Code of China Chinese Classification Professional Classification ICS Classification Latest Value-added Services

LoginRegister

Title Standard No. Implemented On
Information security technology—Security reference architecture of cloud computingGB/T 35279-2017
Information security technology--ZUC stream cipher algorithm--Part 1: Algorithm descriptionGB/T 33133.1-2016
Information security technology—Security technique requirements for citizen cyber electronic identity—Part 1: Security technique requirements for readerGB/T 36629.1-20182019-5-1
Information security techniques—Biometric authentication protocol framework based on trusted environmentGB/T 36651-20182019-5-1
Information security technology-Format specifications for citizen cyber electronic identityGB/T 36632-20182019-5-1
Information security technology—Cyber security threat information formatGB/T 36643-20182019-5-1
Information security technology—Guidelines for the information and communication technology supply chain risk managementGB/T 36637-20182019-5-1
Information security technology—Security techniques requirement for citizen cyber electronic identity—Part 2:Security technique requirements of carrierGB/T 36629.2-20182019-5-1
Information security technology—Specifications of cryptograph and related security technology for certificate authentication systemGB/T 25056-20182019-1-1
Information security technology—Public key infrastructure—Digital certificate formatGB/T 20518-20182019-1-1
Information security technology—Implementation guide to risk assessment of industrial control systemsGB/T 36466-20182019-1-1
Information security technology—Common security functional requirements for data acquisition and control field devices of industrial control systemsGB/T 36470-20182019-1-1
Information security technology—Guide of implementation for internet-basede-government information security—Part 1:GeneralGB/Z 24294.1-20182018-10-1
Security Technical Requirement for the Electronic Identification of Motor VehiclesGB/T 35788-20172018-7-1
Information security technology-General requirement of security for radio frequency identification systemsGB/T 35290-20172018-7-1
Information security technology―Security technology specifications of mobile e-government systemGB/T 35282-20172018-7-1
Information technology―Security techniques―Entity authentication―Part 1:GeneralGB/T 15843.1-20172018-7-1
Information security technology―Cryptography token application interface specificationGB/T 35291-20172018-7-1
Information security technology—Guidelines of trusted identity technology for websiteGB/T 35287-20172018-7-1
Information security technology―Specification on the service quality of certification authorityGB/T 35289-20172018-7-1
Information security technology―SM2 cryptographic algorithm encrypted signature message syntax specificationGB/T 35275-20172018-7-1
Information security technology―SM2 cryptography algorithm usage specificationGB/T 35276-20172018-7-1
Information technology—Security techniques—Information security incident management—Part 1:Principles of incident managementGB/T 20985.1-20172018-7-1
Information security technology―Requirement and code of conduct for security testing bodies of information technology productsGB/T 35280-20172018-7-1
Information security technology―Public key infrastructure―Technical requirements for digital certificate based reliable electronic signature creation and verificationGB/T 35285-20172018-7-1
Information security technology—Requirements and assessment methods for website identity and system securityGB/T 35284-20172018-7-1
Information security technology―Specification on the job skills of certificate authority employeesGB/T 35288-20172018-7-1
Information security technology—Security capability requirements for big data servicesGB/T 35274-20172018-7-1
Information security technology―Security technical requirements and testing and evaluation approaches for antivirus gateway productsGB/T 35277-20172018-7-1
Information technology―Security techniques―Information security management systems―Overview and vocabularyGB/T 29246-20172018-7-1
Security technical requirement for the read-write equipment ofthe electronic identification of motor vehiclesGB/T 35787-20172018-7-1
Information security technology―Technical requirements for mobile terminal security protectionGB/T 35278-20172018-7-1
Information security technology-Air-interface security test specification for low-rate wireless personal area networksGB/T 35286-20172018-7-1
