ISO ISO/IEC 15946-1 CORR 2 Information technology - Security techniques - Cryptographic techniques based on elliptic curves - Part 1: General TECHNICAL CORRIGENDUM 2 - Second Edition
Список продуктов
Данный раздел/документ содержится в продуктах:
Данный раздел/документ содержится в продуктах:
- Техэксперт: Машиностроительный комплекс
- Картотека зарубежных и международных стандартов
- CEN ISO/TR 9241-100 Ergonomics of human-system interaction - Part 100: Introduction to standards related to software ergonomics
- ISO ISO/IEC 15504-2 CORR 1 Software engineering - Process assessment - Part 2: Performing an assessment TECHNICAL CORRIGENDUM 1 - First Edition
- ISO ISO/IEC 29190 Information technology - Security techniques - Privacy capability assessment model - First Edition
- ISO ISO/IEC 29115 Information technology - Security techniques - Entity authentication assurance framework - First Edition
- DIN CEN/TS 419241 Security Requirements for Trustworthy Systems supporting Server Signing
- DIN EN 419251-1 Security requirements for device for authentication - Part 1: Protection profile for core functionality
- DIN CEN/TS 419241 Security Requirements for Trustworthy Systems supporting Server Signing
- ISO ISO/IEC 29115 Information technology - Security techniques - Entity authentication assurance framework - First Edition
- ISO ISO/IEC 29190 Information technology - Security techniques - Privacy capability assessment model - First Edition
- ISO ISO/IEC 15504-2 CORR 1 Software engineering - Process assessment - Part 2: Performing an assessment TECHNICAL CORRIGENDUM 1 - First Edition
- 13
- CEN ISO/TR 9241-100 Ergonomics of human-system interaction - Part 100: Introduction to standards related to software ergonomics
- ISO ISO/IEC 15504-2 CORR 1 Software engineering - Process assessment - Part 2: Performing an assessment TECHNICAL CORRIGENDUM 1 - First Edition
- ISO ISO/IEC 29190 Information technology - Security techniques - Privacy capability assessment model - First Edition
- ISO ISO/IEC 29115 Information technology - Security techniques - Entity authentication assurance framework - First Edition
- DIN CEN/TS 419241 Security Requirements for Trustworthy Systems supporting Server Signing
- DIN EN 419251-1 Security requirements for device for authentication - Part 1: Protection profile for core functionality
- DIN CEN/TS 419241 Security Requirements for Trustworthy Systems supporting Server Signing
- ISO ISO/IEC 29115 Information technology - Security techniques - Entity authentication assurance framework - First Edition
- ISO ISO/IEC 29190 Information technology - Security techniques - Privacy capability assessment model - First Edition
- ISO ISO/IEC 15504-2 CORR 1 Software engineering - Process assessment - Part 2: Performing an assessment TECHNICAL CORRIGENDUM 1 - First Edition
- 13.180
- CEN ISO/TR 9241-100 Ergonomics of human-system interaction - Part 100: Introduction to standards related to software ergonomics
- ISO ISO/IEC 15504-2 CORR 1 Software engineering - Process assessment - Part 2: Performing an assessment TECHNICAL CORRIGENDUM 1 - First Edition
- ISO ISO/IEC 29190 Information technology - Security techniques - Privacy capability assessment model - First Edition
- ISO ISO/IEC 29115 Information technology - Security techniques - Entity authentication assurance framework - First Edition
- DIN CEN/TS 419241 Security Requirements for Trustworthy Systems supporting Server Signing
- DIN EN 419251-1 Security requirements for device for authentication - Part 1: Protection profile for core functionality
- DIN CEN/TS 419241 Security Requirements for Trustworthy Systems supporting Server Signing
- ISO ISO/IEC 29115 Information technology - Security techniques - Entity authentication assurance framework - First Edition
- ISO ISO/IEC 29190 Information technology - Security techniques - Privacy capability assessment model - First Edition
