ISO/IEC 9798-1:2010
Current
The latest, up-to-date edition.
Information technology Security techniques Entity authentication Part 1: General
Hardcopy , PDF , PDF 3 Users , PDF 5 Users , PDF 9 Users
English
16-06-2010
ISO/IEC 9798-1:2010 specifies an authentication model and general requirements and constraints for entity authentication mechanisms which use security techniques. These mechanisms are used to corroborate that an entity is the one that is claimed. An entity to be authenticated proves its identity by showing its knowledge of a secret. The mechanisms are defined as exchanges of information between entities and, where required, exchanges with a trusted third party.
The details of the mechanisms and the contents of the authentication exchanges are given in subsequent parts of ISO/IEC 9798.
DocumentType |
Standard
|
Pages |
11
|
PublisherName |
International Organization for Standardization
|
Status |
Current
|
Supersedes |
Standards | Relationship |
NEN ISO/IEC 9798-1 : 2010 | Identical |
INCITS/ISO/IEC 9798-1 : 2012 | Identical |
BS ISO/IEC 9798-1:2010 | Identical |
INCITS/ISO/IEC 9798-1:2010(R2022) | Identical |
CSA ISO/IEC 9798-1 :2012 | Identical |
NF ISO/IEC 9798-1 : 1992 | Identical |
UNI ISO/IEC 9798-1 : 2000 | Identical |
CAN/CSA-ISO/IEC 9798-1:12 (R2016) | Identical |
ECMA 415 : 1ED 2016 | NFC-SEC TEST METHODS |
08/30169502 DC : 0 | BS ISO/IEC 9798-5 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 5: MECHANISMS USING ZERO KNOWLEDGE TECHNIQUES |
UNI CEN ISO/TS 24534-4 : 2008 | AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES - PART 4: SECURE COMMUNICATIONS USING ASYMMETRICAL TECHNIQUES |
12/30264383 DC : 0 | BS ISO 21549-3 - HEALTH INFORMATICS - PATIENT HEALTH CARD DATA - PART 3: LIMITED CLINICAL DATA |
INCITS/ISO/IEC 9798-4 : 1999 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 4: MECHANISMS USING A CRYPTOGRAPHIC CHECK FUNCTION |
CAN/CSA-ISO/IEC 10181-2-00 (R2013) | Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Authentication Framework (Adopted ISO/IEC 10181-2:1996, first edition, 1996-05-15) |
ISO/IEC 15944-10:2013 | Information technology — Business operational view — Part 10: IT-enabled coded domains as semantic components in business transactions |
ETR 232 : 20001 | SECURITY TECHNIQUES ADVISORY GROUP (STAG); GLOSSARY OF SECURITY TERMINOLOGY |
16/30339535 DC : 0 | BS EN 62056-5-3 ED 3.0 - ELECTRICITY METERING DATA EXCHANGE - THE DLMS/COSEM SUITE - PART 5-3: DLMS/COSEM APPLICATION LAYER |
08/30195399 DC : 0 | BS EN ISO 24534-3 - AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES - PART 3: VEHICLE DATA |
CSA ISO/IEC 18033-1 : 2006 : INC : AMD 1 : 2012 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 1: GENERAL |
CSA ISO/IEC 9798-2:2010 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 2: MECHANISMS USING SYMMETRIC ENCIPHERMENT ALGORITHMS |
CSA ISO/IEC 9798-5 : 2010 : R2015 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 5: MECHANISMS USING ZERO-KNOWLEDGE TECHNIQUES |
17/30333935 DC : 0 | BS EN 1300 - SECURE STORAGE UNITS - CLASSIFICATION FOR HIGH SECURITY LOCKS ACCORDING TO THEIR RESISTANCE TO UNAUTHORIZED OPENING |
BS ISO/IEC 17922:2017 | Information technology. Security techniques. Telebiometric authentication framework using biometric hardware security module |
14/30250091 DC : 0 | BS ISO/IEC 18033-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 1: GENERAL |
BS ISO/IEC 18014-1:2008 | Information technology. Security techniques. Time- stamping services Framework |
11/30251478 DC : 0 | BS EN 1300 - SECURE STORAGE UNITS - CLASSIFICATION FOR HIGH SECURITY LOCKS ACCORDING TO THEIR RESISTANCE TO UNAUTHORIZED OPENING |
UNE-EN 1300:2014 | Secure storage units - Classification for high security locks according to their resistance to unauthorized opening |
08/30195391 DC : 0 | BS EN ISO 24534-1 - AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES - PART 1: ARCHITECTURE |
CSA ISO/IEC TR 14516 : 2004 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR THE USE AND MANAGEMENT OF TRUSTED THIRD PARTY SERVICES |
CSA ISO/IEC 9798-3 : 2002 : ADD A : INC : AMD 1 : 2012 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 3: MECHANISMS USING DIGITAL SIGNATURE TECHNIQUES |
CAN/CSA-ISO/IEC TR 14516-04 (R2017) | Information Technology - Security Techniques - Guidelines for the use and Management of Trusted Third Party Services (Adopted ISO/IEC TR 14516:2002, first edition, 2002-06-15) |
DD ENV 12017:1998 | Medical informatics. Medical informatics vocabulary (MIVoc) |
CSA ISO/IEC TR 14516 : 2004 : R2012 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR THE USE AND MANAGEMENT OF TRUSTED THIRD PARTY SERVICES |
