ITU X.660 : 2011
|
INFORMATION TECHNOLOGY - PROCEDURES FOR THE OPERATION OF OBJECT IDENTIFIER REGISTRATION AUTHORITIES: GENERAL PROCEDURES AND TOP ARCS OF THE INTERNATIONAL OBJECT IDENTIFIER TREE |
ISO/IEC 18033-1 : 2015
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 1: GENERAL |
ISO/IEC 18032 : 2005(R2011)
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - PRIME NUMBER GENERATION |
ISO/IEC 18014-3 : 2009(R2015)
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - TIME-STAMPING SERVICES - PART 3: MECHANISMS PRODUCING LINKED TOKENS |
FIPS PUB 140 : 0001
|
SECURITY REQUIREMENTS FOR CRYPTOGRAPHIC MODULES |
ISO/IEC TR 14516 : 2002(R2018)
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR THE USE AND MANAGEMENT OF TRUSTED THIRD PARTY SERVICES |
ITU X.509 : 2016
|
INFORMATION TECHNOLOGY - OPEN SYSTEMS INTERCONNECTION - THE DIRECTORY: PUBLIC-KEY AND ATTRIBUTE CERTIFICATE FRAMEWORKS |
ISO/IEC 15945 : 2002(R2018)
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SPECIFICATION OF TTP SERVICES TO SUPPORT THE APPLICATION OF DIGITAL SIGNATURES |
ISO/IEC 7813 : 2006(R2018)
|
INFORMATION TECHNOLOGY - IDENTIFICATION CARDS - FINANCIAL TRANSACTION CARDS |
ISO/IEC 9834-1 : 2012
|
INFORMATION TECHNOLOGY - PROCEDURES FOR THE OPERATION OF OBJECT IDENTIFIER REGISTRATION AUTHORITIES: GENERAL PROCEDURES AND TOP ARCS OF THE INTERNATIONAL OBJECT IDENTIFIER TREE |
ISO/IEC 18033-2 : 2006(R2018)
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 2: ASYMMETRIC CIPHERS |
ISO/IEC 18033-3 : 2010(R2016)
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 3: BLOCK CIPHERS |
ISO/IEC 18014-2 : 2009(R2015)
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - TIME-STAMPING SERVICES - PART 2: MECHANISMS PRODUCING INDEPENDENT TOKENS |
ISO 13491-1 : 2016
|
FINANCIAL SERVICES - SECURE CRYPTOGRAPHIC DEVICES (RETAIL) - PART 1: CONCEPTS, REQUIREMENTS AND EVALUATION METHODS |
ISO/IEC 19790 : 2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SECURITY REQUIREMENTS FOR CRYPTOGRAPHIC MODULES |
ISO/IEC 27002 : 2013
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS |
ISO/IEC 8824 : 1990
|
INFORMATION PROCESSING SYSTEMS - OPEN SYSTEMS INTERCONNECTION - SPECIFICATION OF ABSTRACT SYNTAX NOTATION ONE (ASN.1) |
ISO TR 13569 : 2005
|
FINANCIAL SERVICES - INFORMATION SECURITY GUIDELINES |
ISO/IEC 9594-8 : 2017
|
INFORMATION TECHNOLOGY - OPEN SYSTEMS INTERCONNECTION - THE DIRECTORY - PART 8: PUBLIC-KEY AND ATTRIBUTE CERTIFICATE FRAMEWORKS |
TS 101 456 : 1.4.3
|
ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); POLICY REQUIREMENTS FOR CERTIFICATION AUTHORITIES ISSUING QUALIFIED CERTIFICATES |
ISO/IEC 10118-3 : 2004
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - HASH-FUNCTIONS - PART 3: DEDICATED HASH-FUNCTIONS |
ISO/IEC 7810 : 2003(R2013)
|
IDENTIFICATION CARDS - PHYSICAL CHARACTERISTICS |
ISO/IEC 10646-1 : 2000
|
INFORMATION TECHNOLOGY - UNIVERSAL MULTIPLE-OCTET CODED CHARACTER SET (UCS) - PART 1: ARCHITECTURE AND BASIC MULTILINGUAL PLANE |
TS 102 042 : 2.4.1
|
ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); POLICY REQUIREMENTS FOR CERTIFICATION AUTHORITIES ISSUING PUBLIC KEY CERTIFICATES |
ISO/IEC 18033-4 : 2011(R2017)
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 4: STREAM CIPHERS |