Adopted ISO/IEC 15944-1:2011, second edition, 2011-08-01)
ECMA 410 : 3ED 2017 NFC-SEC-03: NFC-SEC ENTITY AUTHENTICATION AND KEY AGREEMENT USING ASYMMETRIC CRYPTOGRAPHY
CSA ISO/IEC 9798-3 : 2002 : INC : COR 2 : 2013 : R201100 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 3: MECHANISMS USING DIGITAL SIGNATURE TECHNIQUES
ISO/IEC 20009-1:2013 Information technology — Security techniques — Anonymous entity authentication — Part 1: General
CSA ISO/IEC 18014-1 : 2009 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - TIME-STAMPING SERVICES - PART 1: FRAMEWORK
CSA ISO/IEC 9798-3 : 2002 : R2011 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 3: MECHANISMS USING DIGITAL SIGNATURE TECHNIQUES
CSA ISO/IEC 9798-2 : 2010 : INC : COR 2 : 2013 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 2: MECHANISMS USING SYMMETRIC ENCIPHERMENT ALGORITHMS
ISO 24534-5:2011 Intelligent transport systems — Automatic vehicle and equipment identification — Electronic Registration Identification (ERI) for vehicles — Part 5: Secure communications using symmetrical techniques
IEC TS 62351-2:2008 Power systems management and associated information exchange - Data and communications security - Part 2: Glossary of terms
EG 202 387 : 1.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); SECURITY DESIGN GUIDE; METHOD FOR APPLICATION OF COMMON CRITERIA TO ETSI DELIVERABLES
ETR 237 : 20001 SECURITY TECHNIQUES ADVISORY GROUP (STAG) - BASELINE SECURITY STANDARDS - FEATURES AND MECHANISMS
BS EN ISO 24534-4:2010+A1:2019 Automatic vehicle and equipment identification. Electronic registration identification (ERI) for vehicles Secure communications using asymmetrical techniques
ISO/IEC 29150:2011 Information technology — Security techniques — Signcryption
EN ISO 24534-4:2010 Automatic vehicle and equipment identification - Electronic Registration Identification (ERI) for vehicles - Part 4: Secure communications using asymmetrical techniques (ISO 24534-4:2010)
ISO/IEC 18014-1:2008 Information technology Security techniques Time-stamping services Part 1: Framework
BS EN ISO 21549-2:2014 Health informatics. Patient healthcard data Common objects
UNE-EN ISO 21549-3:2014 Health informatics - Patient healthcard data -- Part 3: Limited clinical data (ISO 21549-3:2014)
DIN EN 1300:2014-05 SECURE STORAGE UNITS - CLASSIFICATION FOR HIGH SECURITY LOCKS ACCORDING TO THEIR RESISTANCE TO UNAUTHORIZED OPENING
I.S. EN ISO 21549-2:2014 HEALTH INFORMATICS - PATIENT HEALTHCARD DATA - PART 2: COMMON OBJECTS (ISO 21549-2:2014)
I.S. EN ISO 21549-3:2014 HEALTH INFORMATICS - PATIENT HEALTHCARD DATA - PART 3: LIMITED CLINICAL DATA (ISO 21549-3:2014)
I.S. EN ISO 21549-7:2016 HEALTH INFORMATICS - PATIENT HEALTHCARD DATA - PART 7: MEDICATION DATA (ISO 21549-7:2016)
ISO/IEC 13888-1:2009 Information technology Security techniques Non-repudiation Part 1: General
UNI EN 1300 : 2014 SECURE STORAGE UNITS - CLASSIFICATION FOR HIGH SECURITY LOCKS ACCORDING TO THEIR RESISTANCE TO UNAUTHORIZED OPENING
BS ISO/IEC 29192-2:2012 Information technology. Security techniques. Lightweight cryptography Block ciphers
ISO 24534-4:2010 Automatic vehicle and equipment identification — Electronic registration identification (ERI) for vehicles — Part 4: Secure communications using asymmetrical techniques
09/30214048 DC : 0 BS ISO/IEC 9796-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DIGITAL SIGNATURE SCHEMES GIVING MESSAGE RECOVERY - PART 2: INTEGER FACTORIZATION BASED MECHANISMS
