I.S. CEN TS 15523:2006
|
POSTAL SERVICE - STATEMENT OF MAILING SUBMISSION |
15/30324800 DC : 0
|
BS ISO/IEC 16512-2 - INFORMATION TECHNOLOGY - RELAYED MULTICAST PROTOCOL: SPECIFICATION FOR SIMPLEX GROUP APPLICATIONS |
07/30154069 DC : 0
|
BS ISO/IEC 24727-3 - IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARD PROGRAMMING INTERFACES - PART 3: APPLICATION INTERFACE |
UNI CEN ISO/TS 24534-4 : 2008
|
AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES - PART 4: SECURE COMMUNICATIONS USING ASYMMETRICAL TECHNIQUES |
DIN EN ISO 22600-1:2015-02
|
HEALTH INFORMATICS - PRIVILEGE MANAGEMENT AND ACCESS CONTROL - PART 1: OVERVIEW AND POLICY MANAGEMENT (ISO 22600-1:2014) |
BS ISO/IEC 14888-2:2008
|
Information technology. Security techniques. Digital signatures with appendix Integer factorization based mechanisms |
CAN/CSA-ISO/IEC 10181-2-00 (R2013)
|
Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Authentication Framework (Adopted ISO/IEC 10181-2:1996, first edition, 1996-05-15) |
16/30339535 DC : 0
|
BS EN 62056-5-3 ED 3.0 - ELECTRICITY METERING DATA EXCHANGE - THE DLMS/COSEM SUITE - PART 5-3: DLMS/COSEM APPLICATION LAYER |
07/30107757 DC : 0
|
BS ISO/IEC 24708 - INFORMATION TECHNOLOGY - BIOAPI INTERWORKING PROTOCOL |
PD CEN/TS 15480-2:2012
|
Identification card systems. European Citizen Card Logical data structures and security services |
DIN EN ISO 22600-2 E : 2015
|
HEALTH INFORMATICS - PRIVILEGE MANAGEMENT AND ACCESS CONTROL - PART 2: FORMAL MODELS (ISO 22600-2:2014) |
CSA ISO/IEC 11770-4 : 2007 : R2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS |
CSA ISO/IEC TR 14516 : 2004
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR THE USE AND MANAGEMENT OF TRUSTED THIRD PARTY SERVICES |
CAN/CSA-ISO/IEC TR 14516-04 (R2017)
|
Information Technology - Security Techniques - Guidelines for the use and Management of Trusted Third Party Services (Adopted ISO/IEC TR 14516:2002, first edition, 2002-06-15) |
CSA ISO/IEC TR 14516 : 2004 : R2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR THE USE AND MANAGEMENT OF TRUSTED THIRD PARTY SERVICES |
ANSI X9.117 : 2012
|
SECURE REMOTE ACCESS - MUTUAL AUTHENTICATION |
EN ISO 24534-4:2010
|
Automatic vehicle and equipment identification - Electronic Registration Identification (ERI) for vehicles - Part 4: Secure communications using asymmetrical techniques (ISO 24534-4:2010) |
I.S. EN 62056-5-3:2017
|
ELECTRICITY METERING DATA EXCHANGE - THE DLMS/COSEM SUITE - PART 5-3: DLMS/COSEM APPLICATION LAYER |
S.R. CEN/TS 15480-2:2012
|
IDENTIFICATION CARD SYSTEMS - EUROPEAN CITIZEN CARD - PART 2: LOGICAL DATA STRUCTURES AND SECURITY SERVICES |
UNI CEN/TS 15480-2 : 2012
|
IDENTIFICATION CARD SYSTEMS - EUROPEAN CITIZEN CARD - PART 2: LOGICAL DATA STRUCTURES AND SECURITY SERVICES |
UNI EN ISO 22600-2 : 2014
|
HEALTH INFORMATICS - PRIVILEGE MANAGEMENT AND ACCESS CONTROL - PART 2: FORMAL MODELS |
CEN/TS 15130:2006
|
Postal services - DPM infrastructure - Messages supporting DPM applications |
CEN/TS 15523:2011
|
Postal Services - Statement of mailing submission |
CEN/TS 15480-2:2012
|
Identification card systems - European Citizen Card - Part 2: Logical data structures and security services |
EN 62056-5-3:2017
|
