ISO ISO/IEC 29182-2 Information technology - Sensor networks: Sensor Network Reference Architecture (SNRA) - Part 2: Vocabulary and terminology - First Edition
Список продуктов
Данный раздел/документ содержится в продуктах:
Данный раздел/документ содержится в продуктах:
- Техэксперт: Машиностроительный комплекс
- Картотека зарубежных и международных стандартов
- ISO ISO/IEC 24727-4 Identification cards - Integrated circuit card programming interfaces - Part 4: Application programming interface (API) administration - First Edition
- ISO ISO/IEC 10118-1 Information Technology - Security Techniques - Hash-Functions - Part 1: General - Second Edition
- BSI BS ISO/IEC 13888-1 Information technology - Security techniques - Non-repudiation Part 1: General
- BSI BS ISO/IEC 17799 Information technology. Safety Engineering. Code of Good Practice for the management of the security of the information - To Purchase Call 1-800-854-7179 USA/Canada or 303-397-7956 Worldwide
- BSI PD ISO/TR 21548 Health informatics - Security requirements for archiving of electronic health records - Guidelines
- BSI BS EN ISO 27799 Health informatics - Information security management in health using ISO/IEC 27002
- ISO 17090-3 Health informatics — Public key infrastructure — Part 3: Policy management of certification authority - First Edition
- BSI BS ISO/IEC 10181-1 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Overview
- BSI BS ISO/IEC 15945 Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures
- BSI BS ISO/IEC 14888-2 Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
- ISO ISO/IEC 9798-5 Information technology - Security techniques - Entity authentication - Part 5: Mechanisms using zero-knowledge techniques - Third Edition
- BSI BS ISO/IEC 29192-4 Information technology — Security techniques — Lightweight cryptography Part 4: Mechanisms using asymmetric techniques
- ISO ISO/IEC 29192-2 Information technology - Security techniques - Lightweight cryptography Part 2: Block ciphers - First Edition
- ISO ISO/IEC 29182-4 Information technology - Sensor networks: Sensor Network Reference Architecture (SNRA) Part 4: Entity models - First Edition
- BSI BS ISO/IEC 29182-7 Information technology - Sensor networks: Sensor Network Reference Architecture (SNRA) Part 7: Interoperability guidelines
- ISO ISO/IEC 29182-4 Information technology - Sensor networks: Sensor Network Reference Architecture (SNRA) Part 4: Entity models - First Edition
- ISO ISO/IEC 29192-2 Information technology - Security techniques - Lightweight cryptography Part 2: Block ciphers - First Edition
- BSI BS ISO/IEC 29192-4 Information technology — Security techniques — Lightweight cryptography Part 4: Mechanisms using asymmetric techniques
- ISO ISO/IEC 9798-5 Information technology - Security techniques - Entity authentication - Part 5: Mechanisms using zero-knowledge techniques - Third Edition
- BSI BS ISO/IEC 14888-2 Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
- BSI BS ISO/IEC 15945 Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures
- BSI BS ISO/IEC 10181-1 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Overview
- ISO 17090-3 Health informatics — Public key infrastructure — Part 3: Policy management of certification authority - First Edition
- BSI BS EN ISO 27799 Health informatics - Information security management in health using ISO/IEC 27002
- BSI PD ISO/TR 21548 Health informatics - Security requirements for archiving of electronic health records - Guidelines
- BSI BS ISO/IEC 17799 Information technology. Safety Engineering. Code of Good Practice for the management of the security of the information - To Purchase Call 1-800-854-7179 USA/Canada or 303-397-7956 Worldwide
- BSI BS ISO/IEC 13888-1 Information technology - Security techniques - Non-repudiation Part 1: General
- ISO ISO/IEC 10118-1 Information Technology - Security Techniques - Hash-Functions - Part 1: General - Second Edition
