2025-12-19 216.73.216.41
Code of China Chinese Standard Classification Professional Classification ICS Classification Latest
Position: Search valid to be valid superseded to be superseded abolished to be abolished
Standard No. Title Price(USD) Delivery Status Add to Cart
GB/T 22239-2008 Information security technology - Baseline for classified protection of information system security 140.0 via email in 1 business day superseded2019-12-01,2019-12-1,2008-11-1
GB/T 33131-2016 Information security technology一Specification for IP storage network security based on IPSec 220.0 via email in 1~3 business day valid,,2017-5-1
GM/T 0028-2014 Security Requirements for Cryptographic Modules 360.0 via email in 1 business day superseded2025-07-01,2024-12-27,2014-2-13
GB/Z 24294-2009 Information security technology—Guide of implementation for internet-based E-government information security 510.0 via email in 1~3 business day superseded,2017-12-1,2010-2-1
GM/T 0003.3-2012 Public Key Cryptographic Algorithm SM2 Based on Elliptic Curves - Part 3: Key Exchange Protocol 140.0 via email in 1 business day valid,,2012-3-21
GB/T 20277-2006 Information security technology Testing and evaluation techniques of separation components of network and terminal equipment 1020.0 via email in 1~5 business day superseded2016-01-01,2016-1-1,2006-12-1
GB/T 30279-2013 Information Security Technology - Vulnerability Classification Guide 180.0 via email in 1~3 business day superseded,2021-6-1,2014-7-15
GB/T 15843.2-2008 Information technology - Security techniques - Entity authentication - Part 2:Mechanisms using symmetric encipherment algorithm 190.0 via email in 1~3 business day superseded,2018-7-1,2008-11-1
GM/T 0009-2012 SM2 Cryptography Algorithm Application Specification 80.0 via email in 1 business day superseded,2024-6-1,2012-11-22
GB/T 15851-1995 Information technology-Security techniques-Digital signature scheme giving message recovery 285.0 via email in 1~3 business day superseded,2019-7-1,1996-8-1
GB/T 17903.1-1999 Information technology--Security techniques--Non-repudiation--Part 1:General 240.0 via email in 1~3 business day superseded,2008-11-1,2000-5-1
GB/T 17964-2000 Information technology--Security techniques--Modes of operation for an n-bit block cipher 220.0 via email in 1~3 business day superseded,2008-11-1,2000-8-1
GM/T 0001.3-2012 ZUC stream cipher algorithm--Part 3: The ZUC-based integrity algorithm 140.0 via email in 1 business day valid,,2012-3-21
GB/T 20984-2007 Information security technology-Risk assessment specification for information security 220.0 via email in 1~3 business day superseded,2022-11-1,2007-11-1
GM/T 0003.2-2012 Public Key Cryptographic Algorithm SM2 Baded on Elliptic Curves - Part 2: Digital Signature Algorithm 140.0 via email in 1 business day valid,,2012-3-21
GB/T 35101-2017 Information security technology-Smart card reader security technology requirements ( EAL4+) 550.0 via email in 1~5 business day valid,,2018-5-1
GB/T 17903.3-1999 Information technology--Security techniques--Non-repudiation--Part 3:Mechanisms using asymmetric techniques 160.0 via email in 1~3 business day superseded,2008-12-1,2000-5-1
GB/T 35277-2017 Information security technology―Security technical requirements and testing and evaluation approaches for antivirus gateway products 610.0 via email in 1~5 business day valid,,2018-7-1
GB/T 25069-2010 Information security technology—Glossary 1080.0 via email in 1~3 business day superseded,2022-10-1,2011-2-1
GM/T 0018-2012 Interface specifications of cryptography device application 170.0 via email in 1 business day superseded,2024-6-1,2012-11-22
Previous Page     Next Page



Code of China
Search

GB/T 22239-2008 Information security technology - Baseline for classified protection of information system security  
  Issued on: 2008-6-19   Price(USD): 140.0
GB/T 33131-2016 Information security technology一Specification for IP storage network security based on IPSec 
  Issued on: 2016-10-13   Price(USD): 220.0
GM/T 0028-2014 Security Requirements for Cryptographic Modules 
  Issued on: 2025-07-01   Price(USD): 360.0
GB/Z 24294-2009 Information security technology—Guide of implementation for internet-based E-government information security 
  Issued on: 2009-7-30   Price(USD): 510.0
GM/T 0003.3-2012 Public Key Cryptographic Algorithm SM2 Based on Elliptic Curves - Part 3: Key Exchange Protocol 
  Issued on: 2012-03-21   Price(USD): 140.0
GB/T 20277-2006 Information security technology Testing and evaluation techniques of separation components of network and terminal equipment 
  Issued on: 2006-05-31   Price(USD): 1020.0
GB/T 30279-2013 Information Security Technology - Vulnerability Classification Guide 
  Issued on: 2013-12-31   Price(USD): 180.0
GB/T 15843.2-2008 Information technology - Security techniques - Entity authentication - Part 2:Mechanisms using symmetric encipherment algorithm 
  Issued on: 2008-06-19   Price(USD): 190.0
GM/T 0009-2012 SM2 Cryptography Algorithm Application Specification 
  Issued on: 2012-11-22   Price(USD): 80.0
GB/T 15851-1995 Information technology-Security techniques-Digital signature scheme giving message recovery 
  Issued on: 1995-01-02   Price(USD): 285.0
GB/T 17903.1-1999 Information technology--Security techniques--Non-repudiation--Part 1:General 
  Issued on: 1999-01-01   Price(USD): 240.0
GB/T 17964-2000 Information technology--Security techniques--Modes of operation for an n-bit block cipher 
  Issued on: 2000-01-03   Price(USD): 220.0
GM/T 0001.3-2012 ZUC stream cipher algorithm--Part 3: The ZUC-based integrity algorithm 
  Issued on: 2012-03-21   Price(USD): 140.0
GB/T 20984-2007 Information security technology-Risk assessment specification for information security 
  Issued on: 2007-7-30   Price(USD): 220.0
GM/T 0003.2-2012 Public Key Cryptographic Algorithm SM2 Baded on Elliptic Curves - Part 2: Digital Signature Algorithm 
  Issued on: 2012-03-21   Price(USD): 140.0
GB/T 35101-2017 Information security technology-Smart card reader security technology requirements ( EAL4+) 
  Issued on: 2017-11-01   Price(USD): 550.0
GB/T 17903.3-1999 Information technology--Security techniques--Non-repudiation--Part 3:Mechanisms using asymmetric techniques 
  Issued on: 1999-01-01   Price(USD): 160.0
GB/T 35277-2017 Information security technology―Security technical requirements and testing and evaluation approaches for antivirus gateway products 
  Issued on: 2017-12-29   Price(USD): 610.0
GB/T 25069-2010 Information security technology—Glossary 
  Issued on: 2010-9-2   Price(USD): 1080.0
GM/T 0018-2012 Interface specifications of cryptography device application 
  Issued on: 2012-11-22   Price(USD): 170.0
About Us   |    Contact Us   |    Terms of Service   |    Privacy   |    Cancellation & Refund Policy   |    Payment
Tel: +86-10-8572 5655 | Fax: +86-10-8581 9515 | Email: coc@codeofchina.com | QQ: 672269886
Copyright: Beijing COC Tech Co., Ltd. 2008-2040