![]() |
Chinese Standard Classification
Professional Classification
ICS Classification
Latest
|
| Position: Search | valid to be valid superseded to be superseded abolished to be abolished |
| Search |
|
GB/T 22239-2008 Information security technology - Baseline for classified protection of information system security
Issued on: 2008-6-19 Price(USD): 140.0 |
|
GB/T 33131-2016 Information security technology一Specification for IP storage network security based on IPSec
Issued on: 2016-10-13 Price(USD): 220.0 |
|
GM/T 0028-2014 Security Requirements for Cryptographic Modules
Issued on: 2025-07-01 Price(USD): 360.0 |
|
GB/Z 24294-2009 Information security technology—Guide of implementation for internet-based E-government information security
Issued on: 2009-7-30 Price(USD): 510.0 |
|
GM/T 0003.3-2012 Public Key Cryptographic Algorithm SM2 Based on Elliptic Curves - Part 3: Key Exchange Protocol
Issued on: 2012-03-21 Price(USD): 140.0 |
|
GB/T 20277-2006 Information security technology Testing and evaluation techniques of separation components of network and terminal equipment
Issued on: 2006-05-31 Price(USD): 1020.0 |
|
GB/T 30279-2013 Information Security Technology - Vulnerability Classification Guide
Issued on: 2013-12-31 Price(USD): 180.0 |
|
GB/T 15843.2-2008 Information technology - Security techniques - Entity authentication - Part 2:Mechanisms using symmetric encipherment algorithm
Issued on: 2008-06-19 Price(USD): 190.0 |
|
GM/T 0009-2012 SM2 Cryptography Algorithm Application Specification
Issued on: 2012-11-22 Price(USD): 80.0 |
|
GB/T 15851-1995 Information technology-Security techniques-Digital signature scheme giving message recovery
Issued on: 1995-01-02 Price(USD): 285.0 |
|
GB/T 17903.1-1999 Information technology--Security techniques--Non-repudiation--Part 1:General
Issued on: 1999-01-01 Price(USD): 240.0 |
|
GB/T 17964-2000 Information technology--Security techniques--Modes of operation for an n-bit block cipher
Issued on: 2000-01-03 Price(USD): 220.0 |
|
GM/T 0001.3-2012 ZUC stream cipher algorithm--Part 3: The ZUC-based integrity algorithm
Issued on: 2012-03-21 Price(USD): 140.0 |
|
GB/T 20984-2007 Information security technology-Risk assessment specification for information security
Issued on: 2007-7-30 Price(USD): 220.0 |
|
GM/T 0003.2-2012 Public Key Cryptographic Algorithm SM2 Baded on Elliptic Curves - Part 2: Digital Signature Algorithm
Issued on: 2012-03-21 Price(USD): 140.0 |
|
GB/T 35101-2017 Information security technology-Smart card reader security technology requirements ( EAL4+)
Issued on: 2017-11-01 Price(USD): 550.0 |
|
GB/T 17903.3-1999 Information technology--Security techniques--Non-repudiation--Part 3:Mechanisms using asymmetric techniques
Issued on: 1999-01-01 Price(USD): 160.0 |
|
GB/T 35277-2017 Information security technology―Security technical requirements and testing and evaluation approaches for antivirus gateway products
Issued on: 2017-12-29 Price(USD): 610.0 |
|
GB/T 25069-2010 Information security technology—Glossary
Issued on: 2010-9-2 Price(USD): 1080.0 |
|
GM/T 0018-2012 Interface specifications of cryptography device application
Issued on: 2012-11-22 Price(USD): 170.0 |
| Tel: +86-10-8572 5655 | Fax: +86-10-8581 9515 | Email: coc@codeofchina.com | QQ: 672269886 | ||
| Copyright: Beijing COC Tech Co., Ltd. 2008-2040 | ||