- ISO ISO/IEC 10118-1 Information Technology - Security Techniques - Hash-Functions - Part 1: General - Second Edition
- BSI BS ISO/IEC 13888-1 Information technology - Security techniques - Non-repudiation Part 1: General
- BSI BS ISO/IEC 17799 Information technology. Safety Engineering. Code of Good Practice for the management of the security of the information - To Purchase Call 1-800-854-7179 USA/Canada or 303-397-7956 Worldwide
- BSI PD ISO/TR 21548 Health informatics - Security requirements for archiving of electronic health records - Guidelines
- BSI BS EN ISO 27799 Health informatics - Information security management in health using ISO/IEC 27002
- ISO 17090-3 Health informatics — Public key infrastructure — Part 3: Policy management of certification authority - First Edition
- BSI BS ISO/IEC 10181-1 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Overview
- BSI BS ISO/IEC 15945 Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures
- BSI BS ISO/IEC 14888-2 Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
- ISO ISO/IEC 9798-5 Information technology - Security techniques - Entity authentication - Part 5: Mechanisms using zero-knowledge techniques - Third Edition
- BSI BS ISO/IEC 29192-4 Information technology — Security techniques — Lightweight cryptography Part 4: Mechanisms using asymmetric techniques
- ISO ISO/IEC 29192-2 Information technology - Security techniques - Lightweight cryptography Part 2: Block ciphers - First Edition
- ISO ISO/IEC 29182-4 Information technology - Sensor networks: Sensor Network Reference Architecture (SNRA) Part 4: Entity models - First Edition
- BSI BS ISO/IEC 29182-7 Information technology - Sensor networks: Sensor Network Reference Architecture (SNRA) Part 7: Interoperability guidelines
- ISO ISO/IEC 29182-4 Information technology - Sensor networks: Sensor Network Reference Architecture (SNRA) Part 4: Entity models - First Edition
- ISO ISO/IEC 29192-2 Information technology - Security techniques - Lightweight cryptography Part 2: Block ciphers - First Edition
- BSI BS ISO/IEC 29192-4 Information technology — Security techniques — Lightweight cryptography Part 4: Mechanisms using asymmetric techniques
- ISO ISO/IEC 9798-5 Information technology - Security techniques - Entity authentication - Part 5: Mechanisms using zero-knowledge techniques - Third Edition
- BSI BS ISO/IEC 14888-2 Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
- BSI BS ISO/IEC 15945 Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures
- BSI BS ISO/IEC 10181-1 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Overview
- ISO 17090-3 Health informatics — Public key infrastructure — Part 3: Policy management of certification authority - First Edition
- BSI BS EN ISO 27799 Health informatics - Information security management in health using ISO/IEC 27002
- BSI PD ISO/TR 21548 Health informatics - Security requirements for archiving of electronic health records - Guidelines
- BSI BS ISO/IEC 17799 Information technology. Safety Engineering. Code of Good Practice for the management of the security of the information - To Purchase Call 1-800-854-7179 USA/Canada or 303-397-7956 Worldwide
- BSI BS ISO/IEC 13888-1 Information technology - Security techniques - Non-repudiation Part 1: General
- BSI BS ISO/IEC 13888-1 Information technology - Security techniques - Non-repudiation Part 1: General
- BSI BS ISO/IEC 17799 Information technology. Safety Engineering. Code of Good Practice for the management of the security of the information - To Purchase Call 1-800-854-7179 USA/Canada or 303-397-7956 Worldwide
- BSI PD ISO/TR 21548 Health informatics - Security requirements for archiving of electronic health records - Guidelines
- BSI BS EN ISO 27799 Health informatics - Information security management in health using ISO/IEC 27002
- ISO 17090-3 Health informatics — Public key infrastructure — Part 3: Policy management of certification authority - First Edition
- BSI BS ISO/IEC 10181-1 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Overview
