Code of China Chinese Standard Classification Professional Classification ICS Classification Latest
LoginRegister
Position: Search valid to be valid superseded to be superseded abolished to be abolished
Standard No. Title Price(USD) Delivery Status Add to Cart
GB/T 25064-2010 Information security technology—Public key infrastructure—Electronic signature formats specification 600.0 via email in 1~3 business day valid
GB/T 18336.2-2008 Information technology - Security techniques - Evaluation criteria for IT security - Part 2: Security functional requirements 2475.0 via email in 1~10 business day superseded
GB/T 17902.3-2005 Information technology - Security techniques - Digital signatures with appendix - Part 3 : Certificate-based mechanisms 300.0 via email in 1~3 business day valid
GB/T 29829-2013 Information security techniques―Functionality and interface specification of cryptographic support platform for trusted computing 1935.0 via email in 1~10 business day valid
GB/Z 28828-2012 Information security technology - Guideline for personal information protection within information system for public and commercial services 60.0 via email in 1 business day valid
GB/T 22240-2008 Information security technology—Classification guide for classified protection of information systems security 210.0 via email in 1~3 business day valid
GB/T 30283-2013 Information Security Technology - Information Security Service - Category 270.0 via email in 1~3 business day valid
GB/T 28451-2012 Information security technology—Technical requirements and testing and evaluation approaches for network-based intrusion prevention system products 870.0 via email in 1~3 business day valid
GB 15843.2-1997 Information technology―Security techniques―Entity authentication―Part 2: Mechanisms using symmetric encipherment algorithms 165.0 via email in 1~3 business day abolished
GB/T 25066-2010 Information security technology—Type and code of information security product 270.0 via email in 1~3 business day valid
LD/T 30.5-2009 Human resources and social security electronic authentication system - Part 5: Specification of digital certificate storage medium 480.0 via email in 1~3 business day valid
GB/T 15843.1-2008 Information technology - Security techniques - Entity authentication - Part 1: General 210.0 via email in 1~3 business day valid
GB/T 20520-2006 Information security technology - Public key infrastructure - Time stamp specification 240.0 via email in 1~3 business day valid
GB/T 31497-2015 Information technology―Security techniques―Information security management―Measurement 750.0 via email in 1~8 business day valid
GB/T 18336.3-2008 Information Technology - Security Techniques - Evaluation criteria for IT security - Part 3: Security assurance requirements 1515.0 via email in 1~10 business day superseded
GB/T 18238.3-2002 Information technology - Security techniques - Hash-functions - Part 3: Dedicated hash-functions 600.0 via email in 1~3 business day valid
GB/T 20274.3-2008 Information security technology Evaluation framework for information systems security assurance Part 3: Management assurance 600.0 via email in 1 business day valid
GB/T 21052-2007 Information security technology—Physical security technical requirement for information system 570.0 via email in 1~3 business day valid
GB/T 18018-2007 Information security technology—Technical requirements for router security 240.0 via email in 1~3 business day valid
GB/T 20979-2007 Information security technolgy—Technical requirments for iris recognition system 390.0 via email in 1~3 business day valid
About Us | Contact Us | Payment
Tel: +86-10-8572 5655 | Fax: +86-10-8581 9515 | Email: coc@codeofchina.com | Send me a messageQQ: 672269886
Copyright: Codeofchina Inc 2008-2020