忽縞炎彈
會催 | 炎彈催 | 兆各 |
1 | ISO/IEC 7816-1:1998 | Identification cards ! Integrated circuit(s) cards with contacts ! Part1:Physical characteristics |
2 | ISO/IEC 7816-1:1998/Amd1:2003 | Maximum height of the IC contact surface |
3 | ISO/IEC 7816-2:1999 | Identification cards ! Integrated circuit cards ! Part2:Cards with contacts ! Dimensions and location of the contacts |
4 | ISO/IEC 7816-2:1999/Amd1:2004 | Assignment of contacts C4 and C8 |
5 | ISO/IEC 7816-3:1997 | Information technology ! Identification cards ! Integrated circuit(s) cards with contacts ! Part3:Electronic signals and transmission protocols |
6 | ISO/IEC 7816-3:1997/Amd1:2002 | Electrical characteristics and class indication for integrated circuit(s) cards operating at 5 V, 3 V and 1,8 V |
7 | ISO/IEC 7816-4:2005 | Identification cards ! Integrated circuit cards ! Part4:Organization, security and commands for interchange |
8 | ISO/IEC 7816-5:2004 | Identification cards ! Integrated circuit cards ! Part5:Registration of application providers |
9 | ISO/IEC 7816-6:2004 | Identification cards ! Integrated circuit cards ! Part6:Interindustry data elements for interchange |
10 | ISO/IEC 7816-6:2004/Cor1:2006 | |
11 | ISO/IEC 7816-7:1999 | Identification cards ! Integrated circuit(s) cards with contacts ! Part7:Interindustry commands for Structured Card Query Language (SCQL) |
12 | ISO/IEC 7816-8:2004 | Identification cards ! Integrated circuit cards ! Part8:Commands for security operations |
13 | ISO/IEC 7816-9:2004 | Identification cards ! Integrated circuit cards ! Part9:Commands for card management |
14 | ISO/IEC 7816-10:1999 | Identification cards ! Integrated circuit(s) cards with contacts ! Part10:Electronic signals and answer to reset for synchronous cards |
15 | ISO/IEC 7816-11:2004 | Identification cards ! Integrated circuit cards ! Part11:Personal verification through biometric methods |
16 | ISO/IEC 7816-12:2005 | Identification cards - Integrated circuit cards ! Part12:Cards with contacts ! USB electrical interface and operating procedures |
17 | ISO/IEC 7816-15:2004 | Identification cards ! Integrated circuit cards ! Part15:Cryptographic information application |
18 | ISO/IEC 7816-15:2004/Cor1:2004 | |
19 | ISO/IEC 10118-1:2000 | Information technology ! Security techniques ! Hash-functions ! Part1:General |
20 | ISO/IEC 10118-2:2000 | Information technology ! Security techniques ! Hash-functions ! Part2:Hash-functions using an n-bit block cipher |
21 | ISO/IEC 10118-3:2004 | Information technology ! Security techniques ! Hash-functions ! Part3:Dedicated hash-functions |
22 | ISO/IEC 10118-3:2004/Amd1:2006 | Dedicated Hash-Function 8 (SHA-224) |
23 | ISO/IEC 10118-4:1998 | Information technology ! Security techniques ! Hash-functions ! Part4:Hash-functions using modular arithmetic |
24 | ISO/IEC 10536-1:2000 | Identification cards ! Contactless integrated circuit(s) cards ! Close-coupled cards ! Part1:Physical characteristics |
25 | ISO/IEC 10536-2:1995 | Identification cards ! Contactless integrated circuit(s) cards ! Part2:Dimensions and location of coupling areas |
26 | ISO/IEC 10536-3:1996 | Identification cards ! Contactless integrated circuit(s) cards ! Part3:Electronic signals and reset procedures |
27 | ISO/IEC 11770-1:1996 | Information technology ! Security techniques ! Key management ! Part1:Framework |
28 | ISO/IEC 11770-2:1996 | Information technology ! Security techniques ! Key management ! Part2:Mechanisms using symmetric techniques |
29 | ISO/IEC 11770-2:1996/Cor1:2005 | |
30 | ISO/IEC 11770-3:1999 | Information technology ! Security techniques ! Key management ! Part3:Mechanisms using asymmetric techniques |
31 | ISO/IEC 11770-4:2006 | Information technology ! Security techniques ! Key management ! Part4:Mechanisms based on weak secrets |
32 | ISO/IEC 13335-1:2004 | Information technology ! Security techniques ! Management of information and communications technology security ! Part1: Concepts and models for information and communications technology security management |