Information technology―Security techniques―Entity authentication―Part 2:Mechanisms using symmetric encipherment algorithmsGB/T 15843.2-20172018-7-1
Information security techniques—Specification for the structure of desktop core configuration baselineGB/T 35283-20172018-7-1
Information security technology-The assessment method for security capability of cloud computing serviceGB/T 34942-20172018-5-1
Information security technology—Personal information security specificationGB/T 35273-20172018-5-1
中华人民共和国国家质量监督检验检疫总局 中国国家标准化管理委员会GB/T 34095-20172018-2-1
Information security technology―Security technology requirements for wireless local area network(wlan) access system(EAL2+)GB/T 33565-20172017-12-1
Information security technology―Public key cryptographic algorithm SM2 based on elliptic curves―Part 5:Parameter definitionGB/T 32918.5-20172017-12-1
Information security technology―Vulnerabilities classificationGB/T 33561-20172017-12-1
Information security technology―Secure domain name system deployment guideGB/T 33562-20172017-12-1
Information security technology-Guide of implementation for Internet-based e-government information security-Part 2:Access control and secure exchangeGB/Z 24294.2-20172017-12-1
Information security technology―Guide of implementation for Internet-based e-government information security―Part 4:Defense for terminal securityGB/Z 24294.4-20172017-12-1
Information security technology―Security technology requirements for wireless local area network(wlan) client(EAL2+)GB/T 33563-20172017-12-1
Information security technology—Cryptographic application identifier criterion specificationGB/T 33560-20172017-12-1
Information security technology—General requirements for classified protection of cyber security—Part 2:Special security requirements for cloud computingGA/T 1390.2-20172017-5-8
Information security technology—General requirements for classified protection of cyber security—Part 3:Special security requirements for mobile interconnectionGA/T 1390.3-20172017-5-8
Information security technology—General requirements for classified protection of cyber security—Part 5:Special security requirements for industrial control systemGA/T 1390.5-20172017-5-8
Information security technology—Guidelines for grading of classified protection of cyber securityGA/T 1389-20172017-5-8
Information security technology一Specification for IP storage network security based on IPSecGB/T 33131-20162017-5-1
Information security technology―Guide of implementation for information security risk treatmentGB/T 33132-20162017-5-1
Information technology一Security techniques一Requirements for bodies providing audit and certification of information security management systemsGB/T 25067-20162017-5-1
Information security technology - Information security service provider management requirementsGB/T 32914-20162017-3-1
Information security technology - Security architecture of mobile smart terminalGB/T 32927-20162017-3-1
Information security techniques - Elliptic Curve public - key cryptography - Part 1: GeneralGB/T 32918.1-20162017-3-1
Information security - Industrial control systems - Guidelines for the application of security controlsGB/T 32919-20162017-3-1
KeyWord: security requirements; testing and evaluation methods; WEB application firewall;GB/T 32917-20162017-3-1
Information technology - Security techniques - Guidelines for information security control auditorsGB/Z 32916-20162017-3-1
Information security technology SM3 cryptographic hash algorithmGB/T 32905-20162017-3-1
Information security techniques―Security technical requirements for IC card chip with CPUGB/T 22186-20162017-3-1
Information technology - Security techniques - Information security management for inter-sector and inter-organizational communicationsGB/T 32920-20162017-3-1
Information security technology - Baseline and implementation guide of IPSec VPN securing accessGB/T 32922-20162017-3-1
Information security technology - Binary sequence randomness detection methodGB/T 32915-20162017-3-1
Information security technology - Security requirements for embedded software in IC card with CPUGB/T 20276-20162017-3-1
Information technology-Sensor network-Part 601:Information security:General technical specificationsGB/T 30269.601-20162016-8-1
Information security technology―Public key infrastructure―Specification for remote password authentication and key establishmentGB/T 32213-20152016-8-1
Information technology―Security techniques―Information security risk managementGB/T 31722-20152016-2-1