- ISO ISO/IEC 15504-2 CORR 1 Software engineering - Process assessment - Part 2: Performing an assessment TECHNICAL CORRIGENDUM 1 - First Edition
- CEN ISO/TR 9241-100 Ergonomics of human-system interaction - Part 100: Introduction to standards related to software ergonomics
- CEN ISO/TR 9241-100 Ergonomics of human-system interaction - Part 100: Introduction to standards related to software ergonomics
- 35
- CEN ISO/TR 9241-100 Ergonomics of human-system interaction - Part 100: Introduction to standards related to software ergonomics
- ISO ISO/IEC 15504-2 CORR 1 Software engineering - Process assessment - Part 2: Performing an assessment TECHNICAL CORRIGENDUM 1 - First Edition
- ISO ISO/IEC 29190 Information technology - Security techniques - Privacy capability assessment model - First Edition
- ISO ISO/IEC 29115 Information technology - Security techniques - Entity authentication assurance framework - First Edition
- DIN CEN/TS 419241 Security Requirements for Trustworthy Systems supporting Server Signing
- DIN EN 419251-1 Security requirements for device for authentication - Part 1: Protection profile for core functionality
- DIN CEN/TS 419241 Security Requirements for Trustworthy Systems supporting Server Signing
- ISO ISO/IEC 29115 Information technology - Security techniques - Entity authentication assurance framework - First Edition
- ISO ISO/IEC 29190 Information technology - Security techniques - Privacy capability assessment model - First Edition
- ISO ISO/IEC 15504-2 CORR 1 Software engineering - Process assessment - Part 2: Performing an assessment TECHNICAL CORRIGENDUM 1 - First Edition
- CEN ISO/TR 9241-100 Ergonomics of human-system interaction - Part 100: Introduction to standards related to software ergonomics
- ISO ISO/IEC 15504-2 CORR 1 Software engineering - Process assessment - Part 2: Performing an assessment TECHNICAL CORRIGENDUM 1 - First Edition
- ISO ISO/IEC 29190 Information technology - Security techniques - Privacy capability assessment model - First Edition
- ISO ISO/IEC 29115 Information technology - Security techniques - Entity authentication assurance framework - First Edition
- DIN CEN/TS 419241 Security Requirements for Trustworthy Systems supporting Server Signing
- DIN EN 419251-1 Security requirements for device for authentication - Part 1: Protection profile for core functionality
- DIN CEN/TS 419241 Security Requirements for Trustworthy Systems supporting Server Signing
- ISO ISO/IEC 29115 Information technology - Security techniques - Entity authentication assurance framework - First Edition
- ISO ISO/IEC 29190 Information technology - Security techniques - Privacy capability assessment model - First Edition
- ISO ISO/IEC 29190 Information technology - Security techniques - Privacy capability assessment model - First Edition
- ISO ISO/IEC 29115 Information technology - Security techniques - Entity authentication assurance framework - First Edition
- DIN CEN/TS 419241 Security Requirements for Trustworthy Systems supporting Server Signing
- DIN EN 419251-1 Security requirements for device for authentication - Part 1: Protection profile for core functionality
- DIN CEN/TS 419241 Security Requirements for Trustworthy Systems supporting Server Signing
- ISO ISO/IEC 29115 Information technology - Security techniques - Entity authentication assurance framework - First Edition
- ISO ISO/IEC 29115 Information technology - Security techniques - Entity authentication assurance framework - First Edition
- DIN CEN/TS 419241 Security Requirements for Trustworthy Systems supporting Server Signing
- DIN EN 419251-1 Security requirements for device for authentication - Part 1: Protection profile for core functionality
- DIN CEN/TS 419241 Security Requirements for Trustworthy Systems supporting Server Signing
- DIN CEN/TS 419241 Security Requirements for Trustworthy Systems supporting Server Signing