Electricity metering data exchange - The DLMS/COSEM suite - Part 5-3: DLMS/COSEM application layer |
BS EN ISO 22600-1:2014
|
Health informatics. Privilege management and access control Overview and policy management |
ISO/IEC 16512-2:2016
|
Information technology Relayed multicast protocol: Specification for simplex group applications Part 2: |
I.S. EN ISO 22600-1:2014
|
HEALTH INFORMATICS - PRIVILEGE MANAGEMENT AND ACCESS CONTROL - PART 1: OVERVIEW AND POLICY MANAGEMENT (ISO 22600-1:2014) |
DD CEN/TS 15130:2006
|
Postal services. DPM infrastructure. Messages supporting DPM applications |
12/30236952 DC : 0
|
BS ISO/IEC 20009-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ANONYMOUS ENTITY AUTHENTICATION - PART 2: MECHANISMS BASED ON SIGNATURES USING A GROUP PUBLIC KEY |
ECMA 219 : 2ED 96
|
AUTHENTICATION AND PRIVILEGE ATTRIBUTE SECURITY APPLICATION WITH RELATED KEY DISTRIBUTION FUNCTIONS - PART 1, 2 AND 3 |
BS ISO/IEC 10181-2:1996
|
Information technology. Open systems interconnection. Security frameworks for open systems Authentication framework |
BS EN 62056-5-3:2017
|
Electrcity metering data exchange. The DLMS/COSEM suite DLMS/COSEM application layer |
DD ISO/TS 22600-1:2006
|
Health informatics. Privilege management and access control Overview and policy management |
ISO/IEC TR 14516:2002
|
Information technology Security techniques Guidelines for the use and management of Trusted Third Party services |
BS ISO/IEC 20009-2:2013
|
Information technology. Security techniques. Anonymous entity authentication Mechanisms based on signatures using a group public key |
17/30349181 DC : 0
|
BS ISO/IEC 24760-1 AMENDMENT 1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - A FRAMEWORK FOR IDENTITY MANAGEMENT - PART 1: TERMINOLOGY AND CONCEPTS |
14/30261795 DC : 0
|
BS ISO/IEC 17821 - INFORMATION TECHNOLOGY - SPECIFICATION OF LOW POWER WIRELESS MESH NETWORK OVER CHANNEL-HOPPED TDMA LINKS |
ISO 15668:1999
|
Banking Secure file transfer (retail) |
12/30271004 DC : 0
|
BS ISO 22600-2 - HEALTH INFORMATICS - PRIVILEGE MANAGEMENT AND ACCESS CONTROL - PART 2: FORMAL MODELS |
BS ISO/IEC 19790:2012
|
Information technology. Security techniques. Security requirements for cryptographic modules |
PD ISO/TR 14742:2010
|
Financial services. Recommendations on cryptographic algorithms and their use |
04/30105372 DC : DRAFT DEC 2004
|
ISO/IEC 11770-4 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS |
ECMA 410 : 3ED 2017
|
NFC-SEC-03: NFC-SEC ENTITY AUTHENTICATION AND KEY AGREEMENT USING ASYMMETRIC CRYPTOGRAPHY |
DD CEN/TS 15480-2:2007
|
Identification card systems. European Citizen Card Logical data structures and card services |
CSA ISO/IEC 14888-2 : 2009 : R2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DIGITAL SIGNATURES WITH APPENDIX - PART 2: INTEGER FACTORIZATION BASED MECHANISMS |
ISO/IEC 19790:2012
|
Information technology Security techniques Security requirements for cryptographic modules |
EG 202 387 : 1.1.1
|
TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); SECURITY DESIGN GUIDE; METHOD FOR APPLICATION OF COMMON CRITERIA TO ETSI DELIVERABLES |
ETR 237 : 20001
|
SECURITY TECHNIQUES ADVISORY GROUP (STAG) - BASELINE SECURITY STANDARDS - FEATURES AND MECHANISMS |
BS EN ISO 24534-4:2010+A1:2019
|