CSA ISO/IEC 9798-2 : 2010 : R2015 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 2: MECHANISMS USING SYMMETRIC ENCIPHERMENT ALGORITHMS |
CSA ISO/IEC 9798-5 : 2010 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 5: MECHANISMS USING ZERO-KNOWLEDGE TECHNIQUES |
ANSI X9.117 : 2012 | SECURE REMOTE ACCESS - MUTUAL AUTHENTICATION |
I.S. EN 62056-5-3:2017 | ELECTRICITY METERING DATA EXCHANGE - THE DLMS/COSEM SUITE - PART 5-3: DLMS/COSEM APPLICATION LAYER |
I.S. EN 62734:2015 | INDUSTRIAL NETWORKS - WIRELESS COMMUNICATION NETWORK AND COMMUNICATION PROFILES - ISA 100.11A |
BS ISO/IEC 9796-2:2010 | Information technology. Security techniques. Digital signature schemes giving message recovery Integer factorization based mechanisms |
IEC 62056-5-3:2017 | Electrcity metering data exchange - The DLMS/COSEM suite - Part 5-3: DLMS/COSEM application layer |
I.S. EN ISO 24534-3:2016 | INTELLIGENT TRANSPORT SYSTEMS - AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES - PART 3: VEHICLE DATA (ISO 24534-3:2016) |
BS EN ISO 21549-7:2016 | Health informatics. Patient healthcard data Medication data |
CEN/TS 419261:2015 | Security requirements for trustworthy systems managing certificates and time-stamps |
CEN ISO/TS 24534-1:2007 | Automatic vehicle and equipment identification - Electronic Registration Identification (ERI) for vehicles - Part 1: Architecture (ISO/TS 24534-1:2007) |
EN 62734:2015 | Industrial networks - Wireless communication network and communication profiles - ISA 100.11a |
EN 62056-5-3:2017 | Electricity metering data exchange - The DLMS/COSEM suite - Part 5-3: DLMS/COSEM application layer |
BS ISO/IEC 9798-2:2008 | Information technology. Security techniques. Entity authentication Mechanisms using symmetric encipherment algorithms |
08/30169505 DC : DRAFT JULY 2008 | BS ISO/IEC 13888-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NON-REPUDIATION - PART 1: GENERAL |
INCITS/ISO/IEC 9798-4 : 1999 : R2005 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 4: MECHANISMS USING A CRYPTOGRAPHIC CHECK FUNCTION |
08/30192697 DC : 0 | BS ISO/IEC 9797-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MESSAGE AUTHENTICATION CODES (MACS) - PART 1: MECHANISMS USING A BLOCK CIPHER |
BS ISO 24534-5:2011 | Intelligent transport systems. Automatic vehicle and equipment identification. Electronic Registration Identification (ERI) for vehicles Secure communications using symmetrical techniques |
10/30204613 DC : 0 | BS ISO 24534-5 - AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES - PART 5: SECURE COMMUNICATIONS USING SYMMETRICAL TECHNIQUES |
ISO/IEC 9796-2:2010 | Information technology Security techniques Digital signature schemes giving message recovery Part 2: Integer factorization based mechanisms |
BS EN ISO 24534-3:2016 | Intelligent transport systems. Automatic vehicle and equipment identification. Electronic registration identification (ERI) for vehicles Vehicle data |
BS ISO/IEC 10181-1:1996 | Information technology. Open systems interconnection. Security frameworks for open systems Overview |
12/30236952 DC : 0 | BS ISO/IEC 20009-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ANONYMOUS ENTITY AUTHENTICATION - PART 2: MECHANISMS BASED ON SIGNATURES USING A GROUP PUBLIC KEY |
BS ISO/IEC 9798-3 : 1998 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 3: MECHANISMS USING DIGITAL SIGNATURE TECHNIQUES |
09/30204756 DC : 0 | BS ISO/IEC 11770-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 1: FRAMEWORK |
ISO/IEC 15944-7:2009 | Information technology — Business operational view — Part 7: eBusiness vocabulary |
16/30313398 DC : 0 | BS ISO/IEC 15944-12 - INFORMATION TECHNOLOGY - BUSINESS OPERATIONAL VIEW - PART 12: PRIVACY PROTECTION REQUIREMENTS ON INFORMATION LIFE CYCLE MANAGEMENT (ILCM) AND EDI OF PERSONAL INFORMATION |
DD ISO/TS 24534-1:2007 | Automatic vehicle and equipment identification. Electronic registration identification (ERI) for vehicles Architecture |
ISO/IEC 13157-4:2016 | Information technology — Telecommunications and information exchange between systems — NFC Security — Part 4: NFC-SEC entity authentication and key agreement using asymmetric cryptography |
BS ISO/IEC 10181-2:1996 | Information technology. Open systems interconnection. Security frameworks for open systems Authentication framework |
07/30107757 DC : 0 | BS ISO/IEC 24708 - INFORMATION TECHNOLOGY - BIOAPI INTERWORKING PROTOCOL |
BS EN 62056-5-3:2017 | Electrcity metering data exchange. The DLMS/COSEM suite DLMS/COSEM application layer |
11/30227809 DC : 0 | BS ISO/IEC 15944-10 - INFORMATION TECHNOLOGY - BUSINESS OPERATIONAL VIEW - PART 10: IT-ENABLED CODED DOMAINS AS SEMANTIC COMPONENTS IN BUSINESS TRANSACTIONS |
