CSA ISO/IEC 11770-4 : 2007
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS |
BS ISO/IEC 11889-1 : 2009
|
INFORMATION TECHNOLOGY - TRUSTED PLATFORM MODULE - PART 1: LIBRARY - ARCHITECTURE |
14/30302798 DC : 0
|
BS ISO/IEC 11889-1 - INFORMATION TECHNOLOGY - TRUSTED PLATFORM MODULE - PART 1: ARCHITECTURE |
BS ISO/IEC/IEEE 8802-22 : 2015
|
INFORMATION TECHNOLOGY - TELECOMMUNICATIONS AND INFORMATION EXCHANGE BETWEEN SYSTEMS - LOCAL AND METROPOLITAN AREA NETWORKS - SPECIFIC REQUIREMENTS - PART 22: COGNITIVE WIRELESS RAN MEDIUM ACCESS CONTROL (MCA) AND PHYSICAL LAYER (PHY) SPECIFICATIONS: POLICIES AND PROCEDURES FOR OPERATION IN THE TV BANDS |
ISO/IEC 9796-2 : 2010(R2016)
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DIGITAL SIGNATURE SCHEMES GIVING MESSAGE RECOVERY - PART 2: INTEGER FACTORIZATION BASED MECHANISMS |
09/30214048 DC : 0
|
BS ISO/IEC 9796-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DIGITAL SIGNATURE SCHEMES GIVING MESSAGE RECOVERY - PART 2: INTEGER FACTORIZATION BASED MECHANISMS |
BS ISO/IEC 11889-4 : 2009
|
INFORMATION TECHNOLOGY - TRUSTED PLATFORM MODULE LIBRARY - PART 4: SUPPORTING OUTINES |
INCITS/ISO/IEC 9796-3 : 2000 : R2005
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DIGITAL SIGNATURE SCHEMES GIVING MESSAGE RECOVERY - PART 3: DISCRETE LOGARITHM BASED MECHANISMS |
ISO/IEC/IEEE 8802-22 : 2015
|
INFORMATION TECHNOLOGY - TELECOMMUNICATIONS AND INFORMATION EXCHANGE BETWEEN SYSTEMS - LOCAL AND METROPOLITAN AREA NETWORKS - SPECIFIC REQUIREMENTS - PART 22: COGNITIVE WIRELESS RAN MEDIUM ACCESS CONTROL (MCA) AND PHYSICAL LAYER (PHY) SPECIFICATIONS: POLICIES AND PROCEDURES FOR OPERATION IN THE TV BANDS |
ANSI X9.98 : 2010(R2017)
|
FINANCIAL SERVICES - LATTICE-BASED POLYNOMIAL PUBLIC KEY ESTABLISHMENT ALGORITHM FOR THE FINANCIAL SERVICES INDUSTRY |
INCITS/ISO/IEC 9796-3 : 2000
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DIGITAL SIGNATURE SCHEMES GIVING MESSAGE RECOVERY - PART 3: DISCRETE LOGARITHM BASED MECHANISMS |
14/30302807 DC : 0
|
BS ISO/IEC 11889-4 - INFORMATION TECHNOLOGY - TRUSTED PLATFORM MODULE - PART 4: SUPPORTING ROUTINES |
14/30302801 DC : 0
|
BS ISO/IEC 11889-2 - INFORMATION TECHNOLOGY - TRUSTED PLATFORM MODULE - PART 2: STRUCTURES |
BS PD ISO/TR 14742 : 2010
|
FINANCIAL SERVICES - RECOMMENDATIONS ON CRYPTOGRAPHIC ALGORITHMS AND THEIR USE |
SAE J 2945 : 2017
|
DEDICATED SHORT RANGE COMMUNICATION (DSRC) SYSTEMS ENGINEERING PROCESS GUIDANCE FOR SAE J2945/X DOCUMENTS AND COMMON DESIGN CONCEPTS |
CSA ISO/IEC 11770-4 : 2007 : R2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS |
INCITS/ISO/IEC 9796-3 : 2000