Information security technology―Indicator system of information security assurance and evaluation methods―Part 2:Indicator systemGB/T 31495.2-20152016-1-1
Information security techniques―Public key infrastructure―Digital certificate policies classification and grading specificationGB/T 31508-20152016-1-1
Information security technology―Authentication and authorization―Specification for authorization application programming decision interfaceGB/T 31501-20152016-1-1
Information security technology―Technical requirements and testing and evaluation approaches for unified threat management productsGB/T 31499-20152016-1-1
Information security technology―Indicator system of information security assurance and evaluation methods―Part 3:Implementation guideGB/T 31495.3-20152016-1-1
Information security technology―Indicator system of information security assurance and evaluation methods―Part 1:Concepts and modelGB/T 31495.1-20152016-1-1
Information technology―Security techniques―Information security management―MeasurementGB/T 31497-20152016-1-1
Information security technology—Security technical requirements of network and terminal separation productsGB/T 20279-20152016-1-1
Information technology―Security techniques―Information security management system implementation guidanceGB/T 31496-20152016-1-1
Information technology―Security techniques―Evaluation criteria for IT security―Part 2:Security functional componentsGB/T 18336.2-20152016-1-1
Information security technology―Guide of implementation for information security risk assessmentGB/T 31509-20152016-1-1
Information security technology―General testing guide for security of smart cardGB/T 31507-20152016-1-1
Information security technology�Security protect framework of electronic payment systemGB/T 31502-20152016-1-1
Information security technology―Requirement of data recovery service for storage mediaGB/T 31500-20152016-1-1
Information security technology—Security technical requirements and testing and evaluation approaches for firewallGB/T 20281-20152016-1-1
Information technology―Security techniques―Evaluation criteria for IT security―Part 3:Security assurance componentsGB/T 18336.3-20152016-1-1
Information technology―Security techniques―Evaluation criteria for IT security―Part 1:Introduction and general modelGB/T 18336.1-20152016-1-1
Information security technology—Testing and evaluation approaches of network and terminal separation productsGB/T 20277-20152016-1-1
Information security technology―Security technology guidelines for web portal system of governmentGB/T 31506-20152016-1-1
Information security technology―Encryption and signature message syntax for electronic documentGB/T 31503-20152016-1-1
Information security technology―Technique requirements and testing and evaluation approaches for host-based firewall and personal firewallGB/T 31505-20152016-1-1
Information Security Technology - Security Capability Requirements of Cloud Computing ServicesGB/T 31168-20142015-4-1
Information security technology—Security guide of cloud computing servicesGB/T 31167-20142015-4-1
Information Security Technology - Security Technical Requirements for Network Vulnerability ScannersGB/T 20278-20132014-7-15
Information Security Technology - Guide for the Production of Information System Protect Profile and Information System Security TargetGB/Z 30286-20132014-7-15
Information Technology - Security Technology - Methodology for IT Security EvaluationGB/T 30270-20132014-7-15
Information Security Technology - Chinese Government Desktop Core Configuration SpecificationsGB/T 30278-20132014-7-15
Technical Requirements of Security for Operating System in Smart Mobile Terminal (EAL2)GB/T 30284-20132014-7-15
Information Security Technology - Construction and Sustain Management Specifications of Disaster Recovery CenterGB/T 30285-20132014-7-15
Information Security Technology - Techniques Requirements and Testing and Evaluation Approaches for Anti-spam ProductGB/T 30282-20132014-7-15
Information Security Technology - Public Key Infrastructure - Testing and Evaluation Guide on Standard ConformanceGB/T 30272-20132014-7-15
Information Security Techniques - Public Key Infrastructure - Specification of Testing on Application Interfaces of Electronic Signature CardGB/T 30274-20132014-7-15
Information Security Technology - Authentication and Authorization - Extensible Access Control Markup Language (XACML)GB/T 30281-20132014-7-15
Information Security Technology - Public Key Infrastructures - Certification Authentication Institution Identity Code SpecificationGB/T 30277-20132014-7-15