DD ENV 12018:1998 | Identification, administrative, and common clinical data structure for intermittently connected devices used in healthcare (including machine readable cards) |
02/653358 DC : DRAFT NOV 2002 | ISO/DIS 21549-2 - HEALTH INFORMATICS - PATIENT HEALTHCARE DATA - PART 2: COMMON OBJECTS |
BS ISO/IEC 20009-2:2013 | Information technology. Security techniques. Anonymous entity authentication Mechanisms based on signatures using a group public key |
INCITS/ISO/IEC 15944-5 : 2008(R2013) | INFORMATION TECHNOLOGY - BUSINESS OPERATIONAL VIEW - PART 5: IDENTIFICATION AND REFERENCING OF REQUIREMENTS OF JURISDICTIONAL DOMAINS AS SOURCES OF EXTERNAL CONSTRAINTS |
17/30349181 DC : 0 | BS ISO/IEC 24760-1 AMENDMENT 1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - A FRAMEWORK FOR IDENTITY MANAGEMENT - PART 1: TERMINOLOGY AND CONCEPTS |
PD CEN/TS 419261:2015 | Security requirements for trustworthy systems managing certificates and time-stamps |
BS ISO/IEC 22425:2017 | Information technology. Telecommunications and information exchange between systems. NFC-SEC Test Methods |
BS ISO/IEC 15944-1:2011 | Information technology. Business operational view Operational aspects of Open-edi for implementation |
BS ISO/IEC 15944-5:2008 | Information technology. Business operational view Identification and referencing of requirements of jurisdictional domains as sources of external constraints |
04/30126440 DC : DRAFT DEC 2004 | ISO 21549-4 - HEALTH INFORMATICS - PATIENT HEALTHCARD DATA - PART 4: EXTENDED CLINICAL DATA |
PD ISO/TR 14742:2010 | Financial services. Recommendations on cryptographic algorithms and their use |
UNI EN ISO 24534-1 : 2011 | AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES - PART 1: ARCHITECTURE |
CSA ISO/IEC 9798-6 : 2012 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 6: MECHANISMS USING MANUAL DATA TRANSFER |
02/652661 DC : DRAFT NOV 2002 | ISO/IEC FCD 18033-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 1: GENERAL |
CAN/CSA-ISO/IEC 9798-4-02 (R2016) | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 4: MECHANISMS USING A CRYPTOGRAPHIC CHECK FUNCTION |
INCITS/ISO/IEC 20009-1 : 2014 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ANONYMOUS ENTITY AUTHENTICATION - PART 1: GENERAL |
CAN/CSA-ISO/IEC 15944-1:13 (R2017) | Information technology - Business operational view - Part 1: Operational aspects of open-edi for implementation (Adopted ISO/IEC 15944-1:2011, second edition, 2011-08-01) |
ECMA 410 : 3ED 2017 | NFC-SEC-03: NFC-SEC ENTITY AUTHENTICATION AND KEY AGREEMENT USING ASYMMETRIC CRYPTOGRAPHY |
CSA ISO/IEC 9798-3 : 2002 : INC : COR 2 : 2013 : R201100 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 3: MECHANISMS USING DIGITAL SIGNATURE TECHNIQUES |
ISO/IEC 20009-1:2013 | Information technology — Security techniques — Anonymous entity authentication — Part 1: General |
CSA ISO/IEC 18014-1 : 2009 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - TIME-STAMPING SERVICES - PART 1: FRAMEWORK |
CSA ISO/IEC 9798-3 : 2002 : R2011 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 3: MECHANISMS USING DIGITAL SIGNATURE TECHNIQUES |
CSA ISO/IEC 9798-2 : 2010 : INC : COR 2 : 2013 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 2: MECHANISMS USING SYMMETRIC ENCIPHERMENT ALGORITHMS |
ISO 24534-5:2011 | Intelligent transport systems — Automatic vehicle and equipment identification — Electronic Registration Identification (ERI) for vehicles — Part 5: Secure communications using symmetrical techniques |
IEC TS 62351-2:2008 | Power systems management and associated information exchange - Data and communications security - Part 2: Glossary of terms |
EG 202 387 : 1.1.1 | TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); SECURITY DESIGN GUIDE; METHOD FOR APPLICATION OF COMMON CRITERIA TO ETSI DELIVERABLES |
ETR 237 : 20001 | SECURITY TECHNIQUES ADVISORY GROUP (STAG) - BASELINE SECURITY STANDARDS - FEATURES AND MECHANISMS |
BS EN ISO 24534-4:2010+A1:2019 | Automatic vehicle and equipment identification. Electronic registration identification (ERI) for vehicles Secure communications using asymmetrical techniques |
ISO/IEC 29150:2011 | Information technology — Security techniques — Signcryption |
EN ISO 24534-4:2010 | Automatic vehicle and equipment identification - Electronic Registration Identification (ERI) for vehicles - Part 4: Secure communications using asymmetrical techniques (ISO 24534-4:2010) |
ISO/IEC 18014-1:2008 | Information technology Security techniques Time-stamping services Part 1: Framework |
BS EN ISO 21549-2:2014 | Health informatics. Patient healthcard data Common objects |