- DIN EN 419251-1 Security requirements for device for authentication - Part 1: Protection profile for core functionality
- DIN EN 419251-1 Security requirements for device for authentication - Part 1: Protection profile for core functionality
- ISO ISO/IEC 10181-2 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Authentication Framework - First Edition
- CSA CAN/CSA-ISO/IEC 9798-1:12 Information Technology - Security Techniques - Entity Authentication Mechanisms - Part 1: General
- ISO ISO/IEC 14888-1 Information technology - Security techniques - Digital signatures with appendix - Part 1: General - Second Edition
- CSA CAN/CSA-ISO/IEC 13888-1-10 Information technology - Security techniques - Non-repudiation - Part 1: General
- CEN ISO/TR 9241-100 Ergonomics of human-system interaction - Part 100: Introduction to standards related to software ergonomics
- Картотека зарубежных и международных стандартов
На него ссылаются
- В списке элементов: 10
- ISO ISO/IEC 11770-3 CORR 1 Information technology - Security techniques - Key management - Part 3: Mechanisms using asymmetric techniques TECHNICAL CORRIGENDUM 1 - Third EditionИнформационные технологии - методы безопасности - управление ключами - Часть 3: Механизмы с помощью асимметричных методов TECHNICAL CORRIGENDUM 1 - Третий Выпуск
Карточка документа - ISO ISO/IEC 11889-4 Information technology - Trusted Platform Module Library - Part 4: Supporting Routines - Second EditionИнформационные технологии - Доверяли Библиотеке Модуля Платформы - Часть 4: Поддержка Установленного порядка - Второй Выпуск
Карточка документа - ISO ISO/IEC 11889-2 Information technology - Trusted Platform Module Library - Part 2: Structures - Second EditionИнформационные технологии - Доверяли Библиотеке Модуля Платформы - Часть 2: Структуры - Второй Выпуск
Карточка документа - ISO ISO/IEC 11889-1 Information technology - Trusted Platform Module Library - Part 1: Architecture - Second EditionИнформационные технологии - Библиотека Модуля Надежной платформы - Часть 1: Архитектура - Второй Выпуск
Карточка документа - ISO ISO/IEC 29167-17 Information technology - Automatic identification and data capture techniques - Part 17: Crypto suite cryptoGPS security services for air interface communications - First EditionИнформационные технологии - Автоматическая идентификация и методы сбора данных - Часть 17: комплект Crypto cryptoGPS службы безопасности для коммуникаций радиоинтерфейса - Первый Выпуск
Карточка документа - JSA JIS X 19790 Information technology - Security techniques - Security requirements for cryptographic modulesИнформационные технологии - методы Безопасности - Требования к защите для криптографических модулей
Карточка документа - BSI BS ISO/IEC 29192-4 + A1 Information technology - Security techniques - Lightweight cryptography Part 4: Mechanisms using asymmetric techniques - AMD: February 29, 2016Информационные технологии - методы безопасности - Легкая Часть 4 криптографии: Механизмы с помощью асимметричных методов - AMD: 29 февраля 2016
Карточка документа - BSI BS ISO/IEC 29150 Information technology - Security techniques - Signcryption - CORR: April 30, 2014Информационные технологии - методы Безопасности - Signcryption - ПОПРАВКА: 30 апреля 2014
Карточка документа - BSI BS ISO/IEC 15946-5 Information technology - Security techniques - Crytographic technique based on elliptic curves Part 5: Elliptic curve generation - CORR: April 30, 2013Информационные технологии - методы Безопасности - метод Crytographic, основанный на эллиптической Части 5 кривых: Эллиптическая генерация кривой - ПОПРАВКА: 30 апреля 2013
Карточка документа - BSI BS ISO/IEC 9798-5 Information technology - Security techniques - Entity authentication Part 5: Mechanisms using zero knowledge techniquesИнформационные технологии - методы Безопасности - Часть 5 Аутентификации объекта: Механизмы с помощью нулевых методов знаний
Карточка документа



