ISO ISO/IEC 9798-5 Information technology - Security techniques - Entity authentication - Part 5: Mechanisms using zero-knowledge techniques - Third Edition
Список продуктов
Данный раздел/документ содержится в продуктах:
Данный раздел/документ содержится в продуктах:
- Техэксперт: Машиностроительный комплекс
- Картотека зарубежных и международных стандартов
- ISO ISO/IEC 24727-4 Identification cards - Integrated circuit card programming interfaces - Part 4: Application programming interface (API) administration - First Edition
- ISO ISO/IEC 10118-1 Information Technology - Security Techniques - Hash-Functions - Part 1: General - Second Edition
- BSI BS ISO/IEC 13888-1 Information technology - Security techniques - Non-repudiation Part 1: General
- BSI BS ISO/IEC 17799 Information technology. Safety Engineering. Code of Good Practice for the management of the security of the information - To Purchase Call 1-800-854-7179 USA/Canada or 303-397-7956 Worldwide
- BSI PD ISO/TR 21548 Health informatics - Security requirements for archiving of electronic health records - Guidelines
- BSI BS EN ISO 27799 Health informatics - Information security management in health using ISO/IEC 27002
- BSI PD ISO/TR 21548 Health informatics - Security requirements for archiving of electronic health records - Guidelines
- BSI BS ISO/IEC 17799 Information technology. Safety Engineering. Code of Good Practice for the management of the security of the information - To Purchase Call 1-800-854-7179 USA/Canada or 303-397-7956 Worldwide
- BSI BS ISO/IEC 13888-1 Information technology - Security techniques - Non-repudiation Part 1: General
- ISO ISO/IEC 10118-1 Information Technology - Security Techniques - Hash-Functions - Part 1: General - Second Edition
- 35
- ISO ISO/IEC 24727-4 Identification cards - Integrated circuit card programming interfaces - Part 4: Application programming interface (API) administration - First Edition
- ISO ISO/IEC 10118-1 Information Technology - Security Techniques - Hash-Functions - Part 1: General - Second Edition
- BSI BS ISO/IEC 13888-1 Information technology - Security techniques - Non-repudiation Part 1: General
- BSI BS ISO/IEC 17799 Information technology. Safety Engineering. Code of Good Practice for the management of the security of the information - To Purchase Call 1-800-854-7179 USA/Canada or 303-397-7956 Worldwide
- BSI PD ISO/TR 21548 Health informatics - Security requirements for archiving of electronic health records - Guidelines
- BSI BS EN ISO 27799 Health informatics - Information security management in health using ISO/IEC 27002
- BSI PD ISO/TR 21548 Health informatics - Security requirements for archiving of electronic health records - Guidelines
- BSI BS ISO/IEC 17799 Information technology. Safety Engineering. Code of Good Practice for the management of the security of the information - To Purchase Call 1-800-854-7179 USA/Canada or 303-397-7956 Worldwide
- BSI BS ISO/IEC 13888-1 Information technology - Security techniques - Non-repudiation Part 1: General
- ISO ISO/IEC 10118-1 Information Technology - Security Techniques - Hash-Functions - Part 1: General - Second Edition
- 35.240
- ISO ISO/IEC 24727-4 Identification cards - Integrated circuit card programming interfaces - Part 4: Application programming interface (API) administration - First Edition
- ISO ISO/IEC 10118-1 Information Technology - Security Techniques - Hash-Functions - Part 1: General - Second Edition
- BSI BS ISO/IEC 13888-1 Information technology - Security techniques - Non-repudiation Part 1: General
- BSI BS ISO/IEC 17799 Information technology. Safety Engineering. Code of Good Practice for the management of the security of the information - To Purchase Call 1-800-854-7179 USA/Canada or 303-397-7956 Worldwide
- BSI PD ISO/TR 21548 Health informatics - Security requirements for archiving of electronic health records - Guidelines
- BSI BS EN ISO 27799 Health informatics - Information security management in health using ISO/IEC 27002
- BSI PD ISO/TR 21548 Health informatics - Security requirements for archiving of electronic health records - Guidelines