ISO/IEC 29167-17:2015 Information technology Automatic identification and data capture techniques Part 17: Crypto suite cryptoGPS security services for air interface communications
03/652695 DC : 0 ISO/IEC 9798-5 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 5: MECHANISMS USING ZERO KNOWLEDGE TECHNIQUES
03/308265 DC : DRAFT JUNE 2003 ISO/TS 24534 - ROAD TRANSPORT AND TRAFFIC TELEMATICS - AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES
ISO/IEC 9798-5:2009 Information technology — Security techniques — Entity authentication — Part 5: Mechanisms using zero-knowledge techniques
16/30266969 DC : 0 BS ISO/IEC 17922 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - TELEBIOMETRIC AUTHENTICATION FRAMEWORK USING BIOMETRIC HARDWARE SECURITY MODULE
07/30163724 DC : 0 BS ISO/IEC 24727-4 - IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARDS PROGRAMMING INTERFACE - PART 4: API ADMINISTRATION
17/30345248 DC : 0 BS ISO/IEC 9798-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 3: MECHANISMS USING DIGITAL SIGNATURE TECHNIQUES
10/30180220 DC : 0 BS ISO/IEC 15944-8 - BUSINESS OPERATIONAL VIEW - PART 8: IDENTIFICATION OF PRIVACY PROTECTION REQUIREMENTS AS EXTERNAL CONSTRAINTS ON BUSINESS TRANSACTIONS
12/30228421 DC : 0 BS ISO/IEC 29192-4 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - LIGHTWEIGHT CRYPTOGRAPHY - PART 4: MECHANISMS USING ASYMMETRIC TECHNIQUES
BS ISO/IEC 9798-4:1999 Information technology. Security techniques. Entity authentication Mechanisms using a cryptographic check function
BS ISO 15668:1999 Banking. Secure file transfer (retail)
TS 118 111 : 2.4.1 ONEM2M; COMMON TERMINOLOGY (ONEM2M TS-0011 VERSION 2.4.1 RELEASE 2)
BS ISO/IEC 9797-1:2011 Information technology. Security techniques. Message authentication codes (MACs) Mechanisms using a block cipher
18/30354751 DC : DRAFT FEB 2018 BS ISO/IEC 18033-6 - INFORMATION TECHNOLOGY SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 6: HOMOMORPHIC ENCRYPTION
07/30135157 DC : 0 BS ISO/IEC 18014-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - TIME-STAMPING SERVICES - PART 1: FRAMEWORK
ISO/IEC TR 14516:2002 Information technology Security techniques Guidelines for the use and management of Trusted Third Party services
BS ISO/IEC 29150:2011 Information technology. Security techniques. Signcryption
BS EN 1300:2013 Secure storage units. Classification for high security locks according to their resistance to unauthorized opening
CAN/CSA-ISO/IEC 9797-1:12 (R2016) Information technology - Security techniques - Message authentication codes (MACs) - Part 1: Mechanisms using a block cipher (Adopted ISO/IEC 9797-1:2011, second edition, 2011-03-01)
ISO/IEC 13888-2:2010 Information technology Security techniques Non-repudiation Part 2: Mechanisms using symmetric techniques
CSA ISO/IEC 9798-4 : 2002 : INC : COR 1 : 2010 : R2011 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 4: MECHANISMS USING A CRYPTOGRAPHIC CHECK FUNCTION
INCITS/ISO/IEC 9798-2 : 2010 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 2: MECHANISMS USING SYMMETRIC ENCIPHERMENT ALGORITHMS
ANSI X9.112-1 : 2009 WIRELESS MANAGEMENT AND SECURITY - PART 1: GENERAL REQUIREMENTS
BS ISO/IEC 13888-1:2009 Information technology. Security techniques. Non-repudiation General
INCITS/ISO/IEC 9798-6 : 2012 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 6: MECHANISMS USING MANUAL DATA TRANSFER
ISO 15764:2004 Road vehicles Extended data link security
BS ISO/IEC 29192-4 : 2013 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - LIGHTWEIGHT CRYPTOGRAPHY - PART 4: MECHANISMS USING ASYMMETRIC TECHNIQUES