33 | ISO/IEC TR 13335-2:1997 | Information technology ! Guidelines for the management of IT Security ! Part2:Managing and planning IT Security |
34 | ISO/IEC TR 13335-3:1998 | Information technology ! Guidelines for the management of IT Security ! Part3:Techniques foe the management of IT Security |
35 | ISO/IEC TR 13335-4:2000 | Information technology ! Guidelines for the management of IT Security ! Part4:Selection of safeguards |
36 | ISO/IEC TR 13335-5:2001 | Information technology ! Guidelines for the management of IT Security ! Part5:Management guidance on network security |
37 | ISO/IEC 13712-1:1995 | Information technology ! Remote Operations: Concepts, model and notation |
38 | ISO/IEC 13712-1:1995/Cor1:1996 | |
39 | ISO/IEC 13712-1:1995/Amd1:1996 | Built-in operations |
40 | ISO/IEC 13712-2:1995 | Information technology ! Remote Operations: OSI realizations ! Remote Operations Service Element (ROSE) service definition |
41 | ISO/IEC 13712-2:1995/Amd1:1996 | Mapping to A-UNIT-DATA and built-in operations |
42 | ISO/IEC 13712-3:1995 | Information technology ! Remote Operations: OSI realizations ! Remote Operations Service Element (ROSE) protocol specification |
43 | ISO/IEC 13712-3:1995/Cor1:1996 | |
44 | ISO/IEC 13712-3:1995/Amd1:1996 | Mapping to A-UNIT-DATA and built-in operations |
45 | ISO/IEC 13888-1:2004 | IT security techniques ! Non-repudiation ! Part1: General |
46 | ISO/IEC 13888-2:1998 | Information technology ! Security techniques ! Non-repudiation ! Part2:Mechanisms using symmetric techniques |
47 | ISO/IEC 13888-3:1997 | Information technology ! Security techniques ! Non-repudiation ! Part3:Mechanisms using asymmetric techniques |
48 | ISO/IEC 14443-1:2000 | Identification cards ! Contactless integrated circuit(s) cards ! Proximity cards ! Part1:Physical characteristics |
49 | ISO/IEC 14443-2:2001 | Identification cards ! Contactless integrated circuit(s) cards ! Proximity cards ! Part2:Radio frequency power and signal interface |
50 | ISO/IEC 14443-2:2001/Amd1:2005 | Bit rates of fc/64, fc/32 and fc/16 |
51 | ISO/IEC 14443-3:2001 | Identification cards ! Contactless integrated circuit(s) cards ! Proximity cards ! Part3:Initialization and anticollision |
52 | ISO/IEC 14443-3:2001/Amd1:2005 | Bit rates of fc/64, fc/32 and fc/16 |
53 | ISO/IEC 14443-3:2001/Amd3:2006 | Handling of reserved fields and values |
54 | ISO/IEC 14443-4:2001 | Identification cards ! Contactless integrated circuit(s) cards ! Proximity cards ! Part4:Transmission protocol |
55 | ISO/IEC 14443-4:2001/Amd1:2006 | Handling of reserved fields and values |
56 | ISO/IEC TR 14516:2002 | Information technology ! Security techniques ! Guidelines for the use and management of Trusted Third Party services |
57 | ISO/IEC 14888-1:1998 | Information technology ! Security techniques ! Digital signatures with appendix ! Part1:General |
58 | ISO/IEC 14888-2:1999 | Information technology ! Security techniques ! Digital signatures with appendix ! Part2:Identity-based mechanisms |
59 | ISO/IEC 14888-3:1998 | Information technology ! Security techniques ! Digital signatures with appendix ! Part3: Certificate-based mechanisms |
60 | ISO/IEC 14888-3:1998/Cor1:2001 | |
61 | ISO/IEC 15292:2001 | Information technology - Security techniques - Protection Profile registration procedures |
62 | ISO/IEC 15408-1:2005 | Information technology ! Security techniques ! Evaluation criteria for IT security ! Part1:Introduction and general model |
63 | ISO/IEC 15408-2:2005 | Information technology ! Security techniques ! Evaluation criteria for IT security ! Part2:Security functional requirements |
64 | ISO/IEC 15408-3:2005 | Information technology ! Security techniques ! Evaluation criteria for IT security ! Part3:Security assurance requirements |
65 | ISO/IEC TR 15443-1:2005 | Information technology ! Security techniques ! A framework for IT security assurance ! Part1:Overview and framework |
66 | ISO/IEC TR 15443-2:2005 | Information technology ! Security techniques ! A framework for IT security assurance ! Part2:Assurance methods |
