共找到 1027 条与 数据加密 相关的标准,共 69 页
Information security technology-Security technical requirements of gateway in sensing layer of the internet of things
Information security technology-Security technical requirements of data transmission for internet of things
Information security technology—Technical requirements for cryptographic application for radio frequency identification systems—Part 1: Cryptographic protection framework and security levels
Information security technology—Security management requirements for office information systems
Information technology—Security techniques—Digital signature schemes giving message recovery—Part 3:Discrete logarithm based mechanisms
Information security technology—Technical requirements for fingerprint recognition system
Information security technology—Testing and evaluation process guide for classified protection of cybersecurity
Information security technology—Security technical requirements for application of sensing terminals in internet of things
Information security technology—Technical requirements for cryptographic application for radio frequency identification systems—Part 2: Technical requirements for cryptographic application for RF tag, reader and communication
Information security technology —Capability requirements and evaluation specification for assessment organization of classified protection of cybersecurity
Information security techniques —Assessment criteria for disaster recovery service capability
Information security technology —Technical specification for IPSec VPN
Information security technology—Guidelines for the information and communication technology supply chain risk management
Information security technology—Security technique requirements for citizen cyber electronic identity—Part 1: Security technique requirements for reader
Information security technology-Format specifications for citizen cyber electronic identity
本标准规定了网络安全威胁信息模型和网络安全威胁信息组件,包括网络安全威胁信息中各组件的属性和属性值格式等信息。 本标准适用于网络安全威胁信息供方和需方之间进行网络安全威胁信息的生成.共享和使用,网络安全威胁信息共享平台的建设和运营可参考使用。
Information security technology—Cyber security threat information format
Information security technology—Security techniques requirement for citizen cyber electronic identity—Part 2:Security technique requirements of carrier
Information security techniques—Biometric authentication protocol framework based on trusted environment
Information security technology—Trusted computing specification—Trusted support platform for server
Information security technology—Time stamp policy and time stamp practice rules
Copyright ©2007-2022 ANTPEDIA, All Rights Reserved
京ICP备07018254号 京公网安备1101085018 电信与信息服务业务经营许可证:京ICP证110310号