Search
Drupal Primary tabs
You may search by ICS code, document number, title, or keyword.
Search results
Showing items 71 through 80 of 438.
-
ISO/IEC 18033-3:2005/COR1:2006
Corrigendum 1 - Information technology -- Security techniques -- Encryption algorithms -- Part 3: Block ciphers -iec (not verified)
-
ISO/IEC 10118-3:2004/AMD1:2006
Amendment 1 - Information technology -- Security techniques -- Hash-functions -- Part 3: Dedicated hash-functions - Dedicated Hash-Function 8 (SHA-224)iec (not verified)
-
ISO/IEC 15408-1:2005
Information technology -- Security techniques -- Evaluation criteria for IT security -- Part 1: Introduction and general modeliec (not verified)
-
ISO/IEC 18033-1:2005
Information technology -- Security techniques -- Encryption algorithms -- Part 1: Generaliec (not verified)
-
ISO/IEC TR 15443-1:2005
Information technology - Security techniques - A framework for IT security assurance - Part 1: Overview and frameworkiec (not verified)
-
ISO/IEC 13888-1:2004
IT security techniques -- Non-repudiation -- Part 1: Generaliec (not verified)
-
ISO/IEC 15946-1:2002
Information technology -- Security techniques -- Cryptographic techniques based on elliptic curves -- Part 1: Generaliec (not verified)
-
ISO/IEC 18014-1:2002
Information technology -- Security techniques -- Time-stamping services -- Part 1: Frameworkiec (not verified)
-
ISO/IEC 10118-1:2000
Information technology -- Security techniques -- Hash-functions -- Part 1: Generaliec (not verified)
-
ISO/IEC 9797-1:1999
Information technology -- Security techniques -- Message Authentication Codes (MACs) -- Part 1: Mechanisms using a block cipheriec (not verified)