ISO/IEC 29192-2:2012 Information technology Security techniques Lightweight cryptography Part 2: Block ciphers
ISO/IEC 9798-3:1998 Information technology Security techniques Entity authentication Part 3: Mechanisms using digital signature techniques
ISO/IEC 29187-1:2013 Information technology — Identification of privacy protection requirements pertaining to learning, education and training (LET) — Part 1: Framework and reference model
ANSI X9.112 : 2016 WIRELESS MANAGEMENT AND SECURITY - PART 1: GENERAL REQUIREMENTS
UNI CEN ISO/TS 24534-1 : 2008 AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES - PART 1: ARCHITECTURE
ISO/TR 14742:2010 Financial services Recommendations on cryptographic algorithms and their use
S.R. CEN ISO TS 24534-4:2008 AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES - PART 4: SECURE COMMUNICATIONS USING ASYMMETRICAL TECHNIQUES
ISO/TS 24534-3:2008 Automatic vehicle and equipment identification Electronic Registration Identification (ERI) for vehicles Part 3: Vehicle data
IEC 62734:2014 Industrial networks - Wireless communication network and communication profiles - ISA 100.11a
EN 1300:2013 Secure storage units - Classification for high security locks according to their resistance to unauthorized opening
ENV 12018 : DRAFT 1997 IDENTIFICATION, ADMINISTRATIVE, AND COMMON CLINICAL DATA STRUCTURE FOR INTERMITTENTLY CONNECTED DEVICES USED IN HEALTHCARE (INCLUDING MACHINE READABLE CARDS)
UNI EN ISO 21549-2 : 2014 HEALTH INFORMATICS - PATIENT HEALTHCARD DATA - PART 2: COMMON OBJECTS
UNI EN ISO 21549-4 : 2014 HEALTH INFORMATICS - PATIENT HEALTHCARD DATA - PART 4: EXTENDED CLINICAL DATA
UNI EN ISO 21549-3 : 2014 HEALTH INFORMATICS - PATIENT HEALTHCARD DATA - PART 3: LIMITED CLINICAL DATA
BS ISO/IEC 20009-1:2013 Information technology. Security techniques. Anonymous entity authentication General
BS ISO/IEC 15944-10:2013 Information technology. Business Operational View IT-enabled coded domains as semantic components in business transactions
12/30264397 DC : 0 BS EN ISO 21549-2 - HEALTH INFORMATICS - PATIENT HEALTH CARD DATA - PART 2: COMMON OBJECTS
07/30154069 DC : 0 BS ISO/IEC 24727-3 - IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARD PROGRAMMING INTERFACES - PART 3: APPLICATION INTERFACE
DD ENV 13729:2000 Health informatics. Secure user identification. Strong authentication microprocessor cards
ISO/TS 24534-5:2008 Automatic vehicle and equipment identification Electronic Registration Identification (ERI) for vehicles Part 5: Secure communications using symmetrical techniques
ISO/IEC 18033-1:2015 Information technology Security techniques Encryption algorithms Part 1: General
BS ISO/IEC TR 14516:2002 Information technology. Security techniques. Guidelines for the use and management of trusted third party services
CSA ISO/IEC 18014-1 : 2009 : R2014 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - TIME-STAMPING SERVICES - PART 1: FRAMEWORK
ISO 15668:1999 Banking Secure file transfer (retail)
BS ISO/IEC 13888-2:2010 Information technology. Security techniques. Non-repudiation Mechanisms using symmetric techniques
02/653359 DC : DRAFT NOV 2002 ISO/DIS 21549-3 - HEALTH INFORMATICS - PATIENT HEALTHCARE DATA - PART 3: LIMITED CLINICAL DATA
ISO/IEC 9798-2:2008 Information technology Security techniques Entity authentication Part 2: Mechanisms using symmetric encipherment algorithms
DD CEN ISO/TS 24534-4:2008 Automatic vehicle and equipment identification. Electronic registration identification (ERI) for vehicles Secure communications using asymmetrical techniques