- BSI BS ISO/IEC 15945 Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures
- BSI BS ISO/IEC 14888-2 Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
- ISO ISO/IEC 9798-5 Information technology - Security techniques - Entity authentication - Part 5: Mechanisms using zero-knowledge techniques - Third Edition
- BSI BS ISO/IEC 29192-4 Information technology — Security techniques — Lightweight cryptography Part 4: Mechanisms using asymmetric techniques
- ISO ISO/IEC 29192-2 Information technology - Security techniques - Lightweight cryptography Part 2: Block ciphers - First Edition
- ISO ISO/IEC 29182-4 Information technology - Sensor networks: Sensor Network Reference Architecture (SNRA) Part 4: Entity models - First Edition
- BSI BS ISO/IEC 29182-7 Information technology - Sensor networks: Sensor Network Reference Architecture (SNRA) Part 7: Interoperability guidelines
- ISO ISO/IEC 29182-4 Information technology - Sensor networks: Sensor Network Reference Architecture (SNRA) Part 4: Entity models - First Edition
- ISO ISO/IEC 29192-2 Information technology - Security techniques - Lightweight cryptography Part 2: Block ciphers - First Edition
- BSI BS ISO/IEC 29192-4 Information technology — Security techniques — Lightweight cryptography Part 4: Mechanisms using asymmetric techniques
- ISO ISO/IEC 9798-5 Information technology - Security techniques - Entity authentication - Part 5: Mechanisms using zero-knowledge techniques - Third Edition
- BSI BS ISO/IEC 14888-2 Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
- BSI BS ISO/IEC 15945 Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures
- BSI BS ISO/IEC 10181-1 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Overview
- ISO 17090-3 Health informatics — Public key infrastructure — Part 3: Policy management of certification authority - First Edition
- BSI BS EN ISO 27799 Health informatics - Information security management in health using ISO/IEC 27002
- BSI PD ISO/TR 21548 Health informatics - Security requirements for archiving of electronic health records - Guidelines
- BSI BS ISO/IEC 17799 Information technology. Safety Engineering. Code of Good Practice for the management of the security of the information - To Purchase Call 1-800-854-7179 USA/Canada or 303-397-7956 Worldwide
- BSI BS ISO/IEC 17799 Information technology. Safety Engineering. Code of Good Practice for the management of the security of the information - To Purchase Call 1-800-854-7179 USA/Canada or 303-397-7956 Worldwide
- BSI PD ISO/TR 21548 Health informatics - Security requirements for archiving of electronic health records - Guidelines
- BSI BS EN ISO 27799 Health informatics - Information security management in health using ISO/IEC 27002
- ISO 17090-3 Health informatics — Public key infrastructure — Part 3: Policy management of certification authority - First Edition
- BSI BS ISO/IEC 10181-1 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Overview
- BSI BS ISO/IEC 15945 Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures
- BSI BS ISO/IEC 14888-2 Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
- ISO ISO/IEC 9798-5 Information technology - Security techniques - Entity authentication - Part 5: Mechanisms using zero-knowledge techniques - Third Edition
- BSI BS ISO/IEC 29192-4 Information technology — Security techniques — Lightweight cryptography Part 4: Mechanisms using asymmetric techniques
- ISO ISO/IEC 29192-2 Information technology - Security techniques - Lightweight cryptography Part 2: Block ciphers - First Edition
- ISO ISO/IEC 29182-4 Information technology - Sensor networks: Sensor Network Reference Architecture (SNRA) Part 4: Entity models - First Edition
- BSI BS ISO/IEC 29182-7 Information technology - Sensor networks: Sensor Network Reference Architecture (SNRA) Part 7: Interoperability guidelines
- ISO ISO/IEC 29182-4 Information technology - Sensor networks: Sensor Network Reference Architecture (SNRA) Part 4: Entity models - First Edition
