Search

step 1 - search
2
step 2 - choose
3
step 3 - settings
4
step 4 - order
5
step 5 - pay
Displaying 73-84 of 338 results.

ISO/IEC 14888-3:2006

standard

EN
Information technology Security techniques Digital signatures with appendix
View

48.19 €

ISO/IEC 14888-3:2006/Amd 1:2010

amendment

EN
Elliptic Curve Russian Digital Signature Algorithm, Schnorr Digital Signature Algorithm, Elliptic Curve Schnorr Digital Signature Algorithm, and Elliptic Curve Full Schnorr Digital Signature Algorithm
View

48.19 €

ISO/IEC 14888-3:2006/Amd 2:2012

amendment

EN
Optimizing hash inputs
View

48.19 €

ISO/IEC 14888-3:2006/Cor 1:2007

corrigendum

EN
View

0.00 €

ISO/IEC 14888-3:2006/Cor 2:2009

corrigendum

EN
View

0.00 €

ISO/IEC 14888-3:2016

standard

EN
Information technology Security techniques Digital signatures with appendix
View

48.19 €

ISO/IEC 14888-3:2018

standard

EN
IT Security techniques Digital signatures with appendix
View

163.86 €

ISO/IEC 15408-1:2009

standard

EN
Information technology Security techniques Evaluation criteria for IT security
View

48.19 €

ISO/IEC 15408-1:2022

standard

EN
Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 1: Introduction and general model
View

0.00 €

ISO/IEC 15408-2:2008

standard

EN
Information technology Security techniques Evaluation criteria for IT security
View

48.19 €

ISO/IEC 15408-2:2022

standard

EN
Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 2: Security functional components
View

0.00 €

ISO/IEC 15408-3:2008

standard

EN
Information technology Security techniques Evaluation criteria for IT security
View

48.19 €