Information Security Technology - Authentication and Authorization - Geospatial Extensible Access Control Markup LanguageGB/T 30280-20132014-7-15
Information security technology - Technical requirements,testing and evaluation approaches for information system security audit productGB/T 20945-20132014-7-15
Information Security Technology - Assessment Criteria for Information Security Service CapabilityGB/T 30271-20132014-7-15
Information Security Technology - Authentication and Authorization - Authentication Middleware Framework and Interface SpecificationGB/T 30275-20132014-7-15
Information Security Technology - Information Security Service - CategoryGB/T 30283-20132014-7-15
Information Security Technology - Vulnerability Management Criterion SpecificationGB/T 30276-20132014-7-15
Information Security Technology - Technical Requirements and Testing and Evaluation Approaches for Network-based Intrusion Detection SystemGB/T 20275-20132014-7-15
Information Security Technology - Common Methodology for Information Systems Security Assurance EvaluationGB/T 30273-20132014-7-15
Information Security Technology - Vulnerability Classification GuideGB/T 30279-20132014-7-15
Information security technology—Technical requirements and testing and evaluating method for data backup and recovery productsGB/T 29765-20132014-5-1
Information security techniques—Public key infrastructure—Bridge Certification Authority leveled certificate specificationGB/T 29767-20132014-5-1
Information security technology—Technical requirements and testing and evaluating approaches of website data recovery productsGB/T 29766-20132014-5-1
Information Technology - Security Technology - A Framework for IT Security Assurance - Part 3: Analysis of Assurance MethodsGB/Z 29830.3-20132014-2-1
Information security techniques―Functionality and interface specification of cryptographic support platform for trusted computingGB/T 29829-20132014-2-1
Information Technology - Security Technology - A Framework for IT Security Assurance - Part 1: Overview and FrameworkGB/Z 29830.1-20132014-2-1
Information Technology - Security Technology - A Framework for IT Security Assurance - Part 2: Assurance MethodsGB/Z 29830.2-20132014-2-1
Information security technology―Trusted computing specification―Trusted connect architectureGB/T 29828-20132014-2-1
Information Security Technology - Basic Security Requirements for Office Devices GB/T 29244-20122013-6-1
Information security technology—Specifications of delegated certification path construction and delegated validation for digital certificateGB/T 29243-20122013-6-1
Information security technology—Public key infrastructure—PKI interoperability evaluation criteriaGB/T 29241-20122013-6-1
Information security technology—General security technique requirements and testing and evaluation method for terminal computerGB/T 29240-20122013-6-1
Information technology—Security techniques—Information security management systems—Overview and vocabularyGB/T 29246-20122013-6-1
Information security technology—Authentication and authorization—Security assertion markup languageGB/T 29242-20122013-6-1
Information security techniques—Basic requirements of information security for national departmentGB/T 29245-20122013-6-1
Information security technology - Guideline for personal information protection within information system for public and commercial servicesGB/Z 28828-20122013-2-1
Information security technology—Guidelines for information security management system auditingGB/T 28450-20122012-10-1
Information security technology—Common security technique requirement for application software systemGB/T 28452-20122012-10-1
Information technology—Security techniques—IT network security—Part 2:Network security architectureGB/T 25068.2-20122012-10-1
Information security technology—Testing and evaluation process guide for classified protection of information system securityGB/T 28449-20122012-10-1
Information security technology—Technical requirements and testing and evaluation approaches for network-based intrusion prevention system productsGB/T 28451-20122012-10-1
Information security technology—Vulnerability identification and description specificationGB/T 28458-20122012-10-1
Testing specification for applications of SSL protocolGB/T 28457-20122012-10-1
Information security technology—Information system security management assessment requirementsGB/T 28453-20122012-10-1
