Standard No. |
Title |
Price(USD) |
Delivery |
Status |
Add to Cart |
GB/T 15852.3-2019 |
Information technology—Security techniques—Message authentication codes(MACs)—Part 3:Mechanisms using a universal hash-function |
$310.00 |
via email in 1~5 business day |
valid,,2020-3-1 |
|
GB/T 17900-1999 |
Security technical requirements for proxy server |
$300.00 |
via email in 1~3 business day |
valid,,2000-5-1 |
|
GB/T 17901.1-1999 |
Information technology--Security techniques--Key management--Part 1:Framework |
$330.00 |
via email in 1~3 business day |
superseded,2020-10-1,2000-5-1 |
|
GB/T 17901.1-2020 |
Information technology—Security techniques—Key management—Part 1: Framework |
$400.00 |
via email in 1~5 business day |
valid,,2020-10-1 |
|
GB/T 17902.1-1999 |
Information technology - Security techniques - Digital signature with appendix - Part 1: General |
$220.00 |
via email in 1~3 business day |
superseded,2023-10-1,2000-5-1 |
|
GB/T 17902.1-2023 |
Information technology―Security techniques―Digital signatures with appendix―Part 1:General |
$225.00 |
via email in 1~3 business day |
valid,,2023-10-1 |
|
GB/T 17902.2-2005 |
Information technology - Security techniques - Digital signatures with appendix - Part 2 : Identity-based mechanisms |
$150.00 |
via email in 1~3 business day |
valid,,2005-10-1 |
|
GB/T 17902.3-2005 |
Information technology - Security techniques - Digital signatures with appendix - Part 3 : Certificate-based mechanisms |
$300.00 |
via email in 1~3 business day |
valid,,2005-10-1 |
|
GB/T 17903.1-1999 |
Information technology--Security techniques--Non-repudiation--Part 1:General |
$240.00 |
via email in 1~3 business day |
superseded,2008-11-1,2000-5-1 |
|
GB/T 17903.1-2008 |
Information technilogy - Security techniques - Non-repudiation - Part 1: General |
$280.00 |
via email in 1~5 business day |
abolished2024-10-01,2024-10-1,2008-11-1 |
|
GB/T 17903.1-2024 |
Information technology—Security techniques—Non-repudiation—Part 1: General |
$375.00 |
via email in 1~5 business day |
superseded,2008-11-1,2024-10-1 |
|
GB/T 17903.2-1999 |
Information technology--Security techniques--Non-repudiation--Part 2:Mechanisms using symmetric techniques |
$240.00 |
via email in 1~3 business day |
superseded,2008-11-1,2000-5-1 |
|
GB/T 17903.2-2008 |
Information technology - Security techniques - Non-repudiation - Part 2: Mechanisms using symmetric techniques |
$230.00 |
via email in 1~3 business day |
superseded,2022-5-1,2008-11-1 |
|
GB/T 17903.2-2021 |
Information technology—Security techniques—Non-repudiation—Part 2:Mechanisms using symmetric techniques |
$285.00 |
via email in 1~3 business day |
valid,,2022-5-1 |
|
GB/T 17903.3-1999 |
Information technology--Security techniques--Non-repudiation--Part 3:Mechanisms using asymmetric techniques |
$160.00 |
via email in 1~3 business day |
superseded,2008-12-1,2000-5-1 |
|
GB/T 17903.3-2008 |
Information technology - Security techniques - Non-repudiation - Part 3: Mechanisms using asymmetric techniques |
$140.00 |
via email in 1~3 business day |
abolished2024-10-01,2024-10-1,2008-12-1 |
|
GB/T 17903.3-2024 |
Information technology—Security techniques—Non-repudiation—Part 3: Mechanisms using asymmetric techniques |
$255.00 |
via email in 1~3 business day |
valid,,2024-10-1 |
|
GB/T 17964-2000 |
Information technology--Security techniques--Modes of operation for an n-bit block cipher |
$220.00 |
via email in 1~3 business day |
superseded,2008-11-1,2000-8-1 |
|
GB/T 17964-2008 |
Information technology - Security techniques - Modes of operation for a block cipher |
$140.00 |
immediately |
superseded,2022-5-1,2008-11-1 |
|
GB/T 18018-1999 |
Security requirements for router |
$250.00 |
via email in 1~3 business day |
superseded,2007-12-1,2000-5-1 |
|
* Related standard quantity: * Page quantity: *
Current: * First
Previous
[1][2][3][4][5][6][7][8][9][10][11]
Next
End
* Related standard quantity: * Page quantity: *
Current: * First
Previous
[1][2][3][4][5][6][7][8][9][10][11]
Next
End
|