Search results

Search list

Results in:

251-260 of 270 results

Amendment 1:2020 to CAN/CSA-ISO/IEC 11770-4:18, Information technology - Security techniques - Key management - Part 4: Mechanisms based on weak secrets - Amendment 1: Unbalanced Password-Authenticated Key Agreement with Identity-Based Cryptosystems (UPAKA-IBC) (Adopted amendment 1:2019 to ISO/IEC 11770-4:2017)
Edition 2020

Standards [CURRENT]

CSA ISO/IEC 9798-2

IT Security techniques - Entity authentication - Part 2: Mechanisms using authenticated encryption (Adopted ISO/IEC 9798-2:2019, fourth edition, 2019-06)
Edition 2020-07-01

Technical rule [CURRENT]

VDI/VDE 2182 Blatt 3.2

IT-security for industrial automation - Example of use of the general model for integrators in process industry - LDPE reactor
Edition 2013-05

Technical rule [CURRENT]

VDI 6320

Data management for life sciences
Edition 2021-10

Technical rule [CURRENT]

VDI 4485

E-commerce and logistics
Edition 2007-05

Standards [CURRENT]

BS ISO/IEC 19772

Information security. Authenticated encryption
Edition 2020-12-07

Standards [CURRENT]

ISO/IEC 19772

Information security - Authenticated encryption
Edition 2020-11

Standards [CURRENT]

BS ISO/IEC 29192-8

Information security. Lightweight cryptography. Authenticated encryption
Edition 2022-09-29

Standards [CURRENT]

ISO/IEC 11770-4 AMD 1

Information technology - Security techniques - Key management - Part 4: Mechanisms based on weak secrets - Amendment 1: Unbalanced Password-Authenticated Key Agreement with Identity-Based Cryptosystems (UPAKA-IBC)
Edition 2019-09

Standards [CURRENT]

ISO/IEC 11770-4 AMD 2

Information technology - Security techniques - Key management - Part 4: Mechanisms based on weak secrets - Amendment 2: Leakage-resilient password-authenticated key agreement with additional stored secrets
Edition 2021-02

Related searches

Choose a keyword to learn more:
TOP