Automatic vehicle and equipment identification. Electronic registration identification (ERI) for vehicles Secure communications using asymmetrical techniques |
ISO/TS 22600-2:2006
|
Health informatics Privilege management and access control Part 2: Formal models |
ISO/IEC 29157:2015
|
Information technology Telecommunications and information exchange between systems PHY/MAC specifications for short-range wireless low-rate applications in the ISM band |
BS ISO/IEC 16512-2:2016
|
Information technology. Relayed multicast protocol: Specification for simplex group applications |
07/30163724 DC : 0
|
BS ISO/IEC 24727-4 - IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARDS PROGRAMMING INTERFACE - PART 4: API ADMINISTRATION |
PD CEN/TS 15480-3:2014
|
Identification card systems. European Citizen Card European Citizen Card Interoperability using an application interface |
BS ISO 15668:1999
|
Banking. Secure file transfer (retail) |
BS EN ISO 22600-2:2014
|
Health informatics. Privilege management and access control Formal models |
07/30161079 DC : 0
|
BS EN 14890-1 - APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES |
TS 102 165-2 : 4.2.1
|
TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); METHODS AND PROTOCOLS; PART 2: PROTOCOL FRAMEWORK DEFINITION; SECURITY COUNTER MEASURES |
BS ISO/IEC 17821:2015
|
Information technology. Specification of low power wireless mesh network over channel-hopped TDMA links |
CSA ISO/IEC 14888-2 : 2009 : INC : COR 1 : 2016 : R201400
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DIGITAL SIGNATURES WITH APPENDIX - PART 2: INTEGER FACTORIZATION BASED MECHANISMS |
INCITS/ISO/IEC 7816-8 : 1999
|
IDENTIFICATION CARDS - INTEGRATED CIRCUIT(S) CARDS WITH CONTACTS - PART 8: SECURITY RELATED INTERINDUSTRY COMMANDS |
ANSI X9.112-1 : 2009
|
WIRELESS MANAGEMENT AND SECURITY - PART 1: GENERAL REQUIREMENTS |
ISO 15764:2004
|
Road vehicles Extended data link security |
I.S. CEN TS 15130:2006
|
POSTAL SERVICES - DPM INFRASTRUCTURE - MESSAGES SUPPORTING DPM APPLICATIONS |
BS ISO/IEC 11770-3 : 2015
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 3: MECHANISMS USING ASYMMETRIC TECHNIQUES |
S.R. CEN/TS 15480-3:2014
|
IDENTIFICATION CARD SYSTEMS - EUROPEAN CITIZEN CARD - PART 3: EUROPEAN CITIZEN CARD INTEROPERABILITY USING AN APPLICATION INTERFACE |
ISO/TS 22600-1:2006
|
Health informatics Privilege management and access control Part 1: Overview and policy management |
ANSI X9.112 : 2016
|
WIRELESS MANAGEMENT AND SECURITY - PART 1: GENERAL REQUIREMENTS |
ISO/IEC 17821:2015
|
Information technology Specification of low power wireless mesh network over channel-hopped TDMA links |
ISO 24534-4:2010
|
Automatic vehicle and equipment identification — Electronic registration identification (ERI) for vehicles — Part 4: Secure communications using asymmetrical techniques |
ISO/TR 14742:2010
|
Financial services Recommendations on cryptographic algorithms and their use |
IEC 62056-5-3:2017
|
Electrcity metering data exchange - The DLMS/COSEM suite - Part 5-3: DLMS/COSEM application layer |
S.R. CEN ISO/TS 24534-4:2008
|
AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES - PART 4: SECURE COMMUNICATIONS USING ASYMMETRICAL TECHNIQUES |
DIN EN 726-2:1996-08
|
