ISO/IEC 19772:2009
|
Information technology Security techniques Authenticated encryption
|
ISO/IEC 7498-3:1997
|
Information technology Open Systems Interconnection Basic Reference Model: Naming and addressing
|
ISO/IEC 7498-1:1994
|
Information technology Open Systems Interconnection Basic Reference Model: The Basic Model
|
ISO/IEC 11770-2:2008
|
Information technology Security techniques Key management Part 2: Mechanisms using symmetric techniques
|
IEEE 802.15.4-2011
|
IEEE Standard for Local and metropolitan area networks--Part 15.4: Low-Rate Wireless Personal Area Networks (LR-WPANs)
|
ISO/IEC 18033-2:2006
|
Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers
|
ISO/IEC 18033-3:2010
|
Information technology Security techniques Encryption algorithms Part 3: Block ciphers
|
IEC 60559:1989
|
Binary floating-point arithmetic for microprocessor systems
|
EN 300 328-1 : 1.3.1
|
ELECTROMAGNETIC COMPATIBILITY AND RADIO SPECTRUM MATTERS (ERM); WIDEBAND TRANSMISSION SYSTEMS; DATA TRANSMISSION EQUIPMENT OPERATING IN THE 2,4 GHZ ISM BAND AND USING SPREAD SPECTRUM MODULATION TECHNIQUES; PART 1: TECHNICAL CHARACTERISTICS AND TEST CONDITIONS
|
IEEE 802.11-2016
|
IEEE Standard for Information technology--Telecommunications and information exchange between systems Local and metropolitan area networks--Specific requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications
|
ISO/IEC 19790:2012
|
Information technology Security techniques Security requirements for cryptographic modules
|
ISO/IEC 10731:1994
|
Information technology Open Systems Interconnection Basic Reference Model Conventions for the definition of OSI services
|
ISO 7498-2:1989
|
Information processing systems Open Systems Interconnection Basic Reference Model Part 2: Security Architecture
|
FIPS PUB 197 : 2001
|
ADVANCED ENCRYPTION STANDARD (AES)
|
IEC 61804-3:2015
|
Function Blocks (FB) for process control and Electronic Device Description Language (EDDL) - Part 3: EDDL syntax and semantics
|
IEEE 802.16-2012
|
IEEE Standard for Air Interface for Broadband Wireless Access Systems
|
ISO/IEC 646:1991
|
Information technology ISO 7-bit coded character set for information interchange
|
ISO/IEC 10118-3:2004
|
Information technology Security techniques Hash-functions Part 3: Dedicated hash-functions
|
ISA TR100.00.01 : 2006
|
THE AUTOMATION ENGINEER'S GUIDE TO WIRELESS TECHNOLOGY - PART 1: THE PHYSICS OF RADIO, A TUTORIAL
|
ISO/IEC 10118-2:2010
|
Information technology Security techniques Hash-functions Part 2: Hash-functions using an n-bit block cipher
|
ANSI X9.63 : 2011
|
FINANCIAL SERVICES - PUBLIC KEY CRYPTOGRAPHY FOR THE FINANCIAL SERVICES INDUSTRY, KEY AGREEMENT AND KEY TRANSPORT USING ELLIPTIC CURVE CRYPTOGRAPHY
|
ISO/IEC 7498-4:1989
|
Information processing systems Open Systems Interconnection Basic Reference Model Part 4: Management framework
|
ISO/IEC 9797-2:2011
|
Information technology Security techniques Message Authentication Codes (MACs) Part 2: Mechanisms using a dedicated hash-function
|
ISO/IEC 11770-1:2010
|
Information technology Security techniques Key management Part 1: Framework
|
EN 300 220-1 : 2.4.1
|
SHORT RANGE DEVICES (SRD) OPERATING IN THE FREQUENCY RANGE 25 MHZ TO 1000 MHZ; PART 1: TECHNICAL CHARACTERISTICS AND METHODS OF MEASUREMENT
|
ISO/IEC 11770-3:2015
|
Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques
|