忽縞炎彈

會催 炎彈催 兆各
1 ISO/IEC 7816-1:1998 Identification cards ! Integrated circuit(s) cards with contacts ! Part1:Physical characteristics
2 ISO/IEC 7816-1:1998/Amd1:2003 Maximum height of the IC contact surface
3 ISO/IEC 7816-2:1999 Identification cards ! Integrated circuit cards ! Part2:Cards with contacts ! Dimensions and location of the contacts
4 ISO/IEC 7816-2:1999/Amd1:2004 Assignment of contacts C4 and C8
5 ISO/IEC 7816-3:1997 Information technology ! Identification cards ! Integrated circuit(s) cards with contacts ! Part3:Electronic signals and transmission protocols
6 ISO/IEC 7816-3:1997/Amd1:2002 Electrical characteristics and class indication for integrated circuit(s) cards operating at 5 V, 3 V and 1,8 V
7 ISO/IEC 7816-4:2005 Identification cards ! Integrated circuit cards ! Part4:Organization, security and commands for interchange
8 ISO/IEC 7816-5:2004 Identification cards ! Integrated circuit cards ! Part5:Registration of application providers
9 ISO/IEC 7816-6:2004 Identification cards ! Integrated circuit cards ! Part6:Interindustry data elements for interchange
10 ISO/IEC 7816-6:2004/Cor1:2006
11 ISO/IEC 7816-7:1999 Identification cards ! Integrated circuit(s) cards with contacts ! Part7:Interindustry commands for Structured Card Query Language (SCQL)
12 ISO/IEC 7816-8:2004 Identification cards ! Integrated circuit cards ! Part8:Commands for security operations
13 ISO/IEC 7816-9:2004 Identification cards ! Integrated circuit cards ! Part9:Commands for card management
14 ISO/IEC 7816-10:1999 Identification cards ! Integrated circuit(s) cards with contacts ! Part10:Electronic signals and answer to reset for synchronous cards
15 ISO/IEC 7816-11:2004 Identification cards ! Integrated circuit cards ! Part11:Personal verification through biometric methods
16 ISO/IEC 7816-12:2005 Identification cards - Integrated circuit cards ! Part12:Cards with contacts ! USB electrical interface and operating procedures
17 ISO/IEC 7816-15:2004 Identification cards ! Integrated circuit cards ! Part15:Cryptographic information application
18 ISO/IEC 7816-15:2004/Cor1:2004
19 ISO/IEC 10118-1:2000 Information technology ! Security techniques ! Hash-functions ! Part1:General
20 ISO/IEC 10118-2:2000 Information technology ! Security techniques ! Hash-functions ! Part2:Hash-functions using an n-bit block cipher
21 ISO/IEC 10118-3:2004 Information technology ! Security techniques ! Hash-functions ! Part3:Dedicated hash-functions
22 ISO/IEC 10118-3:2004/Amd1:2006 Dedicated Hash-Function 8 (SHA-224)
23 ISO/IEC 10118-4:1998 Information technology ! Security techniques ! Hash-functions ! Part4:Hash-functions using modular arithmetic
24 ISO/IEC 10536-1:2000 Identification cards ! Contactless integrated circuit(s) cards ! Close-coupled cards ! Part1:Physical characteristics
25 ISO/IEC 10536-2:1995 Identification cards ! Contactless integrated circuit(s) cards ! Part2:Dimensions and location of coupling areas
26 ISO/IEC 10536-3:1996 Identification cards ! Contactless integrated circuit(s) cards ! Part3:Electronic signals and reset procedures
27 ISO/IEC 11770-1:1996 Information technology ! Security techniques ! Key management ! Part1:Framework
28 ISO/IEC 11770-2:1996 Information technology ! Security techniques ! Key management ! Part2:Mechanisms using symmetric techniques
29 ISO/IEC 11770-2:1996/Cor1:2005
30 ISO/IEC 11770-3:1999 Information technology ! Security techniques ! Key management ! Part3:Mechanisms using asymmetric techniques
31 ISO/IEC 11770-4:2006 Information technology ! Security techniques ! Key management ! Part4:Mechanisms based on weak secrets
32 ISO/IEC 13335-1:2004 Information technology ! Security techniques ! Management of information and communications technology security ! Part1: Concepts and models for information and communications technology security management