- ISO ISO/IEC 29192-2 Information technology - Security techniques - Lightweight cryptography Part 2: Block ciphers - First Edition
- BSI BS ISO/IEC 29192-4 Information technology — Security techniques — Lightweight cryptography Part 4: Mechanisms using asymmetric techniques
- ISO ISO/IEC 9798-5 Information technology - Security techniques - Entity authentication - Part 5: Mechanisms using zero-knowledge techniques - Third Edition
- BSI BS ISO/IEC 14888-2 Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
- BSI BS ISO/IEC 15945 Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures
- BSI BS ISO/IEC 10181-1 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Overview
- ISO 17090-3 Health informatics — Public key infrastructure — Part 3: Policy management of certification authority - First Edition
- BSI BS EN ISO 27799 Health informatics - Information security management in health using ISO/IEC 27002
- BSI PD ISO/TR 21548 Health informatics - Security requirements for archiving of electronic health records - Guidelines
- BSI PD ISO/TR 21548 Health informatics - Security requirements for archiving of electronic health records - Guidelines
- BSI BS EN ISO 27799 Health informatics - Information security management in health using ISO/IEC 27002
- ISO 17090-3 Health informatics — Public key infrastructure — Part 3: Policy management of certification authority - First Edition
- BSI BS ISO/IEC 10181-1 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Overview
- BSI BS ISO/IEC 15945 Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures
- BSI BS ISO/IEC 14888-2 Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
- ISO ISO/IEC 9798-5 Information technology - Security techniques - Entity authentication - Part 5: Mechanisms using zero-knowledge techniques - Third Edition
- BSI BS ISO/IEC 29192-4 Information technology — Security techniques — Lightweight cryptography Part 4: Mechanisms using asymmetric techniques
- ISO ISO/IEC 29192-2 Information technology - Security techniques - Lightweight cryptography Part 2: Block ciphers - First Edition
- ISO ISO/IEC 29182-4 Information technology - Sensor networks: Sensor Network Reference Architecture (SNRA) Part 4: Entity models - First Edition
- BSI BS ISO/IEC 29182-7 Information technology - Sensor networks: Sensor Network Reference Architecture (SNRA) Part 7: Interoperability guidelines
- ISO ISO/IEC 29182-4 Information technology - Sensor networks: Sensor Network Reference Architecture (SNRA) Part 4: Entity models - First Edition
- ISO ISO/IEC 29192-2 Information technology - Security techniques - Lightweight cryptography Part 2: Block ciphers - First Edition
- BSI BS ISO/IEC 29192-4 Information technology — Security techniques — Lightweight cryptography Part 4: Mechanisms using asymmetric techniques
- ISO ISO/IEC 9798-5 Information technology - Security techniques - Entity authentication - Part 5: Mechanisms using zero-knowledge techniques - Third Edition
- BSI BS ISO/IEC 14888-2 Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
- BSI BS ISO/IEC 15945 Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures
- BSI BS ISO/IEC 10181-1 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Overview
- ISO 17090-3 Health informatics — Public key infrastructure — Part 3: Policy management of certification authority - First Edition
- BSI BS EN ISO 27799 Health informatics - Information security management in health using ISO/IEC 27002
- BSI BS EN ISO 27799 Health informatics - Information security management in health using ISO/IEC 27002
- ISO 17090-3 Health informatics — Public key infrastructure — Part 3: Policy management of certification authority - First Edition
- BSI BS ISO/IEC 10181-1 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Overview
- BSI BS ISO/IEC 15945 Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures
- BSI BS ISO/IEC 14888-2 Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