67 | ISO/IEC TR 15446:2004 | Information technology ! Security techniques ! Guide for the production of Protection Profiles and Security Targets |
68 | ISO/IEC 15816:2002 | Information technology ! Security techniques ! Security information objects for access control |
69 | ISO/IEC 15945:2002 | Information technology ! Security techniques ! Specification of TTP services to support the application of digital signatures |
70 | ISO/IEC 15946-1:2002 | Information technology ! Security techniques ! Cryptographic techniques based on elliptic curves ! Part1:General |
71 | ISO/IEC 15946-2:2002 | Information technology ! Security techniques ! Cryptographic techniques based on elliptic curves ! Part2:Digital signatures |
72 | ISO/IEC 15946-3:2002 | Information technology ! Security techniques ! Cryptographic techniques based on elliptic curves ! Part3:Key establishment |
73 | ISO/IEC 15946-4:2004 | Information technology ! Security techniques ! Cryptographic techniques based on elliptic curves ! Part4:Digital signatures giving message recovery |
74 | ISO/IEC TR 15947:2002 | Information technology ! Security techniques ! IT intrusion detection framework |
75 | ISO/IEC 17025:2005 | General requirements for the competence of testing and calibration laboratories |
76 | ISO/IEC 17799:2005 | Information technology ! Security techniques ! Code of practice for information security management |
77 | ISO/IEC 18014-1:2002 | Information technology ! Security techniques ! Time-stamping services ! Part1:Framework |
78 | ISO/IEC 18014-2:2002 | Information technology ! Security techniques ! Time-stamping services ! Part2:Mechanisms producing independent tokens |
79 | ISO/IEC 18014-3:2004 | Information technology ! Security techniques ! Time-stamping services ! Part3:Mechanisms producing linked tokens |
80 | ISO/IEC 18028-1:2006 | Information technology ! Security techniques ! IT network security ! Part1:Network security management |
81 | ISO/IEC 18028-2:2006 | Information technology ! Security techniques ! IT network security ! Part2:Network security architecture |
82 | ISO/IEC 18028-3:2005 | Information technology ! Security techniques ! IT network security ! Part3:Securing communications between networks using security gateways |
83 | ISO/IEC 18028-4:2005 | Information technology ! Security techniques ! IT network security ! Part4:Securing remote access |
84 | ISO/IEC 18028-5:2006 | Information technology ! Security techniques ! IT network security ! Part5:Securing communications across networks using virtual private networks |
85 | ISO/IEC 18031:2005 | Information technology ! Security techniques ! Random bit generation |
86 | ISO/IEC 18032:2005 | Information technology ! Security techniques ! Prime number generation |
87 | ISO/IEC 18033-1:2005 | Information technology ! Security techniques ! Encryption algorithms ! Part1:General |
88 | ISO/IEC 18033-2:2006 | Information technology ! Security techniques ! Encryption algorithms ! Part2:Asymmetric ciphers |
89 | ISO/IEC 18033-3:2005 | Information technology ! Security techniques ! Encryption algorithms ! Part3:Block ciphers |
90 | ISO/IEC 18033-4:2005 | Information technology ! Security techniques ! Encryption algorithms ! Part4:Stream ciphers |
91 | ISO/IEC 18043:2006 | Information technology ! Security techniques ! Selection, deployment and operations of intrusion detection systems |
92 | ISO/IEC TR 18044:2004 | Information technology ! Security techniques ! Information security incident management |
93 | ISO/IEC 18045:2005 | Information technology ! Security techniques ! Methodology for IT security evaluation |
94 | ISO/IEC 19790:2006 | Information technology ! Security techniques ! Security requirements for cryptographic modules |
95 | ISO/IEC TR 19791:2006 | Information technology ! Security techniques ! Security assessment of operational systems |
96 | ISO/IEC 21827:2002 | Information technology ! Systems Security Engineering ! Capability Maturity Model (SSE-CMM®) |
97 | ISO/IEC 27001:2005 | Information technology ! Security techniques ! Information security management systems ! Requirements |