33 ISO/IEC TR 13335-2:1997 Information technology ! Guidelines for the management of IT Security ! Part2:Managing and planning IT Security
34 ISO/IEC TR 13335-3:1998 Information technology ! Guidelines for the management of IT Security ! Part3:Techniques foe the management of IT Security
35 ISO/IEC TR 13335-4:2000 Information technology ! Guidelines for the management of IT Security ! Part4:Selection of safeguards
36 ISO/IEC TR 13335-5:2001 Information technology ! Guidelines for the management of IT Security ! Part5:Management guidance on network security
37 ISO/IEC 13712-1:1995 Information technology ! Remote Operations: Concepts, model and notation
38 ISO/IEC 13712-1:1995/Cor1:1996
39 ISO/IEC 13712-1:1995/Amd1:1996 Built-in operations
40 ISO/IEC 13712-2:1995 Information technology ! Remote Operations: OSI realizations ! Remote Operations Service Element (ROSE) service definition
41 ISO/IEC 13712-2:1995/Amd1:1996 Mapping to A-UNIT-DATA and built-in operations
42 ISO/IEC 13712-3:1995 Information technology ! Remote Operations: OSI realizations ! Remote Operations Service Element (ROSE) protocol specification
43 ISO/IEC 13712-3:1995/Cor1:1996
44 ISO/IEC 13712-3:1995/Amd1:1996 Mapping to A-UNIT-DATA and built-in operations
45 ISO/IEC 13888-1:2004 IT security techniques ! Non-repudiation ! Part1: General
46 ISO/IEC 13888-2:1998 Information technology ! Security techniques ! Non-repudiation ! Part2:Mechanisms using symmetric techniques
47 ISO/IEC 13888-3:1997 Information technology ! Security techniques ! Non-repudiation ! Part3:Mechanisms using asymmetric techniques
48 ISO/IEC 14443-1:2000 Identification cards ! Contactless integrated circuit(s) cards ! Proximity cards ! Part1:Physical characteristics
49 ISO/IEC 14443-2:2001 Identification cards ! Contactless integrated circuit(s) cards ! Proximity cards ! Part2:Radio frequency power and signal interface
50 ISO/IEC 14443-2:2001/Amd1:2005 Bit rates of fc/64, fc/32 and fc/16
51 ISO/IEC 14443-3:2001 Identification cards ! Contactless integrated circuit(s) cards ! Proximity cards ! Part3:Initialization and anticollision
52 ISO/IEC 14443-3:2001/Amd1:2005 Bit rates of fc/64, fc/32 and fc/16
53 ISO/IEC 14443-3:2001/Amd3:2006 Handling of reserved fields and values
54 ISO/IEC 14443-4:2001 Identification cards ! Contactless integrated circuit(s) cards ! Proximity cards ! Part4:Transmission protocol
55 ISO/IEC 14443-4:2001/Amd1:2006 Handling of reserved fields and values
56 ISO/IEC TR 14516:2002 Information technology ! Security techniques ! Guidelines for the use and management of Trusted Third Party services
57 ISO/IEC 14888-1:1998 Information technology ! Security techniques ! Digital signatures with appendix ! Part1:General
58 ISO/IEC 14888-2:1999 Information technology ! Security techniques ! Digital signatures with appendix ! Part2:Identity-based mechanisms
59 ISO/IEC 14888-3:1998 Information technology ! Security techniques ! Digital signatures with appendix ! Part3: Certificate-based mechanisms
60 ISO/IEC 14888-3:1998/Cor1:2001
61 ISO/IEC 15292:2001 Information technology - Security techniques - Protection Profile registration procedures
62 ISO/IEC 15408-1:2005 Information technology ! Security techniques ! Evaluation criteria for IT security ! Part1:Introduction and general model
63 ISO/IEC 15408-2:2005 Information technology ! Security techniques ! Evaluation criteria for IT security ! Part2:Security functional requirements
64 ISO/IEC 15408-3:2005 Information technology ! Security techniques ! Evaluation criteria for IT security ! Part3:Security assurance requirements
65 ISO/IEC TR 15443-1:2005 Information technology ! Security techniques ! A framework for IT security assurance ! Part1:Overview and framework
66 ISO/IEC TR 15443-2:2005 Information technology ! Security techniques ! A framework for IT security assurance ! Part2:Assurance methods
