ISO/IEC 18031:2011
|
Information technology Security techniques Random bit generation
|
ISO 12855:2015
|
Electronic fee collection Information exchange between service provision and toll charging
|
ISO/IEC 27001:2013
|
Information technology — Security techniques — Information security management systems — Requirements
|
ISO/IEC 8825-2:2015
|
Information technology ASN.1 encoding rules: Specification of Packed Encoding Rules (PER) Part 2:
|
ISO/IEC 14888-3:2016
|
Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms
|
ISO/IEC 27003:2017
|
Information technology — Security techniques — Information security management systems — Guidance
|
EN 15509:2014
|
Electronic fee collection - Interoperability application profile for DSRC
|
ISO/IEC 8825-1:2015
|
Information technology ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER) Part 1:
|
ISO 17573:2010
|
Electronic fee collection Systems architecture for vehicle-related tolling
|
CEN ISO/TS 13141 : 2010 COR 2013
|
ELECTRONIC FEE COLLECTION - LOCALISATION AUGMENTATION COMMUNICATION FOR AUTONOMOUS SYSTEMS (ISO/TS 13141:2010/COR 1:2013)
|
ISO/IEC 18033-2:2006
|
Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers
|
ISO/IEC 8825-4:2015
|
Information technology ASN.1 encoding rules: XML Encoding Rules (XER) Part 4:
|
ISO/IEC 18033-3:2010
|
Information technology Security techniques Encryption algorithms Part 3: Block ciphers
|
ISO/IEC 19790:2012
|
Information technology — Security techniques — Security requirements for cryptographic modules
|
ISO/TS 17574:2017
|
Electronic fee collection — Guidelines for security protection profiles
|
ISO/IEC 27002:2013
|
Information technology Security techniques Code of practice for information security controls
|
EN ISO 12855:2015 (edition 2)
|
Electronic fee collection - Information exchange between service provision and toll charging (ISO 12855:2015)
|
ISO/TS 14907-2:2016
|
Electronic fee collection Test procedures for user and fixed equipment Part 2: Conformance test for the on-board unit application interface
|
ISO/IEC 10181-1:1996
|
Information technology Open Systems Interconnection Security frameworks for open systems: Overview
|
ISO/TS 17575-1:2010
|
Electronic fee collection Application interface definition for autonomous systems Part 1: Charging
|
ISO/IEC 9594-8:2017
|
Information technology Open Systems Interconnection The Directory Part 8: Public-key and attribute certificate frameworks
|
ISO 14906:2011
|
Electronic fee collection Application interface definition for dedicated short-range communication
|
ISO 7498-2:1989
|
Information processing systems Open Systems Interconnection Basic Reference Model Part 2: Security Architecture
|
ISO/IEC 14888-1:2008
|
Information technology Security techniques Digital signatures with appendix Part 1: General
|
ISO/IEC 27005:2011
|
Information technology Security techniques Information security risk management
|
CEN ISO/TS 14907-2:2016
|
Electronic fee collection - Test procedures for user and fixed equipment - Part 2: Conformance test for the on-board unit application interface (ISO/TS 14907-2:2016)
|
ISO/TS 13141:2010
|
Electronic fee collection Localisation augmentation communication for autonomous systems
|
CEN ISO/TS 17575-1:2010/AC:2013
|
ELECTRONIC FEE COLLECTION - APPLICATION INTERFACE DEFINITION FOR AUTONOMOUS SYSTEMS - PART 1: CHARGING (ISO/TS 17575-1:2010/COR 1:2013)
|
CEN ISO/TS 17574:2017
|
Electronic fee collection - Guidelines for security protection profiles (ISO/TS 17574:2017)
|
ISO/IEC 9797-1:2011
|
Information technology Security techniques Message Authentication Codes (MACs) Part 1: Mechanisms using a block cipher
|
ISO/IEC 10118-3:2004
|
Information technology Security techniques Hash-functions Part 3: Dedicated hash-functions
|
ISO/TS 12813:2009
|
Electronic fee collection Compliance check communication for autonomous systems
|
ISO/IEC 27000:2016
|
Information technology Security techniques Information security management systems Overview and vocabulary
|
ISO/IEC 14888-2:2008
|
Information technology Security techniques Digital signatures with appendix Part 2: Integer factorization based mechanisms
|
ISO/IEC 11770-1:2010
|
Information technology Security techniques Key management Part 1: Framework
|
CEN ISO/TS 12813:2009
|
Electronic fee collection - Compliance check communication for autonomous systems (ISO/TS 12813:2009)
|
ISO/IEC 11770-3:2015
|
Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques
|