- ISO ISO/IEC 9798-5 Information technology - Security techniques - Entity authentication - Part 5: Mechanisms using zero-knowledge techniques - Third Edition
- BSI BS ISO/IEC 29192-4 Information technology — Security techniques — Lightweight cryptography Part 4: Mechanisms using asymmetric techniques
- ISO ISO/IEC 29192-2 Information technology - Security techniques - Lightweight cryptography Part 2: Block ciphers - First Edition
- ISO ISO/IEC 29182-4 Information technology - Sensor networks: Sensor Network Reference Architecture (SNRA) Part 4: Entity models - First Edition
- BSI BS ISO/IEC 29182-7 Information technology - Sensor networks: Sensor Network Reference Architecture (SNRA) Part 7: Interoperability guidelines
- ISO ISO/IEC 29182-4 Information technology - Sensor networks: Sensor Network Reference Architecture (SNRA) Part 4: Entity models - First Edition
- ISO ISO/IEC 29192-2 Information technology - Security techniques - Lightweight cryptography Part 2: Block ciphers - First Edition
- BSI BS ISO/IEC 29192-4 Information technology — Security techniques — Lightweight cryptography Part 4: Mechanisms using asymmetric techniques
- ISO ISO/IEC 9798-5 Information technology - Security techniques - Entity authentication - Part 5: Mechanisms using zero-knowledge techniques - Third Edition
- BSI BS ISO/IEC 14888-2 Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
- BSI BS ISO/IEC 15945 Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures
- BSI BS ISO/IEC 10181-1 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Overview
- ISO 17090-3 Health informatics — Public key infrastructure — Part 3: Policy management of certification authority - First Edition
- ISO 17090-3 Health informatics — Public key infrastructure — Part 3: Policy management of certification authority - First Edition
- BSI BS ISO/IEC 10181-1 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Overview
- BSI BS ISO/IEC 15945 Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures
- BSI BS ISO/IEC 14888-2 Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
- ISO ISO/IEC 9798-5 Information technology - Security techniques - Entity authentication - Part 5: Mechanisms using zero-knowledge techniques - Third Edition
- BSI BS ISO/IEC 29192-4 Information technology — Security techniques — Lightweight cryptography Part 4: Mechanisms using asymmetric techniques
- ISO ISO/IEC 29192-2 Information technology - Security techniques - Lightweight cryptography Part 2: Block ciphers - First Edition
- ISO ISO/IEC 29182-4 Information technology - Sensor networks: Sensor Network Reference Architecture (SNRA) Part 4: Entity models - First Edition
- BSI BS ISO/IEC 29182-7 Information technology - Sensor networks: Sensor Network Reference Architecture (SNRA) Part 7: Interoperability guidelines
- ISO ISO/IEC 29182-4 Information technology - Sensor networks: Sensor Network Reference Architecture (SNRA) Part 4: Entity models - First Edition
- ISO ISO/IEC 29192-2 Information technology - Security techniques - Lightweight cryptography Part 2: Block ciphers - First Edition
- BSI BS ISO/IEC 29192-4 Information technology — Security techniques — Lightweight cryptography Part 4: Mechanisms using asymmetric techniques
- ISO ISO/IEC 9798-5 Information technology - Security techniques - Entity authentication - Part 5: Mechanisms using zero-knowledge techniques - Third Edition
- BSI BS ISO/IEC 14888-2 Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
- BSI BS ISO/IEC 15945 Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures
- BSI BS ISO/IEC 10181-1 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Overview
- BSI BS ISO/IEC 10181-1 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Overview
- BSI BS ISO/IEC 15945 Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures
- BSI BS ISO/IEC 14888-2 Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
