Code of China Chinese Standard Classification Professional Classification ICS Classification Latest
LoginRegister
Position: Search valid to be valid superseded to be superseded abolished to be abolished
Standard No. Title Price(USD) Delivery Status Add to Cart
GB/T 15852.3-2019 Information technology—Security techniques—Message authentication codes(MACs)—Part 3:Mechanisms using a universal hash-function $310.00 via email in 1~5 business day valid
GB/T 17900-1999 Security technical requirements for proxy server $300.00 via email in 1~3 business day valid
GB/T 17901.1-1999 Information technology--Security techniques--Key management--Part 1:Framework $330.00 via email in 1~3 business day superseded
GB/T 17901.1-2020 Information technology—Security techniques—Key management—Part 1: Framework $400.00 via email in 1~5 business day valid
GB/T 17902.1-1999 Information technology - Security techniques - Digital signature with appendix - Part 1: General $220.00 via email in 1~3 business day superseded
GB/T 17902.1-2023 Information technology―Security techniques―Digital signatures with appendix―Part 1:General $225.00 via email in 1~3 business day valid
GB/T 17902.2-2005 Information technology - Security techniques - Digital signatures with appendix - Part 2 : Identity-based mechanisms $150.00 via email in 1~3 business day valid
GB/T 17902.3-2005 Information technology - Security techniques - Digital signatures with appendix - Part 3 : Certificate-based mechanisms $300.00 via email in 1~3 business day valid
GB/T 17903.1-1999 Information technology--Security techniques--Non-repudiation--Part 1:General $240.00 via email in 1~3 business day superseded
GB/T 17903.1-2008 Information technilogy - Security techniques - Non-repudiation - Part 1: General $280.00 via email in 1~5 business day abolished
GB/T 17903.1-2024 Information technology—Security techniques—Non-repudiation—Part 1: General $375.00 via email in 1~5 business day superseded
GB/T 17903.2-1999 Information technology--Security techniques--Non-repudiation--Part 2:Mechanisms using symmetric techniques $240.00 via email in 1~3 business day superseded
GB/T 17903.2-2008 Information technology - Security techniques - Non-repudiation - Part 2: Mechanisms using symmetric techniques $230.00 via email in 1~3 business day superseded
GB/T 17903.2-2021 Information technology—Security techniques—Non-repudiation—Part 2:Mechanisms using symmetric techniques $285.00 via email in 1~3 business day valid
GB/T 17903.3-1999 Information technology--Security techniques--Non-repudiation--Part 3:Mechanisms using asymmetric techniques $160.00 via email in 1~3 business day superseded
GB/T 17903.3-2008 Information technology - Security techniques - Non-repudiation - Part 3: Mechanisms using asymmetric techniques $140.00 via email in 1~3 business day abolished
GB/T 17903.3-2024 Information technology—Security techniques—Non-repudiation—Part 3: Mechanisms using asymmetric techniques $255.00 via email in 1~3 business day valid
GB/T 17964-2000 Information technology--Security techniques--Modes of operation for an n-bit block cipher $220.00 via email in 1~3 business day superseded
GB/T 17964-2008 Information technology - Security techniques - Modes of operation for a block cipher $140.00 immediately superseded
GB/T 18018-1999 Security requirements for router $250.00 via email in 1~3 business day superseded
* Related standard quantity: * Page quantity: * Current: * First Previous [1][2][3][4][5][6][7][8][9][10][11] Next End



About Us   |    Contact Us   |    Terms of Service   |    Privacy   |    Cancellation & Refund Policy   |    Payment
Tel: +86-10-8572 5655 | Fax: +86-10-8581 9515 | Email: coc@codeofchina.com | QQ: 672269886
Copyright: TransForyou Co., Ltd. 2008-2040