02/652659 DC : DRAFT NOV 2002 ISO/IEC FCD 13888-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NON-REPUDIATION - PART 1: GENERAL
BS EN 62734:2015 Industrial networks. Wireless communication network and communication profiles. ISA 100.11a
DD CEN ISO/TS 24534-3 : DRAFT MARCH 2008 AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES - PART 3: VEHICLE DATA
07/30173155 DC : 0 BS ISO/IEC 9798-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 2: MECHANISMS USING SYMMETRIC ENCIPHERMENT ALGORITHMS
08/30195403 DC : 0 BS EN ISO 24534-4 - AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES - PART 4: SECURE COMMUNICATIONS USING ASYMMETRICAL TECHNIQUES
04/30093313 DC : DRAFT JUN 2004 ISO/IEC 9798-6 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 6: MECHANISMS USING MANUAL DATA TRANSFER
14/30281542 DC : 0 BS EN ISO 21549-7 - HEALTH INFORMATICS - PATIENT HEALTHCARD DATA - PART 7: MEDICATION DATA
S.R. CEN ISO TS 24534-1:2007 AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES - PART 1: ARCHITECTURE
CSA ISO/IEC 13888-1:2010 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NON-REPUDIATION - PART 1: GENERAL
UNI CEN ISO/TS 24534-3 : 2008 AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES - PART 3: VEHICLE DATA
DD IEC/TS 62351-2:2008 Power systems management and associated information exchange. Data and communications security Glossary of terms
CSA ISO/IEC 9798-3 : 2002 : INC : COR 1 : 2010 : R2011 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 3: MECHANISMS USING DIGITAL SIGNATURE TECHNIQUES
CSA ISO/IEC 9797-1:2012 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MESSAGE AUTHENTICATION CODES (MACS) - PART 1: MECHANISMS USING A BLOCK CIPHER
03/652682 DC : DRAFT NOV 2003 BS ISO/IEC TR 15446 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDE FOR THE PRODUCTION OF PROTECTION PROFILES AND SECURITY TARGETS
CSA ISO/IEC 9798-4 : 2002 : R2011 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 4: MECHANISMS USING A CRYPTOGRAPHIC CHECK FUNCTION
CR 14301:2002 Health informatics - Framework for security protection of healthcare communication
CAN/CSA-ISO/IEC 9798-6:12 (R2016) Information technology - Security techniques - Entity authentication - Part 6: Mechanisms using manual data transfer (Adopted ISO/IEC 9798-6:2010, second edition, 2010-12-01)
CSA ISO/IEC 9798-4 :2002 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 4: MECHANISMS USING A CRYPTOGRAPHIC CHECK FUNCTION
UNE-EN ISO 24534-3:2016 Intelligent transport systems - Automatic vehicle and equipment identification - Electronic registration identification (ERI) for vehicles - Part 3: Vehicle data (ISO 24534-3:2016)
DD ISO/TS 24534-5:2008 Automatic vehicle and equipment identification. Electronic Registration Identification (ERI) for vehicles Secure communications using symmetrical techniques
CAN/CSA-ISO/IEC 29167-17:16 Information technology Automatic identification and data capture techniques Part 17: Crypto suite cryptoGPS security services for air interface communications (Adopted ISO/IEC 29167-17:2015, first edition, 2015-06-01)
UNI EN ISO 24534-4 : 2011 AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES - PART 4: SECURE COMMUNICATIONS USING ASYMMETRICAL TECHNIQUES
ISO/IEC 9798-6:2010 Information technology Security techniques Entity authentication Part 6: Mechanisms using manual data transfer
I.S. EN ISO 24534-4:2010/A1:2019 AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES - PART 4: SECURE COMMUNICATIONS USING ASYMMETRICAL TECHNIQUES