- BSI BS ISO/IEC 17799 Information technology. Safety Engineering. Code of Good Practice for the management of the security of the information - To Purchase Call 1-800-854-7179 USA/Canada or 303-397-7956 Worldwide
- BSI BS ISO/IEC 13888-1 Information technology - Security techniques - Non-repudiation Part 1: General
- ISO ISO/IEC 10118-1 Information Technology - Security Techniques - Hash-Functions - Part 1: General - Second Edition
- 35.240.15
- ISO ISO/IEC 24727-4 Identification cards - Integrated circuit card programming interfaces - Part 4: Application programming interface (API) administration - First Edition
- ISO ISO/IEC 10118-1 Information Technology - Security Techniques - Hash-Functions - Part 1: General - Second Edition
- BSI BS ISO/IEC 13888-1 Information technology - Security techniques - Non-repudiation Part 1: General
- BSI BS ISO/IEC 17799 Information technology. Safety Engineering. Code of Good Practice for the management of the security of the information - To Purchase Call 1-800-854-7179 USA/Canada or 303-397-7956 Worldwide
- BSI PD ISO/TR 21548 Health informatics - Security requirements for archiving of electronic health records - Guidelines
- BSI BS EN ISO 27799 Health informatics - Information security management in health using ISO/IEC 27002
- BSI PD ISO/TR 21548 Health informatics - Security requirements for archiving of electronic health records - Guidelines
- BSI BS ISO/IEC 17799 Information technology. Safety Engineering. Code of Good Practice for the management of the security of the information - To Purchase Call 1-800-854-7179 USA/Canada or 303-397-7956 Worldwide
- BSI BS ISO/IEC 13888-1 Information technology - Security techniques - Non-repudiation Part 1: General
- ISO ISO/IEC 10118-1 Information Technology - Security Techniques - Hash-Functions - Part 1: General - Second Edition
- ISO ISO/IEC 24727-4 Identification cards - Integrated circuit card programming interfaces - Part 4: Application programming interface (API) administration - First Edition
- ISO ISO/IEC 24727-4 Identification cards - Integrated circuit card programming interfaces - Part 4: Application programming interface (API) administration - First Edition
- ISO ISO/IEC 24727-4 Identification cards - Integrated circuit card programming interfaces - Part 4: Application programming interface (API) administration - First Edition
- ISO ISO/IEC 10118-1 Information Technology - Security Techniques - Hash-Functions - Part 1: General - Second Edition
- BSI BS ISO/IEC 13888-1 Information technology - Security techniques - Non-repudiation Part 1: General
- BSI BS ISO/IEC 17799 Information technology. Safety Engineering. Code of Good Practice for the management of the security of the information - To Purchase Call 1-800-854-7179 USA/Canada or 303-397-7956 Worldwide
- BSI PD ISO/TR 21548 Health informatics - Security requirements for archiving of electronic health records - Guidelines
- BSI BS EN ISO 27799 Health informatics - Information security management in health using ISO/IEC 27002
- BSI PD ISO/TR 21548 Health informatics - Security requirements for archiving of electronic health records - Guidelines
- BSI BS ISO/IEC 17799 Information technology. Safety Engineering. Code of Good Practice for the management of the security of the information - To Purchase Call 1-800-854-7179 USA/Canada or 303-397-7956 Worldwide
- BSI BS ISO/IEC 13888-1 Information technology - Security techniques - Non-repudiation Part 1: General
- BSI BS ISO/IEC 13888-1 Information technology - Security techniques - Non-repudiation Part 1: General
- BSI BS ISO/IEC 17799 Information technology. Safety Engineering. Code of Good Practice for the management of the security of the information - To Purchase Call 1-800-854-7179 USA/Canada or 303-397-7956 Worldwide
- BSI PD ISO/TR 21548 Health informatics - Security requirements for archiving of electronic health records - Guidelines
- BSI BS EN ISO 27799 Health informatics - Information security management in health using ISO/IEC 27002
- BSI PD ISO/TR 21548 Health informatics - Security requirements for archiving of electronic health records - Guidelines