- ISO ISO/IEC 9798-5 Information technology - Security techniques - Entity authentication - Part 5: Mechanisms using zero-knowledge techniques - Third Edition
- BSI BS ISO/IEC 29192-4 Information technology — Security techniques — Lightweight cryptography Part 4: Mechanisms using asymmetric techniques
- ISO ISO/IEC 29192-2 Information technology - Security techniques - Lightweight cryptography Part 2: Block ciphers - First Edition
- ISO ISO/IEC 29182-4 Information technology - Sensor networks: Sensor Network Reference Architecture (SNRA) Part 4: Entity models - First Edition
- BSI BS ISO/IEC 29182-7 Information technology - Sensor networks: Sensor Network Reference Architecture (SNRA) Part 7: Interoperability guidelines
- ISO ISO/IEC 29182-4 Information technology - Sensor networks: Sensor Network Reference Architecture (SNRA) Part 4: Entity models - First Edition
- ISO ISO/IEC 29192-2 Information technology - Security techniques - Lightweight cryptography Part 2: Block ciphers - First Edition
- BSI BS ISO/IEC 29192-4 Information technology — Security techniques — Lightweight cryptography Part 4: Mechanisms using asymmetric techniques
- ISO ISO/IEC 9798-5 Information technology - Security techniques - Entity authentication - Part 5: Mechanisms using zero-knowledge techniques - Third Edition
- BSI BS ISO/IEC 14888-2 Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
- BSI BS ISO/IEC 15945 Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures
- BSI BS ISO/IEC 15945 Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures
- BSI BS ISO/IEC 14888-2 Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
- ISO ISO/IEC 9798-5 Information technology - Security techniques - Entity authentication - Part 5: Mechanisms using zero-knowledge techniques - Third Edition
- BSI BS ISO/IEC 29192-4 Information technology — Security techniques — Lightweight cryptography Part 4: Mechanisms using asymmetric techniques
- ISO ISO/IEC 29192-2 Information technology - Security techniques - Lightweight cryptography Part 2: Block ciphers - First Edition
- ISO ISO/IEC 29182-4 Information technology - Sensor networks: Sensor Network Reference Architecture (SNRA) Part 4: Entity models - First Edition
- BSI BS ISO/IEC 29182-7 Information technology - Sensor networks: Sensor Network Reference Architecture (SNRA) Part 7: Interoperability guidelines
- ISO ISO/IEC 29182-4 Information technology - Sensor networks: Sensor Network Reference Architecture (SNRA) Part 4: Entity models - First Edition
- ISO ISO/IEC 29192-2 Information technology - Security techniques - Lightweight cryptography Part 2: Block ciphers - First Edition
- BSI BS ISO/IEC 29192-4 Information technology — Security techniques — Lightweight cryptography Part 4: Mechanisms using asymmetric techniques
- ISO ISO/IEC 9798-5 Information technology - Security techniques - Entity authentication - Part 5: Mechanisms using zero-knowledge techniques - Third Edition
- BSI BS ISO/IEC 14888-2 Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
- BSI BS ISO/IEC 14888-2 Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
- ISO ISO/IEC 9798-5 Information technology - Security techniques - Entity authentication - Part 5: Mechanisms using zero-knowledge techniques - Third Edition
- BSI BS ISO/IEC 29192-4 Information technology — Security techniques — Lightweight cryptography Part 4: Mechanisms using asymmetric techniques
- ISO ISO/IEC 29192-2 Information technology - Security techniques - Lightweight cryptography Part 2: Block ciphers - First Edition
- ISO ISO/IEC 29182-4 Information technology - Sensor networks: Sensor Network Reference Architecture (SNRA) Part 4: Entity models - First Edition
- BSI BS ISO/IEC 29182-7 Information technology - Sensor networks: Sensor Network Reference Architecture (SNRA) Part 7: Interoperability guidelines
- ISO ISO/IEC 29182-4 Information technology - Sensor networks: Sensor Network Reference Architecture (SNRA) Part 4: Entity models - First Edition