IDENTIFICATION CARD SYSTEMS - TELECOMMUNICATIONS INTEGRATED CIRCUIT(S) CARDS AND TERMINALS - PART 2: SECURITY FRAMEWORK |
EN ISO 22600-2:2014
|
Health informatics - Privilege management and access control - Part 2: Formal models (ISO 22600-2:2014) |
EN ISO 22600-1:2014
|
Health informatics - Privilege management and access control - Part 1: Overview and policy management (ISO 22600-1:2014) |
DD ENV 13729:2000
|
Health informatics. Secure user identification. Strong authentication microprocessor cards |
12/30271001 DC : 0
|
BS ISO 22600-1 - HEALTH INFORMATICS - PRIVILEGE MANAGEMENT AND ACCESS CONTROL - PART 1: OVERVIEW AND POLICY MANAGEMENT |
03/308265 DC : DRAFT JUNE 2003
|
ISO/TS 24534 - ROAD TRANSPORT AND TRAFFIC TELEMATICS - AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES |
BS ISO/IEC TR 14516:2002
|
Information technology. Security techniques. Guidelines for the use and management of trusted third party services |
UNE-EN ISO 24534-4:2012
|
Automatic vehicle and equipment identification - Electronic Registration Identification (ERI) for vehicles - Part 4: Secure communications using asymmetrical techniques (ISO 24534-4:2010) |
UNI EN ISO 22600-1 : 2014
|
HEALTH INFORMATICS - PRIVILEGE MANAGEMENT AND ACCESS CONTROL - PART 1: OVERVIEW AND POLICY MANAGEMENT |
DD CEN ISO/TS 24534-4:2008
|
Automatic vehicle and equipment identification. Electronic registration identification (ERI) for vehicles Secure communications using asymmetrical techniques |
CAN/CSA-ISO/IEC 11770-3:16
|
Information technology - Security techniques - Key management - Part 3: Mechanisms using asymmetric techniques (Adopted ISO/IEC 11770-3:2015, third edition, 2015-08-01) |
08/30195403 DC : 0
|
BS EN ISO 24534-4 - AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES - PART 4: SECURE COMMUNICATIONS USING ASYMMETRICAL TECHNIQUES |
DIN EN ISO 22600-2:2015-02
|
HEALTH INFORMATICS - PRIVILEGE MANAGEMENT AND ACCESS CONTROL - PART 2: FORMAL MODELS (ISO 22600-2:2014) |
DD CEN/TS 15523:2011
|
Postal services. Statement of mailing submission |
07/30161082 DC : 0
|
BS EN 14890-2 - APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 2: ADDITIONAL SERVICES |
CSA ISO/IEC 11770-4 : 2007
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS |
CSA ISO/IEC 11770-4 : 2007 : R2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS |
CSA ISO/IEC 11770-4 : 2007 : INC : COR 1 : 2010
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS |
CSA ISO/IEC 14888-2 :2009
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DIGITAL SIGNATURES WITH APPENDIX - PART 2: INTEGER FACTORIZATION BASED MECHANISMS |
ISO/IEC 13157-4:2016
|
Information technology Telecommunications and information exchange between systems NFC Security Part 4: NFC-SEC entity authentication and key agreement using asymmetric cryptography |
S.R. CEN/TS 15523:2011
|
POSTAL SERVICES - STATEMENT OF MAILING SUBMISSION |
UNI EN ISO 24534-4 : 2011
|
AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES - PART 4: SECURE COMMUNICATIONS USING ASYMMETRICAL TECHNIQUES |
ISO/IEC 14888-2:2008
|
Information technology Security techniques Digital signatures with appendix Part 2: Integer factorization based mechanisms |
ISO/IEC 29167-16:2015
|