- BSI BS ISO/IEC 17799 Information technology. Safety Engineering. Code of Good Practice for the management of the security of the information - To Purchase Call 1-800-854-7179 USA/Canada or 303-397-7956 Worldwide
- BSI BS ISO/IEC 17799 Information technology. Safety Engineering. Code of Good Practice for the management of the security of the information - To Purchase Call 1-800-854-7179 USA/Canada or 303-397-7956 Worldwide
- BSI PD ISO/TR 21548 Health informatics - Security requirements for archiving of electronic health records - Guidelines
- BSI BS EN ISO 27799 Health informatics - Information security management in health using ISO/IEC 27002
- BSI PD ISO/TR 21548 Health informatics - Security requirements for archiving of electronic health records - Guidelines
- BSI PD ISO/TR 21548 Health informatics - Security requirements for archiving of electronic health records - Guidelines
- BSI BS EN ISO 27799 Health informatics - Information security management in health using ISO/IEC 27002
- BSI BS EN ISO 27799 Health informatics - Information security management in health using ISO/IEC 27002
- ISO 17090-3 Health informatics — Public key infrastructure — Part 3: Policy management of certification authority - First Edition
- BSI BS ISO/IEC 10181-1 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Overview
- BSI BS ISO/IEC 15945 Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures
- BSI BS ISO/IEC 14888-2 Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
- ISO ISO/IEC 24727-4 Identification cards - Integrated circuit card programming interfaces - Part 4: Application programming interface (API) administration - First Edition
- Картотека зарубежных и международных стандартов
На него ссылаются
- В списке элементов: 19
- ISO ISO/IEC 14888-2 CORR 1 Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms TECHNICAL CORRIGENDUM 1 - Second EditionИнформационные технологии - методы Безопасности - Цифровые подписи с приложением - Часть 2: Целочисленная факторизация базировала механизмы ТЕХНИЧЕСКОЕ ИСПРАВЛЕНИЕ 1 - Второй Выпуск
Карточка документа - ISO ISO/IEC 29167-17 Information technology - Automatic identification and data capture techniques - Part 17: Crypto suite cryptoGPS security services for air interface communications - First EditionИнформационные технологии - Автоматическая идентификация и методы сбора данных - Часть 17: комплект Crypto cryptoGPS службы безопасности для коммуникаций радиоинтерфейса - Первый Выпуск
Карточка документа - ISO ISO/IEC 24727-3 AMD 1 Identification cards - Integrated circuit card programming interfaces - Part 3: Application interface AMENDMENT 1 - First EditionУдостоверения личности - интерфейсы программирования карты Интегральной схемы - Часть 3: ПОПРАВКА 1 Интерфейса приложения - Первый Выпуск
Карточка документа - ISO ISO/IEC 24727-4 AMD 1 Identification cards - Integrated circuit card programming interfaces - Part 4: Application programming interface (API) administration AMENDMENT 1 - First EditionУдостоверения личности - интерфейсы программирования карты Интегральной схемы - Часть 4: ПОПРАВКА 1 администрирования Прикладного программного интерфейса (API) - Первый Выпуск
Карточка документа - ISO ISO/IEC 20009-1 Information technology - Security techniques - Anonymous entity authentication - Part 1: General - First EditionИнформационные технологии - методы Безопасности - Анонимная аутентификация объекта - Часть 1: Общий - Первый Выпуск
Карточка документа - BSI BS ISO/IEC 29192-4 Information technology — Security techniques — Lightweight cryptography Part 4: Mechanisms using asymmetric techniquesИнформационные технологии — методы безопасности — Легкая Часть 4 криптографии: Механизмы с помощью асимметричных методов
Карточка документа - ISO ISO/IEC 29192-4 Information technology - Security techniques - Lightweight cryptography Part 4: Mechanisms using asymmetric techniques - First EditionИнформационные технологии - методы Безопасности - Легкая Часть 4 криптографии: Механизмы с помощью асимметричных методов - Первый Выпуск