- ISO ISO/IEC 29192-2 Information technology - Security techniques - Lightweight cryptography Part 2: Block ciphers - First Edition
- BSI BS ISO/IEC 29192-4 Information technology — Security techniques — Lightweight cryptography Part 4: Mechanisms using asymmetric techniques
- ISO ISO/IEC 9798-5 Information technology - Security techniques - Entity authentication - Part 5: Mechanisms using zero-knowledge techniques - Third Edition
- ISO ISO/IEC 9798-5 Information technology - Security techniques - Entity authentication - Part 5: Mechanisms using zero-knowledge techniques - Third Edition
- BSI BS ISO/IEC 29192-4 Information technology — Security techniques — Lightweight cryptography Part 4: Mechanisms using asymmetric techniques
- ISO ISO/IEC 29192-2 Information technology - Security techniques - Lightweight cryptography Part 2: Block ciphers - First Edition
- ISO ISO/IEC 29182-4 Information technology - Sensor networks: Sensor Network Reference Architecture (SNRA) Part 4: Entity models - First Edition
- BSI BS ISO/IEC 29182-7 Information technology - Sensor networks: Sensor Network Reference Architecture (SNRA) Part 7: Interoperability guidelines
- ISO ISO/IEC 29182-4 Information technology - Sensor networks: Sensor Network Reference Architecture (SNRA) Part 4: Entity models - First Edition
- ISO ISO/IEC 29192-2 Information technology - Security techniques - Lightweight cryptography Part 2: Block ciphers - First Edition
- BSI BS ISO/IEC 29192-4 Information technology — Security techniques — Lightweight cryptography Part 4: Mechanisms using asymmetric techniques
- BSI BS ISO/IEC 29192-4 Information technology — Security techniques — Lightweight cryptography Part 4: Mechanisms using asymmetric techniques
- ISO ISO/IEC 29192-2 Information technology - Security techniques - Lightweight cryptography Part 2: Block ciphers - First Edition
- ISO ISO/IEC 29182-4 Information technology - Sensor networks: Sensor Network Reference Architecture (SNRA) Part 4: Entity models - First Edition
- BSI BS ISO/IEC 29182-7 Information technology - Sensor networks: Sensor Network Reference Architecture (SNRA) Part 7: Interoperability guidelines
- ISO ISO/IEC 29182-4 Information technology - Sensor networks: Sensor Network Reference Architecture (SNRA) Part 4: Entity models - First Edition
- ISO ISO/IEC 29192-2 Information technology - Security techniques - Lightweight cryptography Part 2: Block ciphers - First Edition
- ISO ISO/IEC 29192-2 Information technology - Security techniques - Lightweight cryptography Part 2: Block ciphers - First Edition
- ISO ISO/IEC 29182-4 Information technology - Sensor networks: Sensor Network Reference Architecture (SNRA) Part 4: Entity models - First Edition
- BSI BS ISO/IEC 29182-7 Information technology - Sensor networks: Sensor Network Reference Architecture (SNRA) Part 7: Interoperability guidelines
- ISO ISO/IEC 29182-4 Information technology - Sensor networks: Sensor Network Reference Architecture (SNRA) Part 4: Entity models - First Edition
- ISO ISO/IEC 29182-4 Information technology - Sensor networks: Sensor Network Reference Architecture (SNRA) Part 4: Entity models - First Edition
- BSI BS ISO/IEC 29182-7 Information technology - Sensor networks: Sensor Network Reference Architecture (SNRA) Part 7: Interoperability guidelines
- BSI BS ISO/IEC 29182-7 Information technology - Sensor networks: Sensor Network Reference Architecture (SNRA) Part 7: Interoperability guidelines
- ISO ISO/IEC 29182-3 Information technology - Sensor networks: Sensor Network Reference Architecture (SNRA) - Part 3: Reference architecture views - First Edition
- BSI BS ISO/IEC 29182-6 Information technology — Sensor networks: Sensor Network Reference Architecture (SNRA) Part 6: Applications
- ISO ISO/IEC 29182-5 Information technology - Sensor networks: Sensor Network Reference Architecture (SNRA) - Part 5: Interface definitions - First Edition
- BSI BS ISO/IEC 30128 Information technology — Sensor networks — Generic Sensor Network Application Interface