I.S. EN ISO 24534-1:2010 AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES - PART 1: ARCHITECTURE
I.S. EN 1300:2013 SECURE STORAGE UNITS - CLASSIFICATION FOR HIGH SECURITY LOCKS ACCORDING TO THEIR RESISTANCE TO UNAUTHORIZED OPENING
ISO/IEC 15444-8:2007 Information technology — JPEG 2000 image coding system: Secure JPEG 2000 — Part 8:
I.S. CEN ISO TS 24534-3:2008 AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES - PART 3: VEHICLE DATA
ISO/TS 24534-1:2007 Automatic vehicle and equipment identification Electronic Registration Identification (ERI) for vehicles Part 1: Architecture
UNE-EN ISO 21549-7:2018 Health informatics - Patient healthcard data - Part 7: Medication data (ISO 21549-7:2016)
UNE-EN ISO 21549-2:2014 Health informatics - Patient healthcard data - Part 2: Common objects (ISO 21549-2:2014)
ISO/TS 24534-4:2008 Automatic vehicle and equipment identification Electronic Registration Identification (ERI) for vehicles Part 4: Secure communications using asymmetrical techniques
ISO 24534-1:2010 Automatic vehicle and equipment identification — Electronic registration identification (ERI) for vehicles — Part 1: Architecture
ISO 21549-2:2014 Health informatics — Patient healthcard data — Part 2: Common objects
BS EN ISO 21549-3:2014 Health informatics. Patient healthcard data Limited clinical data
ISO 24534-3:2016 Intelligent transport systems — Automatic vehicle and equipment identification — Electronic registration identification (ERI) for vehicles — Part 3: Vehicle data
ISO 21549-7:2016 Health informatics — Patient healthcard data — Part 7: Medication data
ISO 21549-3:2014 Health informatics — Patient healthcard data — Part 3: Limited clinical data
EN ISO 21549-3:2014 Health informatics - Patient healthcard data -- Part 3: Limited clinical data (ISO 21549-3:2014)
EN ISO 21549-2:2014 Health informatics - Patient healthcard data - Part 2: Common objects (ISO 21549-2:2014)
ENV 12017 : 1997 MEDICAL INFORMATICS - MEDICAL INFORMATICS VOCABULARY (MIVOC)
EN ISO 21549-7:2016 Health informatics - Patient healthcard data - Part 7: Medication data (ISO 21549-7:2016)
ISO/IEC 15944-8:2012 Information technology — Business operational view — Part 8: Identification of privacy protection requirements as external constraints on business transactions
INCITS/ISO/IEC 9798-5 : 2010 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 5: MECHANISMS USING ZERO-KNOWLEDGE TECHNIQUES
ISO/IEC 15944-5:2008 Information technology — Business operational view — Part 5: Identification and referencing of requirements of jurisdictional domains as sources of external constraints
12/30236970 DC : 0 BS ISO/IEC 20009-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ANONYMOUS ENTITY AUTHENTICATION - PART 1: GENERAL
UNE-EN ISO 24534-1:2012 Automatic vehicle and equipment identification - Electronic Registration Identification (ERI) for vehicles - Part 1: Architecture (ISO 24534-1:2010)
INCITS/ISO/IEC 29192-4 : 2014 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - LIGHTWEIGHT CRYPTOGRAPHY - PART 4: MECHANISMS USING ASYMMETRIC TECHNIQUES
INCITS/ISO/IEC 18033-1 : 2005 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 1: GENERAL
13/30280997 DC : 0 BS EN ISO 24534-3 - INTELLIGENT TRANSPORT SYSTEMS - AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES - PART 3: VEHICLE DATA
BS ISO/IEC 15944-8:2012 Information technology. Business Operational View Identification of privacy protection requirements as external constraints on business transactions