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DIGITAL SIGNATURE SCHEMES GIVING MESSAGE RECOVERY - PART 3: DISCRETE LOGARITHM BASED MECHANISMS |
INCITS/ISO/IEC 11770-4 : 2008
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS |
CSA ISO/IEC 11889-2 : 2016
|
INFORMATION TECHNOLOGY - TRUSTED PLATFORM MODULE LIBRARY - PART 2: STRUCTURES |
CSA ISO/IEC 11770-4 : 2007
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS |
CSA ISO/IEC 11770-4 : 2007 : INC : COR 1 : 2010
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS |
CSA ISO/IEC 11770-4 : 2007 : R2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS |
IEEE 1363.3 : 2013
|
IDENTITY-BASED CRYPTOGRAPHIC TECHNIQUES USING PAIRINGS |
ANSI X9.92-1 : 2009
|
PUBLIC KEY CRYPTOGRAPHY FOR THE FINANCIAL SERVICES INDUSTRY - DIGITAL SIGNATURE ALGORITHMS GIVING PARTIAL MESSAGE RECOVERY - PART 1: ELLIPTIC CURVE PINTSOV-VANSTONE SIGNATURES (ECPVS) |
IEEE 1722 : 2016
|
A TRANSPORT PROTOCOL FOR TIME-SENSITIVE APPLICATIONS IN BRIDGED LOCAL AREA NETWORKS |
IEEE 1363.2 : 2008
|
SPECIFICATION FOR PASSWORD-BASED PUBLIC-KEY CRYPTOGRAPHIC TECHNIQUES |
IEEE 1363.1 : 2008
|
PUBLIC KEY CRYPTOGRAPHIC TECHNIQUES BASED ON HARD PROBLEMS OVER LATTICES |
IEEE 802.22.1 : 2010
|
INFORMATION TECHNOLOGY - TELECOMMUNICATIONS AND INFORMATION EXCHANGE BETWEEN SYSTEMS - LOCAL AND METROPOLITAN AREA NETWORKS - SPECIFIC REQUIREMENTS - PART 22.1: STANDARD TO ENHANCE HARMFUL INTERFERENCE PROTECTION FOR LOW-POWER LICENSED DEVICES OPERATING IN TV BROADCAST BANDS |
IEEE 1609.0 : 2013
|
GUIDE FOR WIRELESS ACCESS IN VEHICULAR ENVIRONMENTS (WAVE) ARCHITECTURE |
IEEE 802.22 : 2011
|
INFORMATION TECHNOLOGY - TELECOMMUNICATIONS AND INFORMATION EXCHANGE BETWEEN SYSTEMS WIRELESS REGIONAL AREA NETWORKS (WRAN) - SPECIFIC REQUIREMENTS - PART 22: COGNITIVE WIRELESS RAN MEDIUM ACCESS CONTROL (MAC) AND PHYSICAL LAYER (PHY) SPECIFICATIONS: POLICIES AND PROCEDURES FOR OPERATION IN THE TV BANDS |
BS ISO/IEC 9796-2 : 2010
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DIGITAL SIGNATURE SCHEMES GIVING MESSAGE RECOVERY - PART 2: INTEGER FACTORIZATION BASED MECHANISMS |
IEEE 1722.1 : 2013
|
DEVICE DISCOVERY, CONNECTION MANAGEMENT, AND CONTROL PROTOCOL FOR IEEE 1722[TM] BASED DEVICES |
CSA ISO/IEC 11889-4 : 2016
|
INFORMATION TECHNOLOGY - TRUSTED PLATFORM MODULE LIBRARY - PART 4: SUPPORTING ROUTINES |
ANSI X9.44 : 2007
|
FINANCIAL SERVICES - PUBLIC-KEY CRYPTOGRAPHY FOR THE FINANCIAL SERVICES INDUSTRY - KEY ESTABLISHMENT USING INTEGER FACTORIZATION CRYPTOGRAPHY |
ISO TR 14742 : 2010(R2013)
|
FINANCIAL SERVICES - RECOMMENDATIONS ON CRYPTOGRAPHIC ALGORITHMS AND THEIR USE |
ISO/IEC 11889-4 : 2015
|
INFORMATION TECHNOLOGY - TRUSTED PLATFORM MODULE LIBRARY - PART 4: SUPPORTING ROUTINES |