Information security technology—Specification on the operation management of a certificate authorityGB/T 28447-20122012-10-1
Information technology—Security techniques—Selection,deployment and operations of intrusion detection systemsGB/T 28454-20122012-10-1
Testing specification for applications of IPsec protocolGB/T 28456-20122012-10-1
Information technology—Security techniques—IT network security—Part 1:Network security managementGB/T 25068.1-20122012-10-1
Information security technology—Entity authentication involving a trusted third party and access architecture specificationGB/T 28455-20122012-10-1
and evaluation requirement for classified protection of information systemGB/T 28448-20122012-10-1
Information security technology - Public key infrastructure - Certificate policy and certification practice statement framework GB/T 26855-20112011-11-1
Information security technology—Authentication and authorization—Role-based access control model and management specificationGB/T 25062-20102011-2-1
Information security technology—Public key infrastructure—Electronic signature formats specificationGB/T 25064-20102011-2-1
Information security technology - Public key infrastructure - Security requirements for signature creation applicationsGB/T 25065-20102011-2-1
Information security technology—Implementation guide for classified protection of information systemGB/T 25058-20102011-2-1
Information technology—Security techniques—IT network security—Part 4:Securing remote accessGB/T 25068.4-20102011-2-1
Information security technology—Testing and evaluation requirement for server securityGB/T 25063-20102011-2-1
Information security techniques—Public Key Infrastructure security supporting platform frameworkGB/T 25055-20102011-2-1
Information security techniques—Public Key Infrastructure—Interface specification of X.509 digital certificates applicationGB/T 25060-20102011-2-1
Information technology—Security techniques—IT network security—Part 3:Securing communications between networks using security gatewaysGB/T 25068.3-20102011-2-1
Information security techniques—Specifications of cryptograph and related security technology for certificate authentication systemGB/T 25056-20102011-2-1
Information security techniques—Public key infrastructure—Specification of application interface of electronic signature cardGB/T 25057-20102011-2-1
Information security technology—Type and code of information security productGB/T 25066-20102011-2-1
Information security technology—Public Key Infrastructure—Simple Online Certificate Status ProtocolGB/T 25059-20102011-2-1
Information technology—Security techniques—Requirements for bodies providing audit and certification of information security management systemsGB/T 25067-20102011-2-1
Information security technology—Public Key Infrastructure—XML digital signature syntax and processing specificationGB/T 25061-20102011-2-1
Information security technology—GlossaryGB/T 25069-20102011-2-1
Information technology—Security techniques—IT network security—Part 5:Securing communications across networks using virtual private networksGB/T 25068.5-20102011-2-1
Information security technology. Technical requirements of security design for information system classified protectionGB/T 25070-20102011-2-1
Human resources and social security electronic authentication system - Part 1: Architecture specificationLD/T 30.1-20092010-3-1
Human resources and social security electronic authentication system - Part 2: Technology specification of electronic authentication systemLD/T 30.2-20092010-3-1
Human resources and social security electronic authentication system—Part 4:Management specification of digital certificate applicationLD/T 30.4-20092010-3-1
Human resources and social security electronic authentication system - Part 3: Format specifications of digital certificate and CRLLD/T 30.3-20092010-3-1
Human resources and social security electronic authentication system - Part 5: Specification of digital certificate storage mediumLD/T 30.5-20092010-3-1
Information security technology—Guide of implementation for internet-based E-government information securityGB/Z 24294-20092010-2-1
Information security technology—Specifications of emergency response plan for information securityGB/T 24363-20092009-12-1
Information security technology—Guidelines for information security risk managementGB/Z 24364-20092009-12-1
Information security technology Evaluation framework for information systems security assurance Part 3: Management assuranceGB/T 20274.3-20082008-12-1