- ISO ISO/IEC 24727-4 Identification cards - Integrated circuit card programming interfaces - Part 4: Application programming interface (API) administration - First Edition
- Картотека зарубежных и международных стандартов
На него ссылаются
- В списке элементов: 13
- BSI BS ISO/IEC 29182-7 Information technology - Sensor networks: Sensor Network Reference Architecture (SNRA) Part 7: Interoperability guidelinesИнформационные технологии - Сенсорные сети: Часть 7 Sensor Network Reference Architecture (SNRA): инструкции по Функциональной совместимости
Карточка документа - BSI BS ISO/IEC 30101 Information technology — Sensor networks: Sensor network and its interfaces for smart grid systemИнформационные технологии — Сенсорные сети: Сенсорная сеть и ее интерфейсы для системы интеллектуальной сети
Карточка документа - BSI BS ISO/IEC 30128 Information technology — Sensor networks — Generic Sensor Network Application InterfaceИнформационные технологии — Сенсорные сети — Универсальный Интерфейс приложения Сенсорной сети
Карточка документа - ISO ISO/IEC 30128 Information technology - Sensor networks - Generic Sensor Network Application Interface - First EditionИнформационные технологии - Сенсорные сети - Универсальный Интерфейс приложения Сенсорной сети - Первый Выпуск
Карточка документа - ISO ISO/IEC 30101 Information technology - Sensor networks: Sensor network and its interfaces for smart grid system - First EditionИнформационные технологии - Сенсорные сети: Сенсорная сеть и ее интерфейсы для системы интеллектуальной сети - Первый Выпуск
Карточка документа - BSI BS ISO/IEC 29182-6 Information technology — Sensor networks: Sensor Network Reference Architecture (SNRA) Part 6: ApplicationsИнформационные технологии — Сенсорные сети: Часть 6 Sensor Network Reference Architecture (SNRA): Приложения
Карточка документа - BSI BS ISO/IEC 29182-3 Information technology — Sensor networks: Sensor Network Reference Architecture (SNRA) Part 3: Reference architecture viewsИнформационные технологии — Сенсорные сети: Часть 3 Sensor Network Reference Architecture (SNRA): представления Эталонной архитектуры
Карточка документа - ISO ISO/IEC 29182-3 Information technology - Sensor networks: Sensor Network Reference Architecture (SNRA) - Part 3: Reference architecture views - First EditionИнформационные технологии - Сенсорные сети: Sensor Network Reference Architecture (SNRA) - Часть 3: представления Эталонной архитектуры - Первый Выпуск
Карточка документа - BSI BS ISO/IEC 29182-4 Information technology - Sensor networks: Sensor Network Reference Architecture (SNRA) Part 4: Entity modelsИнформационные технологии - Сенсорные сети: Часть 4 Sensor Network Reference Architecture (SNRA): модели Объекта
Карточка документа - ISO ISO/IEC 29182-5 Information technology - Sensor networks: Sensor Network Reference Architecture (SNRA) - Part 5: Interface definitions - First EditionИнформационные технологии - Сенсорные сети: Sensor Network Reference Architecture (SNRA) - Часть 5: Интерфейсные определения - Первый Выпуск
Карточка документа - BSI BS ISO/IEC 29182-1 Information technology — Sensor networks: Sensor Network Reference Architecture (SNRA) Part 1: General overview and requirementsИнформационные технологии — Сенсорные сети: Часть 1 Sensor Network Reference Architecture (SNRA): Общий обзор и требования
Карточка документа - ISO ISO/IEC 29182-4 Information technology - Sensor networks: Sensor Network Reference Architecture (SNRA) Part 4: Entity models - First EditionИнформационные технологии - Сенсорные сети: Часть 4 Sensor Network Reference Architecture (SNRA): модели Объекта - Первый Выпуск
Карточка документа - ISO ISO/IEC 29182-1 Information technology - Sensor networks: Sensor Network Reference Architecture (SNRA) - Part 1: General overview and requirements - First EditionИнформационные технологии - Сенсорные сети: Sensor Network Reference Architecture (SNRA) - Часть 1: Общий обзор и требования - Первый Выпуск
Карточка документа