Карточка документа - ISO ISO/IEC 9798-2 CORR 3 Information technology - Security techniques - Entity authentication - Part 2: Mechanisms using symmetric encipherment algorithms TECHNICAL CORRIGENDUM 3 - Third EditionИнформационные технологии - методы Безопасности - Аутентификация объекта - Часть 2: Механизмы с помощью симметричных алгоритмов шифровки ТЕХНИЧЕСКОЕ ИСПРАВЛЕНИЕ 3 - Третий Выпуск
Карточка документа - ISO ISO/IEC 29192-1 Information technology - Security techniques - Lightweight cryptography - Part 1: General - First EditionИнформационные технологии - методы Безопасности - Легкая криптография - Часть 1: Общий - Первый Выпуск
Карточка документа - CSA CAN/CSA-ISO/IEC 18014-2-10 Information technology - Security techniques - Time-stamping services - Part 2: Mechanisms producing independent tokensИнформационные технологии - методы Безопасности - Устанавливающие метку времени услуги - Часть 2: Механизмы, производящие независимые маркеры
Карточка документа - CSA CAN/CSA-ISO/IEC 9798-2-10 Information technology - Security techniques - Entity authentication - Part 2: Mechanisms using symmetric encipherment algorithms - Technical Corrigendum 1: January 2013; Corrigendum 2: January 2013Информационные технологии - методы Безопасности - Аутентификация объекта - Часть 2: Механизмы с помощью симметричных алгоритмов шифровки - Техническое Исправление 1: январь 2013; Исправление 2: январь 2013
Карточка документа - ISO ISO/IEC 18014-2 Information technology - Security techniques - Time-stamping services - Part 2: Mechanisms producing independent tokens - Second EditionИнформационные технологии - методы Безопасности - Устанавливающие метку времени услуги - Часть 2: Механизмы, производящие независимые маркеры - Второй Выпуск
Карточка документа - CSA CAN/CSA-ISO/IEC 14888-2-09 Information technology — Security techniques — Digital signatures with appendix — Part 2: Integer factorization based mechanismsИнформационные технологии — методы безопасности — Цифровые подписи с приложением — Часть 2: Целочисленная факторизация основывала механизмы
Карточка документа - CSA CAN/CSA-ISO/IEC 7816-4-06 AMD 1 Identification cards - Integrated circuit cards - Part 4: Organization, security and commands for interchange - AMENDMENT 1: Record activation and deactivationУдостоверения личности - карты Интегральной схемы - Часть 4: Организация, безопасность и команды для обмена - ПОПРАВКА 1: Рекордная активация и деактивация
Карточка документа - BSI BS ISO/IEC 9798-2 Information technology - Security techniques - Entity authentication - Part 2: Mechanisms using symmetric encipherment algorithms - CORR: April 30, 2010; CORR: April 30, 2012; CORR: March 31, 2013Информационные технологии - методы Безопасности - Аутентификация объекта - Часть 2: Механизмы с помощью симметричных алгоритмов шифровки - ПОПРАВКА: 30 апреля 2010; ПОПРАВКА: 30 апреля 2012; ПОПРАВКА: 31 марта 2013
Карточка документа - CSA CAN/CSA-ISO/IEC 11770-2-09 Information technology - Security techniques - Key management - Part 2: Mechanisms using symmetric techniques - Incorporates Corrigendum 1: December 2010Информационные технологии - методы Безопасности - управление ключами - Часть 2: Механизмы с помощью симметричных методов - Включают Исправление 1: декабрь 2010
Карточка документа - BSI BS ISO/IEC 24727-3 + A1 Identification cards - Integrated circuit card programming interfaces - Part 3: Application interface - CORR: June 30, 2011; AMD: September 30, 2014Удостоверения личности - интерфейсы программирования карты Интегральной схемы - Часть 3: Интерфейс приложения - ПОПРАВКА: 30 июня 2011; AMD: 30 сентября 2014
Карточка документа - ISO ISO/IEC 24727-2 AMD 1 Identification cards - Integrated circuit card programming interfaces - Part 2: Generic card interface Amendment 1 - First EditionУдостоверения личности - интерфейсы программирования карты Интегральной схемы - Часть 2: Универсальная Поправка 1 интерфейса карты - Первый Выпуск
Карточка документа - BSI BS ISO/IEC 14888-2 Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanismsИнформационные технологии - методы безопасности - Цифровые подписи с приложением - Часть 2: Целочисленная факторизация основывала механизмы
Карточка документа