67 ISO/IEC TR 15446:2004 Information technology ! Security techniques ! Guide for the production of Protection Profiles and Security Targets
68 ISO/IEC 15816:2002 Information technology ! Security techniques ! Security information objects for access control
69 ISO/IEC 15945:2002 Information technology ! Security techniques ! Specification of TTP services to support the application of digital signatures
70 ISO/IEC 15946-1:2002 Information technology ! Security techniques ! Cryptographic techniques based on elliptic curves ! Part1:General
71 ISO/IEC 15946-2:2002 Information technology ! Security techniques ! Cryptographic techniques based on elliptic curves ! Part2:Digital signatures
72 ISO/IEC 15946-3:2002 Information technology ! Security techniques ! Cryptographic techniques based on elliptic curves ! Part3:Key establishment
73 ISO/IEC 15946-4:2004 Information technology ! Security techniques ! Cryptographic techniques based on elliptic curves ! Part4:Digital signatures giving message recovery
74 ISO/IEC TR 15947:2002 Information technology ! Security techniques ! IT intrusion detection framework
75 ISO/IEC 17025:2005 General requirements for the competence of testing and calibration laboratories
76 ISO/IEC 17799:2005 Information technology ! Security techniques ! Code of practice for information security management
77 ISO/IEC 18014-1:2002 Information technology ! Security techniques ! Time-stamping services ! Part1:Framework
78 ISO/IEC 18014-2:2002 Information technology ! Security techniques ! Time-stamping services ! Part2:Mechanisms producing independent tokens
79 ISO/IEC 18014-3:2004 Information technology ! Security techniques ! Time-stamping services ! Part3:Mechanisms producing linked tokens
80 ISO/IEC 18028-1:2006 Information technology ! Security techniques ! IT network security ! Part1:Network security management
81 ISO/IEC 18028-2:2006 Information technology ! Security techniques ! IT network security ! Part2:Network security architecture
82 ISO/IEC 18028-3:2005 Information technology ! Security techniques ! IT network security ! Part3:Securing communications between networks using security gateways
83 ISO/IEC 18028-4:2005 Information technology ! Security techniques ! IT network security ! Part4:Securing remote access
84 ISO/IEC 18028-5:2006 Information technology ! Security techniques ! IT network security ! Part5:Securing communications across networks using virtual private networks
85 ISO/IEC 18031:2005 Information technology ! Security techniques ! Random bit generation
86 ISO/IEC 18032:2005 Information technology ! Security techniques ! Prime number generation
87 ISO/IEC 18033-1:2005 Information technology ! Security techniques ! Encryption algorithms ! Part1:General
88 ISO/IEC 18033-2:2006 Information technology ! Security techniques ! Encryption algorithms ! Part2:Asymmetric ciphers
89 ISO/IEC 18033-3:2005 Information technology ! Security techniques ! Encryption algorithms ! Part3:Block ciphers
90 ISO/IEC 18033-4:2005 Information technology ! Security techniques ! Encryption algorithms ! Part4:Stream ciphers
91 ISO/IEC 18043:2006 Information technology ! Security techniques ! Selection, deployment and operations of intrusion detection systems
92 ISO/IEC TR 18044:2004 Information technology ! Security techniques ! Information security incident management
93 ISO/IEC 18045:2005 Information technology ! Security techniques ! Methodology for IT security evaluation
94 ISO/IEC 19790:2006 Information technology ! Security techniques ! Security requirements for cryptographic modules
95 ISO/IEC TR 19791:2006 Information technology ! Security techniques ! Security assessment of operational systems
96 ISO/IEC 21827:2002 Information technology ! Systems Security Engineering ! Capability Maturity Model (SSE-CMM®)
97 ISO/IEC 27001:2005 Information technology ! Security techniques ! Information security management systems ! Requirements