UNE-EN ISO 21549-3:2014 | Health informatics - Patient healthcard data -- Part 3: Limited clinical data (ISO 21549-3:2014) |
DIN EN 1300:2014-05 | SECURE STORAGE UNITS - CLASSIFICATION FOR HIGH SECURITY LOCKS ACCORDING TO THEIR RESISTANCE TO UNAUTHORIZED OPENING |
I.S. EN ISO 21549-2:2014 | HEALTH INFORMATICS - PATIENT HEALTHCARD DATA - PART 2: COMMON OBJECTS (ISO 21549-2:2014) |
I.S. EN ISO 21549-3:2014 | HEALTH INFORMATICS - PATIENT HEALTHCARD DATA - PART 3: LIMITED CLINICAL DATA (ISO 21549-3:2014) |
I.S. EN ISO 21549-7:2016 | HEALTH INFORMATICS - PATIENT HEALTHCARD DATA - PART 7: MEDICATION DATA (ISO 21549-7:2016) |
ISO/IEC 13888-1:2009 | Information technology Security techniques Non-repudiation Part 1: General |
UNI EN 1300 : 2014 | SECURE STORAGE UNITS - CLASSIFICATION FOR HIGH SECURITY LOCKS ACCORDING TO THEIR RESISTANCE TO UNAUTHORIZED OPENING |
BS ISO/IEC 29192-2:2012 | Information technology. Security techniques. Lightweight cryptography Block ciphers |
ISO 24534-4:2010 | Automatic vehicle and equipment identification — Electronic registration identification (ERI) for vehicles — Part 4: Secure communications using asymmetrical techniques |
09/30214048 DC : 0 | BS ISO/IEC 9796-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DIGITAL SIGNATURE SCHEMES GIVING MESSAGE RECOVERY - PART 2: INTEGER FACTORIZATION BASED MECHANISMS |
ISO/IEC 29167-17:2015 | Information technology Automatic identification and data capture techniques Part 17: Crypto suite cryptoGPS security services for air interface communications |
03/652695 DC : 0 | ISO/IEC 9798-5 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 5: MECHANISMS USING ZERO KNOWLEDGE TECHNIQUES |
03/308265 DC : DRAFT JUNE 2003 | ISO/TS 24534 - ROAD TRANSPORT AND TRAFFIC TELEMATICS - AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES |
ISO/IEC 9798-5:2009 | Information technology — Security techniques — Entity authentication — Part 5: Mechanisms using zero-knowledge techniques |
16/30266969 DC : 0 | BS ISO/IEC 17922 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - TELEBIOMETRIC AUTHENTICATION FRAMEWORK USING BIOMETRIC HARDWARE SECURITY MODULE |
07/30163724 DC : 0 | BS ISO/IEC 24727-4 - IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARDS PROGRAMMING INTERFACE - PART 4: API ADMINISTRATION |
17/30345248 DC : 0 | BS ISO/IEC 9798-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 3: MECHANISMS USING DIGITAL SIGNATURE TECHNIQUES |
10/30180220 DC : 0 | BS ISO/IEC 15944-8 - BUSINESS OPERATIONAL VIEW - PART 8: IDENTIFICATION OF PRIVACY PROTECTION REQUIREMENTS AS EXTERNAL CONSTRAINTS ON BUSINESS TRANSACTIONS |
12/30228421 DC : 0 | BS ISO/IEC 29192-4 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - LIGHTWEIGHT CRYPTOGRAPHY - PART 4: MECHANISMS USING ASYMMETRIC TECHNIQUES |
BS ISO/IEC 9798-4:1999 | Information technology. Security techniques. Entity authentication Mechanisms using a cryptographic check function |
BS ISO 15668:1999 | Banking. Secure file transfer (retail) |
TS 118 111 : 2.4.1 | ONEM2M; COMMON TERMINOLOGY (ONEM2M TS-0011 VERSION 2.4.1 RELEASE 2) |
BS ISO/IEC 9797-1:2011 | Information technology. Security techniques. Message authentication codes (MACs) Mechanisms using a block cipher |
18/30354751 DC : DRAFT FEB 2018 | BS ISO/IEC 18033-6 - INFORMATION TECHNOLOGY SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 6: HOMOMORPHIC ENCRYPTION |
07/30135157 DC : 0 | BS ISO/IEC 18014-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - TIME-STAMPING SERVICES - PART 1: FRAMEWORK |
ISO/IEC TR 14516:2002 | Information technology Security techniques Guidelines for the use and management of Trusted Third Party services |
BS ISO/IEC 29150:2011 | Information technology. Security techniques. Signcryption |
BS EN 1300:2013 | Secure storage units. Classification for high security locks according to their resistance to unauthorized opening |
CAN/CSA-ISO/IEC 9797-1:12 (R2016) | Information technology - Security techniques - Message authentication codes (MACs) - Part 1: Mechanisms using a block cipher (Adopted ISO/IEC 9797-1:2011, second edition, 2011-03-01) |
ISO/IEC 13888-2:2010 | Information technology Security techniques Non-repudiation Part 2: Mechanisms using symmetric techniques |
CSA ISO/IEC 9798-4 : 2002 : INC : COR 1 : 2010 : R2011 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 4: MECHANISMS USING A CRYPTOGRAPHIC CHECK FUNCTION |
INCITS/ISO/IEC 9798-2 : 2010 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 2: MECHANISMS USING SYMMETRIC ENCIPHERMENT ALGORITHMS |
ANSI X9.112-1 : 2009 | WIRELESS MANAGEMENT AND SECURITY - PART 1: GENERAL REQUIREMENTS |