Information technology — Automatic identification and data capture techniques — Part 16: Crypto suite ECDSA-ECDH security services for air interface communications |
I.S. EN ISO 24534-4:2010&A1:2019
|
AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES - PART 4: SECURE COMMUNICATIONS USING ASYMMETRICAL TECHNIQUES |
ISO/TS 24534-4:2008
|
Automatic vehicle and equipment identification Electronic Registration Identification (ERI) for vehicles Part 4: Secure communications using asymmetrical techniques |
ISO 22600-2:2014
|
Health informatics Privilege management and access control Part 2: Formal models |
ISO 22600-1:2014
|
Health informatics Privilege management and access control Part 1: Overview and policy management |
EN 726-2:1995
|
Identification card systems - Telecommunications integrated circuit(s) cards and terminals - Part 2: Security framework |
UNI CEN/TS 15480-3 : 2014
|
IDENTIFICATION CARD SYSTEMS - EUROPEAN CITIZEN CARD - PART 3: EUROPEAN CITIZEN CARD INTEROPERABILITY USING AN APPLICATION INTERFACE |
13/30257954 DC : 0
|
BS ISO/IEC 11770-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 3: MECHANISMS USING ASYMMETRIC TECHNIQUES |
DD CEN/TS 15480-3:2010
|
Identification card systems. European citizen card European citizen card interoperability using an application interface |
DD ISO/TS 22600-2:2006
|
Health informatics. Privilege management and access control Formal models |
CAN/CSA-ISO/IEC 16512-2:18
|
Information technology — Relayed multicast protocol: Specification for simplex group applications (Adopted ISO/IEC 16512-2:2016, third edition, 2016-04-01) |
07/30161232 DC : 0
|
BS ISO/IEC 11770-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 3: MECHANISMS USING ASYMMETRIC TECHNIQUES |
INCITS/ISO/IEC 7816-8 : 1999 : R2005
|
IDENTIFICATION CARDS - INTEGRATED CIRCUIT(S) CARDS WITH CONTACTS - PART 8: SECURITY RELATED INTERINDUSTRY COMMANDS |
ISO 11568-6:1998
|
Banking Key management (retail) Part 6: Key management schemes |
INCITS/ISO/IEC 11770-4 : 2008
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS |
DIN EN ISO 22600-1 E : 2015
|
HEALTH INFORMATICS - PRIVILEGE MANAGEMENT AND ACCESS CONTROL - PART 1: OVERVIEW AND POLICY MANAGEMENT (ISO 22600-1:2014) |
UNI CEN/TS 15523 : 2011
|
POSTAL SERVICES - STATEMENT OF MAILING SUBMISSION |
ISO/IEC 20009-2:2013
|
Information technology Security techniques Anonymous entity authentication Part 2: Mechanisms based on signatures using a group public key |
ISO/IEC 11770-3:2015
|
Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques |
CAN/CSA-ISO/IEC 29167-16:16
|
Information technology Automatic identification and data capture techniques Part 16: Crypto suite ECDSA-ECDH security services for air interface communications (Adopted ISO/IEC 29167-16:2015, first edition, 2015-11-15) |
I.S. EN ISO 22600-2:2014
|
HEALTH INFORMATICS - PRIVILEGE MANAGEMENT AND ACCESS CONTROL - PART 2: FORMAL MODELS (ISO 22600-2:2014) |
CEN/TS 15480-3:2014
|
Identification card systems - European Citizen Card - Part 3: European Citizen Card Interoperability using an application interface |
CEN ISO/TS 24534-4:2008
|
Automatic vehicle and equipment identification - Electronic Registration Identification (ERI) for vehicles - Part 4: Secure communications using asymmetrical techniques (ISO/TS 24534-4:2008) |