BSI BS ISO/IEC 14888-3 + A2 Information technology - Security techniques - Digital signatures with appendix Part 3: Discrete logarithm based mechanisms - CORR: March 31, 2008; CORR: August 31, 2009; AMD: August 31, 2010; AMD: August 31, 2012
Список продуктов
Данный раздел/документ содержится в продуктах:
Данный раздел/документ содержится в продуктах:
- Техэксперт: Машиностроительный комплекс
- Картотека зарубежных и международных стандартов
- CEN ISO/TR 9241-100 Ergonomics of human-system interaction - Part 100: Introduction to standards related to software ergonomics
- ISO ISO/IEC 15504-2 CORR 1 Software engineering - Process assessment - Part 2: Performing an assessment TECHNICAL CORRIGENDUM 1 - First Edition
- BSI BS ISO/IEC 15026-2 Systems and software engineering - Systems and software assurance Part 2: Assurance case
- BSI PD ISO/IEC TR 20004 Information technology - Security techniques - Refining software vulnerability analysis under ISO/IEC 15408 and ISO/IEC 18405
- BSI BS ISO/IEC 15026-2 Systems and software engineering - Systems and software assurance Part 2: Assurance case
- ISO ISO/IEC 15504-2 CORR 1 Software engineering - Process assessment - Part 2: Performing an assessment TECHNICAL CORRIGENDUM 1 - First Edition
- 13
- CEN ISO/TR 9241-100 Ergonomics of human-system interaction - Part 100: Introduction to standards related to software ergonomics
- ISO ISO/IEC 15504-2 CORR 1 Software engineering - Process assessment - Part 2: Performing an assessment TECHNICAL CORRIGENDUM 1 - First Edition
- BSI BS ISO/IEC 15026-2 Systems and software engineering - Systems and software assurance Part 2: Assurance case
- BSI PD ISO/IEC TR 20004 Information technology - Security techniques - Refining software vulnerability analysis under ISO/IEC 15408 and ISO/IEC 18405
- BSI BS ISO/IEC 15026-2 Systems and software engineering - Systems and software assurance Part 2: Assurance case
- ISO ISO/IEC 15504-2 CORR 1 Software engineering - Process assessment - Part 2: Performing an assessment TECHNICAL CORRIGENDUM 1 - First Edition
- 13.180
- CEN ISO/TR 9241-100 Ergonomics of human-system interaction - Part 100: Introduction to standards related to software ergonomics
- ISO ISO/IEC 15504-2 CORR 1 Software engineering - Process assessment - Part 2: Performing an assessment TECHNICAL CORRIGENDUM 1 - First Edition
- BSI BS ISO/IEC 15026-2 Systems and software engineering - Systems and software assurance Part 2: Assurance case
- BSI PD ISO/IEC TR 20004 Information technology - Security techniques - Refining software vulnerability analysis under ISO/IEC 15408 and ISO/IEC 18405
- BSI BS ISO/IEC 15026-2 Systems and software engineering - Systems and software assurance Part 2: Assurance case
- ISO ISO/IEC 15504-2 CORR 1 Software engineering - Process assessment - Part 2: Performing an assessment TECHNICAL CORRIGENDUM 1 - First Edition
- CEN ISO/TR 9241-100 Ergonomics of human-system interaction - Part 100: Introduction to standards related to software ergonomics
- CEN ISO/TR 9241-100 Ergonomics of human-system interaction - Part 100: Introduction to standards related to software ergonomics
- 35
- CEN ISO/TR 9241-100 Ergonomics of human-system interaction - Part 100: Introduction to standards related to software ergonomics
- ISO ISO/IEC 15504-2 CORR 1 Software engineering - Process assessment - Part 2: Performing an assessment TECHNICAL CORRIGENDUM 1 - First Edition
- BSI BS ISO/IEC 15026-2 Systems and software engineering - Systems and software assurance Part 2: Assurance case
- BSI PD ISO/IEC TR 20004 Information technology - Security techniques - Refining software vulnerability analysis under ISO/IEC 15408 and ISO/IEC 18405
- BSI BS ISO/IEC 15026-2 Systems and software engineering - Systems and software assurance Part 2: Assurance case
- ISO ISO/IEC 15504-2 CORR 1 Software engineering - Process assessment - Part 2: Performing an assessment TECHNICAL CORRIGENDUM 1 - First Edition
- 35.180
- CEN ISO/TR 9241-100 Ergonomics of human-system interaction - Part 100: Introduction to standards related to software ergonomics
- ISO ISO/IEC 15504-2 CORR 1 Software engineering - Process assessment - Part 2: Performing an assessment TECHNICAL CORRIGENDUM 1 - First Edition
- BSI BS ISO/IEC 15026-2 Systems and software engineering - Systems and software assurance Part 2: Assurance case
- BSI PD ISO/IEC TR 20004 Information technology - Security techniques - Refining software vulnerability analysis under ISO/IEC 15408 and ISO/IEC 18405
- BSI BS ISO/IEC 15026-2 Systems and software engineering - Systems and software assurance Part 2: Assurance case
- ISO ISO/IEC 15504-2 CORR 1 Software engineering - Process assessment - Part 2: Performing an assessment TECHNICAL CORRIGENDUM 1 - First Edition
- CEN ISO/TR 9241-100 Ergonomics of human-system interaction - Part 100: Introduction to standards related to software ergonomics
- CEN ISO/TR 9241-100 Ergonomics of human-system interaction - Part 100: Introduction to standards related to software ergonomics