BS ISO/IEC 13888-1:2009 | Information technology. Security techniques. Non-repudiation General |
INCITS/ISO/IEC 9798-6 : 2012 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 6: MECHANISMS USING MANUAL DATA TRANSFER |
ISO 15764:2004 | Road vehicles Extended data link security |
BS ISO/IEC 29192-4 : 2013 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - LIGHTWEIGHT CRYPTOGRAPHY - PART 4: MECHANISMS USING ASYMMETRIC TECHNIQUES |
ISO/IEC 29192-2:2012 | Information technology Security techniques Lightweight cryptography Part 2: Block ciphers |
ISO/IEC 9798-3:1998 | Information technology Security techniques Entity authentication Part 3: Mechanisms using digital signature techniques |
ISO/IEC 29187-1:2013 | Information technology — Identification of privacy protection requirements pertaining to learning, education and training (LET) — Part 1: Framework and reference model |
ANSI X9.112 : 2016 | WIRELESS MANAGEMENT AND SECURITY - PART 1: GENERAL REQUIREMENTS |
UNI CEN ISO/TS 24534-1 : 2008 | AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES - PART 1: ARCHITECTURE |
ISO/TR 14742:2010 | Financial services Recommendations on cryptographic algorithms and their use |
S.R. CEN ISO TS 24534-4:2008 | AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES - PART 4: SECURE COMMUNICATIONS USING ASYMMETRICAL TECHNIQUES |
ISO/TS 24534-3:2008 | Automatic vehicle and equipment identification Electronic Registration Identification (ERI) for vehicles Part 3: Vehicle data |
IEC 62734:2014 | Industrial networks - Wireless communication network and communication profiles - ISA 100.11a |
EN 1300:2013 | Secure storage units - Classification for high security locks according to their resistance to unauthorized opening |
ENV 12018 : DRAFT 1997 | IDENTIFICATION, ADMINISTRATIVE, AND COMMON CLINICAL DATA STRUCTURE FOR INTERMITTENTLY CONNECTED DEVICES USED IN HEALTHCARE (INCLUDING MACHINE READABLE CARDS) |
UNI EN ISO 21549-2 : 2014 | HEALTH INFORMATICS - PATIENT HEALTHCARD DATA - PART 2: COMMON OBJECTS |
UNI EN ISO 21549-4 : 2014 | HEALTH INFORMATICS - PATIENT HEALTHCARD DATA - PART 4: EXTENDED CLINICAL DATA |
UNI EN ISO 21549-3 : 2014 | HEALTH INFORMATICS - PATIENT HEALTHCARD DATA - PART 3: LIMITED CLINICAL DATA |
BS ISO/IEC 20009-1:2013 | Information technology. Security techniques. Anonymous entity authentication General |
BS ISO/IEC 15944-10:2013 | Information technology. Business Operational View IT-enabled coded domains as semantic components in business transactions |
12/30264397 DC : 0 | BS EN ISO 21549-2 - HEALTH INFORMATICS - PATIENT HEALTH CARD DATA - PART 2: COMMON OBJECTS |
07/30154069 DC : 0 | BS ISO/IEC 24727-3 - IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARD PROGRAMMING INTERFACES - PART 3: APPLICATION INTERFACE |
DD ENV 13729:2000 | Health informatics. Secure user identification. Strong authentication microprocessor cards |
ISO/TS 24534-5:2008 | Automatic vehicle and equipment identification Electronic Registration Identification (ERI) for vehicles Part 5: Secure communications using symmetrical techniques |
ISO/IEC 18033-1:2015 | Information technology Security techniques Encryption algorithms Part 1: General |
BS ISO/IEC TR 14516:2002 | Information technology. Security techniques. Guidelines for the use and management of trusted third party services |
CSA ISO/IEC 18014-1 : 2009 : R2014 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - TIME-STAMPING SERVICES - PART 1: FRAMEWORK |
ISO 15668:1999 | Banking Secure file transfer (retail) |
BS ISO/IEC 13888-2:2010 | Information technology. Security techniques. Non-repudiation Mechanisms using symmetric techniques |
02/653359 DC : DRAFT NOV 2002 | ISO/DIS 21549-3 - HEALTH INFORMATICS - PATIENT HEALTHCARE DATA - PART 3: LIMITED CLINICAL DATA |
ISO/IEC 9798-2:2008 | Information technology Security techniques Entity authentication Part 2: Mechanisms using symmetric encipherment algorithms |
DD CEN ISO/TS 24534-4:2008 | Automatic vehicle and equipment identification. Electronic registration identification (ERI) for vehicles Secure communications using asymmetrical techniques |
02/652659 DC : DRAFT NOV 2002 | ISO/IEC FCD 13888-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NON-REPUDIATION - PART 1: GENERAL |
BS EN 62734:2015 | Industrial networks. Wireless communication network and communication profiles. ISA 100.11a |
DD CEN ISO/TS 24534-3 : DRAFT MARCH 2008 | AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES - PART 3: VEHICLE DATA |
07/30173155 DC : 0 | BS ISO/IEC 9798-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 2: MECHANISMS USING SYMMETRIC ENCIPHERMENT ALGORITHMS |