ISO/IEC 29192-4:2013 Information technology — Security techniques — Lightweight cryptography — Part 4: Mechanisms using asymmetric techniques
BS ISO/IEC 15944-7:2009 Information technology. Business operational view eBusiness vocabulary
BS ISO/IEC 9798-5:2009 Information technology. Security techniques. Entity authentication Mechanisms using zero knowledge techniques
ISO/IEC 9798-4:1999 Information technology Security techniques Entity authentication Part 4: Mechanisms using a cryptographic check function
ISO/IEC 15944-1:2011 Information technology — Business operational view — Part 1: Operational aspects of open-edi for implementation
10/30228415 DC : DRAFT NOV 2010 BS ISO/IEC 29192-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - LIGHTWEIGHT CRYPTOGRAPHY - PART 2: BLOCK CIPHERS
UNE-EN ISO 24534-4:2012 Automatic vehicle and equipment identification - Electronic Registration Identification (ERI) for vehicles - Part 4: Secure communications using asymmetrical techniques (ISO 24534-4:2010)
ISO/IEC 17922:2017 Information technology — Security techniques — Telebiometric authentication framework using biometric hardware security module
BS ISO/IEC 18033-1:2015 Information technology. Security techniques. Encryption algorithms General
INCITS/ISO/IEC 15944-1 : 2008(R2013) INFORMATION TECHNOLOGY - BUSINESS AGREEMENT SEMANTIC DESCRIPTIVE TECHNIQUES - PART 1: BUSINESS OPERATIONAL ASPECTS OF OPEN-EDI FOR IMPLEMENTATION
PD ISO/IEC TR 29149:2012 Information technology. Security techniques. Best practices for the provision and use of time-stamping services
09/30169508 DC : 0 BS ISO/IEC 13888-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NON-REPUDIATION - PART 2: MECHANISMS USING SYMMETRIC TECHNIQUES
ECMA 411 : 3ED 2017 NFC-SEC-04: NFC-SEC ENTITY AUTHENTICATION AND KEY AGREEMENT USING SYMMETRIC CRYPTOGRAPHY
ISO/IEC 20009-2:2013 Information technology — Security techniques — Anonymous entity authentication — Part 2: Mechanisms based on signatures using a group public key
BS EN ISO 24534-1:2010 Automatic vehicle and equipment identification. Electronic registration identification (ERI) for vehicles Architecture
BS ISO/IEC 9798-6:2010 Information technology. Security techniques. Entity authentication Mechanisms using manual data transfer
CSA ISO/IEC 13888-1 : 2010 : R2015 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NON-REPUDIATION - PART 1: GENERAL
CSA ISO/IEC 9798-3:2002 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 3: MECHANISMS USING DIGITAL SIGNATURE TECHNIQUES
CSA ISO/IEC 9798-3 : 2002 : INC : AMD 1 : 2012 : R2016 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 3: MECHANISMS USING DIGITAL SIGNATURE TECHNIQUES
CSA ISO/IEC 9798-3 : 2002 : INC : AMD 1 : 2012 : R201100 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 3: MECHANISMS USING DIGITAL SIGNATURE TECHNIQUES
CSA ISO/IEC 15944-1:2013 INFORMATION TECHNOLOGY - BUSINESS OPERATIONAL VIEW - PART 1: OPERATIONAL ASPECTS OF OPEN-EDI FOR IMPLEMENTATION
CR 14302:2002 Health informatics - Framework for security requirements for intermittently connected devices
CSA ISO/IEC 18033-1 : 2006 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 1: GENERAL
CSA ISO/IEC 18033-1 : 2006 : INC : AMD 1 : 2012 : R2016 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 1: GENERAL
ISO/IEC 13157-5:2016 Information technology — Telecommunications and information exchange between systems — NFC Security — Part 5: NFC-SEC entity authentication and key agreement using symmetric cryptography
I.S. CR 14302:2002 HEALTH INFORMATICS - FRAMEWORK FOR SECURITY REQUIREMENTS FOR INTERMITTENTLY CONNECTED DEVICES