- ISO ISO/IEC 15504-2 CORR 1 Software engineering - Process assessment - Part 2: Performing an assessment TECHNICAL CORRIGENDUM 1 - First Edition
- BSI BS ISO/IEC 15026-2 Systems and software engineering - Systems and software assurance Part 2: Assurance case
- BSI PD ISO/IEC TR 20004 Information technology - Security techniques - Refining software vulnerability analysis under ISO/IEC 15408 and ISO/IEC 18405
- BSI BS ISO/IEC 15026-2 Systems and software engineering - Systems and software assurance Part 2: Assurance case
- BSI BS ISO/IEC 15026-2 Systems and software engineering - Systems and software assurance Part 2: Assurance case
- BSI PD ISO/IEC TR 20004 Information technology - Security techniques - Refining software vulnerability analysis under ISO/IEC 15408 and ISO/IEC 18405
- BSI PD ISO/IEC TR 20004 Information technology - Security techniques - Refining software vulnerability analysis under ISO/IEC 15408 and ISO/IEC 18405
- ISO ISO/IEC 15408-2 Information technology - Security techniques - Evaluation criteria for IT security - Part 2: Security functional components - Third Edition
- ISO 15782-1 Certificate management for financial services — Part 1: Public key certificates - Second Edition
- ISO 15782-2 Banking - Certificate Management - Part 2: Certificate Extensions - First Edition
- BSI BS ISO 21188 Public key infrastructure for financial services Practices and policy framework
- BSI BS ISO/IEC 18032 Information technology Security techniques Prime number generation
- CEN ISO/TR 9241-100 Ergonomics of human-system interaction - Part 100: Introduction to standards related to software ergonomics
- Картотека зарубежных и международных стандартов
Ссылается на
- В списке элементов: 12
- BSI BS ISO/IEC 10118-1 Information Technology - Security Techniques - Hash-Functions - Part 1: GeneralИнформационные технологии - методы безопасности - хеш-функции - часть 1: общий
Карточка документа - ITU-T X.509 CORR 3 Information technology – Open Systems Interconnection – The Directory: Public-key and attribute certificate frameworks Technical Corrigendum 3 - Study Group 17Информационные технологии – Открытое Соединение Систем – Справочник: открытый ключ и структуры сертификата признака Техническое Исправление 3 - Исследовательская группа 17
Карточка документа - ISO ISO/IEC 15946-1 Information technology - Security techniques - Cryptographic techniques based on elliptic curves - Part 1: General - Third EditionИнформационные технологии - методы безопасности - Криптографические методы на основе эллиптических кривых - Часть 1: Общий - Третий Выпуск
Карточка документа - ISO ISO/IEC 11770-3 CORR 1 Information technology - Security techniques - Key management - Part 3: Mechanisms using asymmetric techniques TECHNICAL CORRIGENDUM 1 - Third EditionИнформационные технологии - методы безопасности - управление ключами - Часть 3: Механизмы с помощью асимметричных методов TECHNICAL CORRIGENDUM 1 - Третий Выпуск
Карточка документа - BSI BS ISO/IEC 11770-3 Information technology - Security techniques - Key management Part 3: Mechanisms using asymmetric techniques - CORR: July 31, 2016Информационные технологии - методы безопасности - Часть 3 управления ключами: Механизмы с помощью асимметричных методов - CORR: 31 июля 2016
Карточка документа - BSI BS ISO/IEC 9594-8 Information Technology - Open Systems Interconnection - The Directory Part 8: Public-key and attribute certificate frameworksИнформационные технологии - Взаимодействие открытых систем - Часть 8 Каталога: открытый ключ и платформы сертификата атрибута
Карточка документа - BSI BS ISO/IEC 14888-1 Information technology - Security techniques - Digital signatures with appendix - Part 1: GeneralИнформационные технологии - методы Безопасности - Цифровые подписи с приложением - Часть 1: Общий
Карточка документа - BSI BS ISO/IEC 14888-2 Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanismsИнформационные технологии - методы безопасности - Цифровые подписи с приложением - Часть 2: Целочисленная факторизация основывала механизмы
Карточка документа - ISO ISO/IEC 14888-1 Information technology - Security techniques - Digital signatures with appendix - Part 1: General - Second EditionИнформационные технологии - методы Безопасности - Цифровые подписи с приложением - Часть 1: Общий - Второй Выпуск
Карточка документа - BSI BS ISO/IEC 18032 Information technology Security techniques Prime number generationГенерация Простого числа методов Безопасности информационных технологий
Карточка документа - ISO ISO/IEC 18032 Information technology Security techniques Prime number generation - First EditionГенерация Простого числа методов Безопасности информационных технологий - Первый Выпуск
Карточка документа - BSI BS ISO/IEC 15945 Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital SignaturesИнформационные технологии - методы безопасности - спецификация услуг TTP поддерживать приложение цифровых подписей
Карточка документа



