ISO/IEC 13888-2:2010Information technology -- Security techniques -- Non-repudiation -- Part 2: Mechanisms using symmetric techniques
96,00 €
|
ISO/IEC 11770-1:2010Information technology -- Security techniques -- Key management -- Part 1: Framework
151,00 €
|
ISO/IEC 9798-6:2010Information technology -- Security techniques -- Entity authentication -- Part 6: Mechanisms using manual data transfer
151,00 €
|
ISO/IEC 10118-2:2010Information technology -- Security techniques -- Hash-functions -- Part 2: Hash-functions using an n-bit block cipher
151,00 €
|
ISO/IEC 9798-1:2010Information technology -- Security techniques -- Entity authentication -- Part 1: General
63,00 €
|
ISO/IEC TR 19791:2010Information technology -- Security techniques -- Security assessment of operational systems
216,00 €
|
ISO/IEC 18014-3:2009Information technology -- Security techniques -- Time-stamping services -- Part 3: Mechanisms producing linked tokens
173,00 €
|
ISO/IEC 9798-5:2009Information technology -- Security techniques -- Entity authentication -- Part 5: Mechanisms using zero-knowledge techniques
194,00 €
|
ISO/IEC 9798-4:1999/COR1:2009Corrigendum 1 - Information technology -- Security techniques -- Entity authentication -- Part 4: Mechanisms using a cryptographic check function -
0,00 €
|
ISO/IEC 19792:2009Information technology -- Security techniques -- Security evaluation of biometrics
173,00 €
|
ISO/IEC 21827:2008Information technology -- Security techniques -- Systems Security Engineering -- Capability Maturity Model® (SSE-CMM®)
216,00 €
|
ISO/IEC 18014-1:2008Information technology -- Security techniques -- Time-stamping services -- Part 1: Framework
151,00 €
|
ISO/IEC 14888-2:2008Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
194,00 €
|
ISO/IEC 14888-1:2008Information technology - Security techniques - Digital signatures with appendix - Part 1: General
63,00 €
|
ISO/IEC 9796-3:2006Information technology -- Security techniques -- Digital signature schemes giving message recovery -- Part 3: Discrete logarithm based mechanisms
194,00 €
|
ISO/IEC 18033-2:2006Information technology -- Security techniques -- Encryption algorithms -- Part 2: Asymmetric ciphers
216,00 €
|
|
ISO/IEC TR 14516:2002Information technology -- Security techniques -- Guidelines for the use and management of Trusted Third Party services
151,00 €
|
ISO/IEC 15945:2002Information technology -- Security techniques -- Specification of TTP services to support the application of digital signatures
194,00 €
|
ISO/IEC 15816:2002Information technology -- Security techniques -- Security information objects for access control
129,00 €
|