08/30195403 DC : 0 | BS EN ISO 24534-4 - AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES - PART 4: SECURE COMMUNICATIONS USING ASYMMETRICAL TECHNIQUES |
04/30093313 DC : DRAFT JUN 2004 | ISO/IEC 9798-6 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 6: MECHANISMS USING MANUAL DATA TRANSFER |
14/30281542 DC : 0 | BS EN ISO 21549-7 - HEALTH INFORMATICS - PATIENT HEALTHCARD DATA - PART 7: MEDICATION DATA |
S.R. CEN ISO TS 24534-1:2007 | AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES - PART 1: ARCHITECTURE |
CSA ISO/IEC 13888-1:2010 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NON-REPUDIATION - PART 1: GENERAL |
UNI CEN ISO/TS 24534-3 : 2008 | AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES - PART 3: VEHICLE DATA |
DD IEC/TS 62351-2:2008 | Power systems management and associated information exchange. Data and communications security Glossary of terms |
CSA ISO/IEC 9798-3 : 2002 : INC : COR 1 : 2010 : R2011 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 3: MECHANISMS USING DIGITAL SIGNATURE TECHNIQUES |
CSA ISO/IEC 9797-1:2012 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MESSAGE AUTHENTICATION CODES (MACS) - PART 1: MECHANISMS USING A BLOCK CIPHER |
03/652682 DC : DRAFT NOV 2003 | BS ISO/IEC TR 15446 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDE FOR THE PRODUCTION OF PROTECTION PROFILES AND SECURITY TARGETS |
CSA ISO/IEC 9798-4 : 2002 : R2011 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 4: MECHANISMS USING A CRYPTOGRAPHIC CHECK FUNCTION |
CR 14301:2002 | Health informatics - Framework for security protection of healthcare communication |
CAN/CSA-ISO/IEC 9798-6:12 (R2016) | Information technology - Security techniques - Entity authentication - Part 6: Mechanisms using manual data transfer (Adopted ISO/IEC 9798-6:2010, second edition, 2010-12-01) |
CSA ISO/IEC 9798-4 :2002 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 4: MECHANISMS USING A CRYPTOGRAPHIC CHECK FUNCTION |
UNE-EN ISO 24534-3:2016 | Intelligent transport systems - Automatic vehicle and equipment identification - Electronic registration identification (ERI) for vehicles - Part 3: Vehicle data (ISO 24534-3:2016) |
DD ISO/TS 24534-5:2008 | Automatic vehicle and equipment identification. Electronic Registration Identification (ERI) for vehicles Secure communications using symmetrical techniques |
CAN/CSA-ISO/IEC 29167-17:16 | Information technology Automatic identification and data capture techniques Part 17: Crypto suite cryptoGPS security services for air interface communications (Adopted ISO/IEC 29167-17:2015, first edition, 2015-06-01) |
UNI EN ISO 24534-4 : 2011 | AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES - PART 4: SECURE COMMUNICATIONS USING ASYMMETRICAL TECHNIQUES |
ISO/IEC 9798-6:2010 | Information technology Security techniques Entity authentication Part 6: Mechanisms using manual data transfer |
I.S. EN ISO 24534-4:2010/A1:2019 | AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES - PART 4: SECURE COMMUNICATIONS USING ASYMMETRICAL TECHNIQUES |
I.S. EN ISO 24534-1:2010 | AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES - PART 1: ARCHITECTURE |
I.S. EN 1300:2013 | SECURE STORAGE UNITS - CLASSIFICATION FOR HIGH SECURITY LOCKS ACCORDING TO THEIR RESISTANCE TO UNAUTHORIZED OPENING |
ISO/IEC 15444-8:2007 | Information technology — JPEG 2000 image coding system: Secure JPEG 2000 — Part 8: |
I.S. CEN ISO TS 24534-3:2008 | AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES - PART 3: VEHICLE DATA |
ISO/TS 24534-1:2007 | Automatic vehicle and equipment identification Electronic Registration Identification (ERI) for vehicles Part 1: Architecture |
UNE-EN ISO 21549-7:2018 | Health informatics - Patient healthcard data - Part 7: Medication data (ISO 21549-7:2016) |
UNE-EN ISO 21549-2:2014 | Health informatics - Patient healthcard data - Part 2: Common objects (ISO 21549-2:2014) |
ISO/TS 24534-4:2008 | Automatic vehicle and equipment identification Electronic Registration Identification (ERI) for vehicles Part 4: Secure communications using asymmetrical techniques |
ISO 24534-1:2010 | Automatic vehicle and equipment identification — Electronic registration identification (ERI) for vehicles — Part 1: Architecture |
ISO 21549-2:2014 | Health informatics — Patient healthcard data — Part 2: Common objects |
BS EN ISO 21549-3:2014 | Health informatics. Patient healthcard data Limited clinical data |
ISO 24534-3:2016 | Intelligent transport systems — Automatic vehicle and equipment identification — Electronic registration identification (ERI) for vehicles — Part 3: Vehicle data |