Information technology - Security techniques - Non-repudiation - Part 3: Mechanisms using asymmetric techniquesGB/T 17903.3-20082008-12-1
Information security technology Evaluation framework for information systems security assurance Part 4: Engineering assuranceGB/T 20274.4-20082008-12-1
Information technology - Security techniques - Message Authentication Codes(MACs) - Part 1: Mechanisms using a block cipher GB/T 15852.1-20082008-12-1
Information Security techniques Security technical requirements for IC card chip with CPU(EAL4+)GB/T 22186-20082008-12-1
Information security technology - Evaluation framework for information systems security assurance Part 2: Technical assuranceGB/T 20274.2-20082008-12-1
Information technology—Security techniques—Code of practice for information security management GB/T 22081-20082008-11-1
Information technology - Security techniques - Modes of operation for a block cipherGB/T 17964-20082008-11-1
Information technology - Security techniques - Entity authentication - Part 1: GeneralGB/T 15843.1-20082008-11-1
Information technology - Security techniques - Entity authentication - Part 4: Mechanisms using a cryptographic check function GB/T 15843.4-20082008-11-1
Information technology - Security techniques - Evaluation criteria for IT security - Part 2: Security functional requirementsGB/T 18336.2-20082008-11-1
Information technology - Security techniques - Entity authentication - Part 2:Mechanisms using symmetric encipherment algorithmGB/T 15843.2-20082008-11-1
Ionformation secuiryt technology - Baseline for classified protection of information system security GB/T 22239-20082008-11-1
Information technology - Security techniques - Information security management systems - RequirmentsGB/T 22080-20082008-11-1
Information technology - Security techniques - Entity authentication - Part 3: Mechanisms using digital signature techniques GB/T 15843.3-20082008-11-1
Information Technology - Security Techniques - Evaluation criteria for IT security - Part 3: Security assurance requirementsGB/T 18336.3-20082008-11-1
Information technilogy - Security techniques - Non-repudiation - Part 1: GeneralGB/T 17903.1-20082008-11-1
Information technology - Security techniques - Non-repudiation - Part 2: Mechanisms using symmetric techniquesGB/T 17903.2-20082008-11-1
Information security technology—Classification guide for classified protection of information systems securityGB/T 22240-20082008-11-1
Information technology - Security techniques - Evaluation criteria for IT security - Part 1: Introduction and general modelGB/T 18336.1-20082008-11-1
Information security techniques—Public key infrastructure—Evaluation criteria for security classification protection of PKI systemGB/T 21054-20072008-1-1
Information security technology—Physical security technical requirement for information systemGB/T 21052-20072008-1-1
Information security techniques—Public key infrastructure—Technology requirement for security classification protection of PKI systemGB/T 21053-20072008-1-1
Information security techniques—Security requirements for network switch(EAL3)GB/T 21050-20072008-1-1
Information security technology—Technical requirements for router securityGB/T 18018-20072007-12-1
Information security technology—Security techniques requirement for serverGB/T 21028-20072007-12-1
Information security technology-Risk assessment specification for information securityGB/T 20984-20072007-11-1
Information security technoloy—Evaluation criteria for online stock trading information systems security assuranceGB/T 20987-20072007-11-1
Information technology—Security techniques—Information security incident management guideGB/Z 20985-20072007-11-1
Information security technology—Guidelines for the category and classification of information security incidentsGB/Z 20986-20072007-11-1
Information security technology—Evaluation criteria for online banking system information security assuranceGB/T 20983-20072007-11-1
Information security technology—Disaster recovery specifications for information systemsGB/T 20988-20072007-11-1
Information security technolgy—Technical requirments for iris recognition systemGB/T 20979-20072007-11-1
Information security technology - Public key infrastructure - Time stamp specification GB/T 20520-20062007-2-1
Information security technology - Public key infrastructures - Privilege Management Center technical specificationGB/T 20519-20062007-2-1
Information security technology Common security techniques requirement for information system GB/T 20271-20062006-12-1
