Why do you have to pay for standards?
Drupal Primary tabs
You may search by ICS code, document number, title, or keyword.
Search results
Showing items 61 through 70 of 504.
-
ISO/IEC 15408-1:2005
Information technology -- Security techniques -- Evaluation criteria for IT security -- Part 1: Introduction and general modeliec (not verified)
-
ISO/IEC TR 15443-1:2005
Information technology - Security techniques - A framework for IT security assurance - Part 1: Overview and frameworkiec (not verified)
-
ISO/IEC 13888-1:2004
IT security techniques -- Non-repudiation -- Part 1: Generaliec (not verified)
-
ISO/IEC 15946-1:2002
Information technology -- Security techniques -- Cryptographic techniques based on elliptic curves -- Part 1: Generaliec (not verified)
-
ISO/IEC 18014-1:2002
Information technology -- Security techniques -- Time-stamping services -- Part 1: Frameworkiec (not verified)
-
ISO/IEC 9797-1:1999
Information technology -- Security techniques -- Message Authentication Codes (MACs) -- Part 1: Mechanisms using a block cipheriec (not verified)
-
ISO/IEC 14888-1:1998
Information technology -- Security techniques -- Digital signatures with appendix -- Part 1: Generaliec (not verified)
-
ISO/IEC 9798-1:1997
Information technology -- Security techniques -- Entity authentication -- Part 1: Generaliec (not verified)
-
ISO/IEC 11770-1:1996
Information technology -- Security techniques -- Key management -- Part 1: Frameworkiec (not verified)
-
ISO/IEC 27553-1:2022
Information security, cybersecurity and privacy protection - Security and privacy requirements for authentication using biometrics on mobile devices - Part 1: Local modesiec (not verified)