ISO 21549-7:2016 | Health informatics — Patient healthcard data — Part 7: Medication data |
ISO 21549-3:2014 | Health informatics — Patient healthcard data — Part 3: Limited clinical data |
EN ISO 21549-3:2014 | Health informatics - Patient healthcard data -- Part 3: Limited clinical data (ISO 21549-3:2014) |
EN ISO 21549-2:2014 | Health informatics - Patient healthcard data - Part 2: Common objects (ISO 21549-2:2014) |
ENV 12017 : 1997 | MEDICAL INFORMATICS - MEDICAL INFORMATICS VOCABULARY (MIVOC) |
EN ISO 21549-7:2016 | Health informatics - Patient healthcard data - Part 7: Medication data (ISO 21549-7:2016) |
ISO/IEC 15944-8:2012 | Information technology — Business operational view — Part 8: Identification of privacy protection requirements as external constraints on business transactions |
INCITS/ISO/IEC 9798-5 : 2010 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 5: MECHANISMS USING ZERO-KNOWLEDGE TECHNIQUES |
ISO/IEC 15944-5:2008 | Information technology — Business operational view — Part 5: Identification and referencing of requirements of jurisdictional domains as sources of external constraints |
12/30236970 DC : 0 | BS ISO/IEC 20009-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ANONYMOUS ENTITY AUTHENTICATION - PART 1: GENERAL |
UNE-EN ISO 24534-1:2012 | Automatic vehicle and equipment identification - Electronic Registration Identification (ERI) for vehicles - Part 1: Architecture (ISO 24534-1:2010) |
INCITS/ISO/IEC 29192-4 : 2014 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - LIGHTWEIGHT CRYPTOGRAPHY - PART 4: MECHANISMS USING ASYMMETRIC TECHNIQUES |
INCITS/ISO/IEC 18033-1 : 2005 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 1: GENERAL |
13/30280997 DC : 0 | BS EN ISO 24534-3 - INTELLIGENT TRANSPORT SYSTEMS - AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES - PART 3: VEHICLE DATA |
BS ISO/IEC 15944-8:2012 | Information technology. Business Operational View Identification of privacy protection requirements as external constraints on business transactions |
ISO/IEC 29192-4:2013 | Information technology — Security techniques — Lightweight cryptography — Part 4: Mechanisms using asymmetric techniques |
BS ISO/IEC 15944-7:2009 | Information technology. Business operational view eBusiness vocabulary |
BS ISO/IEC 9798-5:2009 | Information technology. Security techniques. Entity authentication Mechanisms using zero knowledge techniques |
ISO/IEC 9798-4:1999 | Information technology Security techniques Entity authentication Part 4: Mechanisms using a cryptographic check function |
ISO/IEC 15944-1:2011 | Information technology — Business operational view — Part 1: Operational aspects of open-edi for implementation |
10/30228415 DC : DRAFT NOV 2010 | BS ISO/IEC 29192-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - LIGHTWEIGHT CRYPTOGRAPHY - PART 2: BLOCK CIPHERS |
UNE-EN ISO 24534-4:2012 | Automatic vehicle and equipment identification - Electronic Registration Identification (ERI) for vehicles - Part 4: Secure communications using asymmetrical techniques (ISO 24534-4:2010) |
ISO/IEC 17922:2017 | Information technology — Security techniques — Telebiometric authentication framework using biometric hardware security module |
BS ISO/IEC 18033-1:2015 | Information technology. Security techniques. Encryption algorithms General |
INCITS/ISO/IEC 15944-1 : 2008(R2013) | INFORMATION TECHNOLOGY - BUSINESS AGREEMENT SEMANTIC DESCRIPTIVE TECHNIQUES - PART 1: BUSINESS OPERATIONAL ASPECTS OF OPEN-EDI FOR IMPLEMENTATION |
PD ISO/IEC TR 29149:2012 | Information technology. Security techniques. Best practices for the provision and use of time-stamping services |
09/30169508 DC : 0 | BS ISO/IEC 13888-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NON-REPUDIATION - PART 2: MECHANISMS USING SYMMETRIC TECHNIQUES |
ECMA 411 : 3ED 2017 | NFC-SEC-04: NFC-SEC ENTITY AUTHENTICATION AND KEY AGREEMENT USING SYMMETRIC CRYPTOGRAPHY |
ISO/IEC 20009-2:2013 | Information technology — Security techniques — Anonymous entity authentication — Part 2: Mechanisms based on signatures using a group public key |
BS EN ISO 24534-1:2010 | Automatic vehicle and equipment identification. Electronic registration identification (ERI) for vehicles Architecture |
BS ISO/IEC 9798-6:2010 | Information technology. Security techniques. Entity authentication Mechanisms using manual data transfer |
CSA ISO/IEC 13888-1 : 2010 : R2015 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NON-REPUDIATION - PART 1: GENERAL |
CSA ISO/IEC 9798-3:2002 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 3: MECHANISMS USING DIGITAL SIGNATURE TECHNIQUES |