Information security technology Testing and evaluation techniques of separation components of network and terminal equipmentGB/T 20277-20062006-12-1
Information security technology Technique requirements and testing and evaluation approaches for firewall productsGB/T 20281-20062006-12-1
Information security technology - Evaluation framework for information systems security assurance - Part 1: Introduction and general model GB/T 20274.1-20062006-12-1
Information security technology Information system security management requirementsGB/T 20269-20062006-12-1
Information security technology Security techniques requirements of separation components of network and terminal equipmentGB/T 20279-20062006-12-1
Information security technology Security techniques requirement for database management systemGB/T 20273-20062006-12-1
Information security technology - Testing and evaluation approaches for network vulnerability scanners GB/T 20280-20062006-12-1
Information security technology Security requirements for smartcard embedded software(EAL4+)GB/T 20276-20062006-12-1
Information technology--Systems security engineering--Capability maturity modelGB/T 20261-20062006-7-1
Interface requirements for universal data encryption moduleSJ 20951-20052006-6-1
Information technology - Security techniques - Digital signatures with appendix - Part 3 : Certificate-based mechanismsGB/T 17902.3-20052005-10-1
Informaition technology - Guidelines for the management of IT security - Part 1 : Concepts and models of IT securityGB/T 19715.1-20052005-10-1
Information technology - Guidelines for the management of IT Security - Part 2 : Managing and planning IT securityGB/T 19715.2-20052005-10-1
Information technology - Security techniques - Digital signatures with appendix - Part 2 : Identity-based mechanismsGB/T 17902.2-20052005-10-1
Information technology - Security techniques - Entity authentication - Part5 : Mechanisms using zero knowledge techniquesGB/T 15843.5-20052005-10-1
Information technology - Security techniques - Hash-functions - Part 2: Hash-functions using an n-bit block cipherGB/T 18238.2-20022002-12-1
Information technology - Security techniques - Hash-functions - Part 3: Dedicated hash-functionsGB/T 18238.3-20022002-12-1
Specification requirement for firewall productsYD/T 1132-20012001-11-1
Information technology - Security techniques-Hash-function - Part 1: GeneralGB/T 18238.1-20002001-8-1
Information technology--Security techniques--Modes of operation for an n-bit block cipherGB/T 17964-20002000-8-1
Security technical requirements for proxy serverGB/T 17900-19992000-5-1
Information technology―Security techniques―Entity authentication―Part 1:GeneralGB/T 15843.1-19992000-5-1
Information technology--Security techniques--Non-repudiation--Part 1:GeneralGB/T 17903.1-19992000-5-1
Information technology--Security techniques--Non-repudiation--Part 2:Mechanisms using symmetric techniquesGB/T 17903.2-19992000-5-1
Information technology - Security techniques - Digital signature with appendix - Part 1: GeneralGB/T 17902.1-19992000-5-1
Information technology--Security techniques--Non-repudiation--Part 3:Mechanisms using asymmetric techniquesGB/T 17903.3-19992000-5-1
Information technology--Security techniques--Key management--Part 1:FrameworkGB/T 17901.1-19992000-5-1
Information technology―Security techniques―Entity authentication―Part 4:Mechanisms using a cryptographic check functionGB/T 15843.4-19992000-5-1
Security requirements for routerGB/T 18018-19992000-5-1
Information technology―Security techniques―Entity authentication―Part 3: Mechanisms using asymmetric signature techniquesGB/T 15843.3-19981999-8-1
Information technology―Security techniques―Entity authentication―Part 2: Mechanisms using symmetric encipherment algorithmsGB 15843.2-19971998-4-1
Information technology-Security techniques-Digital signature scheme giving message recoveryGB/T 15851-19951996-8-1
Information technology - Security techniques - Digital signature scheme giving message recoveryGB 15851-19951996-8-1
Information technology-Security techniques-Data integrity mechanism using a cryptographic check function employing a block cipher algorithmGB 15852-19951996-8-1
Information processing-Data encipherment-Physical layer interoperability requirementsGB/T 15278-19941995-8-1
About Us Contact Us Payment
Tel: +86-10-8572 5655 | Fax: +86-10-8581 9515 Email: coc@codeofchina.com | Send me a messageQQ: 672269886
Copyright: Codeofchina Inc 2008-2020