ISO/IEC 22425:2017 Information technology — Telecommunications and information exchange between systems — NFC-SEC Test Methods
S.R. CEN/TS 419261:2015 SECURITY REQUIREMENTS FOR TRUSTWORTHY SYSTEMS MANAGING CERTIFICATES AND TIME-STAMPS
CSA ISO/IEC 10181-1 : 2000 INFORMATION TECHNOLOGY - OPEN SYSTEMS INTERCONNECTION - SECURITY FRAMEWORKS FOR OPEN SYSTEMS: OVERVIEW
ISO/IEC TR 29149:2012 Information technology Security techniques Best practices for the provision and use of time-stamping services
I.S. CR 14301:2002 HEALTH INFORMATICS - FRAMEWORK FOR SECURITY PROTECTION OF HEALTHCARE COMMUNICATION
ISO/IEC 9797-1:2011 Information technology Security techniques Message Authentication Codes (MACs) Part 1: Mechanisms using a block cipher
EN ISO 24534-1:2010 Automatic vehicle and equipment identification - Electronic Registration Identification (ERI) for vehicles - Part 1: Architecture (ISO 24534-1:2010)
CEN ISO/TS 24534-4:2008 Automatic vehicle and equipment identification - Electronic Registration Identification (ERI) for vehicles - Part 4: Secure communications using asymmetrical techniques (ISO/TS 24534-4:2008)
CEN ISO/TS 24534-3:2008 Automatic vehicle and equipment identification - Electronic Registration Identification (ERI) for vehicles - Part 3: Vehicle data (ISO/TS 24534-3:2008)
EN ISO 24534-3:2016 Intelligent transport systems - Automatic vehicle and equipment identification - Electronic registration identification (ERI) for vehicles - Part 3: Vehicle data (ISO 24534-3:2016)
CEI EN IEC 62056-5-3:2024 Electricity metering data exchange - The DLMS®/COSEM suite - Part 5-3: DLMS®/COSEM application layer

ISO/IEC 18031:2011 Information technology Security techniques Random bit generation
ISO/IEC 7498-1:1994 Information technology Open Systems Interconnection Basic Reference Model: The Basic Model
ISO/IEC 14888-3:2016 Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms
ISO/IEC 8825-1:2015 Information technology ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER) Part 1:
ISO/IEC 11770-2:2008 Information technology Security techniques Key management Part 2: Mechanisms using symmetric techniques
ISO/IEC 10181-1:1996 Information technology Open Systems Interconnection Security frameworks for open systems: Overview
ISO/IEC 9594-8:2017 Information technology Open Systems Interconnection The Directory Part 8: Public-key and attribute certificate frameworks
ISO 7498-2:1989 Information processing systems Open Systems Interconnection Basic Reference Model Part 2: Security Architecture
ISO/IEC 14888-1:2008 Information technology — Security techniques — Digital signatures with appendix — Part 1: General
ISO/IEC 13888-1:2009 Information technology Security techniques Non-repudiation Part 1: General
ISO/IEC 10181-2:1996 Information technology Open Systems Interconnection Security frameworks for open systems: Authentication framework
ISO/IEC 9796-2:2010 Information technology Security techniques Digital signature schemes giving message recovery Part 2: Integer factorization based mechanisms
AS ISO/IEC 9797.1:2019 Information technology - Security techniques - Message Authentication Codes (MACs) Mechanisms using a block cipher
ISO/IEC 14888-2:2008 Information technology Security techniques Digital signatures with appendix Part 2: Integer factorization based mechanisms
ISO/IEC 11770-1:2010 Information technology Security techniques Key management Part 1: Framework
ISO/IEC 11770-3:2015 Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.