CSA ISO/IEC 9798-3 : 2002 : INC : AMD 1 : 2012 : R2016 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 3: MECHANISMS USING DIGITAL SIGNATURE TECHNIQUES |
CSA ISO/IEC 9798-3 : 2002 : INC : AMD 1 : 2012 : R201100 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 3: MECHANISMS USING DIGITAL SIGNATURE TECHNIQUES |
CSA ISO/IEC 15944-1:2013 | INFORMATION TECHNOLOGY - BUSINESS OPERATIONAL VIEW - PART 1: OPERATIONAL ASPECTS OF OPEN-EDI FOR IMPLEMENTATION |
CR 14302:2002 | Health informatics - Framework for security requirements for intermittently connected devices |
CSA ISO/IEC 18033-1 : 2006 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 1: GENERAL |
CSA ISO/IEC 18033-1 : 2006 : INC : AMD 1 : 2012 : R2016 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 1: GENERAL |
ISO/IEC 13157-5:2016 | Information technology — Telecommunications and information exchange between systems — NFC Security — Part 5: NFC-SEC entity authentication and key agreement using symmetric cryptography |
I.S. CR 14302:2002 | HEALTH INFORMATICS - FRAMEWORK FOR SECURITY REQUIREMENTS FOR INTERMITTENTLY CONNECTED DEVICES |
ISO/IEC 22425:2017 | Information technology — Telecommunications and information exchange between systems — NFC-SEC Test Methods |
S.R. CEN/TS 419261:2015 | SECURITY REQUIREMENTS FOR TRUSTWORTHY SYSTEMS MANAGING CERTIFICATES AND TIME-STAMPS |
CSA ISO/IEC 10181-1 : 2000 | INFORMATION TECHNOLOGY - OPEN SYSTEMS INTERCONNECTION - SECURITY FRAMEWORKS FOR OPEN SYSTEMS: OVERVIEW |
ISO/IEC TR 29149:2012 | Information technology Security techniques Best practices for the provision and use of time-stamping services |
I.S. CR 14301:2002 | HEALTH INFORMATICS - FRAMEWORK FOR SECURITY PROTECTION OF HEALTHCARE COMMUNICATION |
ISO/IEC 9797-1:2011 | Information technology Security techniques Message Authentication Codes (MACs) Part 1: Mechanisms using a block cipher |
EN ISO 24534-1:2010 | Automatic vehicle and equipment identification - Electronic Registration Identification (ERI) for vehicles - Part 1: Architecture (ISO 24534-1:2010) |
CEN ISO/TS 24534-4:2008 | Automatic vehicle and equipment identification - Electronic Registration Identification (ERI) for vehicles - Part 4: Secure communications using asymmetrical techniques (ISO/TS 24534-4:2008) |
CEN ISO/TS 24534-3:2008 | Automatic vehicle and equipment identification - Electronic Registration Identification (ERI) for vehicles - Part 3: Vehicle data (ISO/TS 24534-3:2008) |
EN ISO 24534-3:2016 | Intelligent transport systems - Automatic vehicle and equipment identification - Electronic registration identification (ERI) for vehicles - Part 3: Vehicle data (ISO 24534-3:2016) |
CEI EN IEC 62056-5-3:2024 | Electricity metering data exchange - The DLMS®/COSEM suite - Part 5-3: DLMS®/COSEM application layer |
ISO/IEC 18031:2011 | Information technology Security techniques Random bit generation |
ISO/IEC 7498-1:1994 | Information technology — Open Systems Interconnection — Basic Reference Model: The Basic Model |
ISO/IEC 14888-3:2016 | Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms |
ISO/IEC 8825-1:2015 | Information technology ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER) Part 1: |
ISO/IEC 11770-2:2008 | Information technology Security techniques Key management Part 2: Mechanisms using symmetric techniques |
ISO/IEC 10181-1:1996 | Information technology Open Systems Interconnection Security frameworks for open systems: Overview |
ISO/IEC 9594-8:2017 | Information technology Open Systems Interconnection The Directory Part 8: Public-key and attribute certificate frameworks |
ISO 7498-2:1989 | Information processing systems Open Systems Interconnection Basic Reference Model Part 2: Security Architecture |
ISO/IEC 14888-1:2008 | Information technology — Security techniques — Digital signatures with appendix — Part 1: General |
ISO/IEC 13888-1:2009 | Information technology Security techniques Non-repudiation Part 1: General |
ISO/IEC 10181-2:1996 | Information technology Open Systems Interconnection Security frameworks for open systems: Authentication framework |
ISO/IEC 9796-2:2010 | Information technology Security techniques Digital signature schemes giving message recovery Part 2: Integer factorization based mechanisms |
AS ISO/IEC 9797.1:2019 | Information technology - Security techniques - Message Authentication Codes (MACs) Mechanisms using a block cipher |
ISO/IEC 14888-2:2008 | Information technology — Security techniques — Digital signatures with appendix — Part 2: Integer factorization based mechanisms |
ISO/IEC 11770-1:2010 | Information technology Security techniques Key management Part 1: Framework |
ISO/IEC 11770-3:2015 | Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.