2025-12-20 216.73.216.41
Code of China Chinese Standard Classification Professional Classification ICS Classification Latest
Position: Search valid to be valid superseded to be superseded abolished to be abolished
Standard No. Title Price(USD) Delivery Status Add to Cart
GB/T 28456-2012 Testing specification for applications of IPsec protocol 1260.0 via email in 1~3 business day valid,,2012-10-1
GB/T 31507-2015 Information security technology―General testing guide for security of smart card 670.0 via email in 1~5 business day valid,,2016-1-1
GB/T 17902.3-2005 Information technology - Security techniques - Digital signatures with appendix - Part 3 : Certificate-based mechanisms 300.0 via email in 1~3 business day valid,,2005-10-1
GM/T 0043-2015 Test specification for digital certificate interoperability 220.0 via email in 1~3 business day superseded2025-07-01,2024-12-27,2015-4-1
GB/T 34942-2017 Information security technology-The assessment method for security capability of cloud computing service 1725.0 via email in 1~5 business day to be superseded,2026-2-1,2018-5-1
GB/T 25068.5-2010 Information technology—Security techniques—IT network security—Part 5:Securing communications across networks using virtual private networks 250.0 via email in 1~3 business day superseded,2021-10-1,2011-2-1
GA/T 1390.2-2017 Information security technology—General requirements for classified protection of cyber security—Part 2:Special security requirements for cloud computing 490.0 via email in 1~5 business day valid,,2017-5-8
GB/T 31497-2015 Information technology―Security techniques―Information security management―Measurement 750.0 via email in 1~5 business day superseded,2024-10-1,2016-1-1
GB/T 30284-2013 Technical Requirements of Security for Operating System in Smart Mobile Terminal (EAL2) 660.0 via email in 1~3 business day superseded,2020-11-1,2014-7-15
GB/T 20519-2006 Information security technology - Public key infrastructures - Privilege Management Center technical specification 420.0 via email in 1~5 business day abolished2017-12-15,,2007-2-1
GB 15843.2-1997 Information technology―Security techniques―Entity authentication―Part 2: Mechanisms using symmetric encipherment algorithms 160.0 via email in 1~3 business day superseded2008-11-01,2008-11-1,1998-4-1
GB/T 35291-2017 Information security technology―Cryptography token application interface specification 690.0 via email in 1~5 business day valid,,2018-7-1
GB/T 30269.601-2016 Information technology-Sensor network-Part 601:Information security:General technical specifications 640.0 via email in 1~5 business day valid,,2016-8-1
GB/T 33562-2017 Information security technology―Secure domain name system deployment guide 250.0 via email in 1~3 business day valid,,2017-12-1
GB/T 29246-2012 Information technology—Security techniques—Information security management systems—Overview and vocabulary 330.0 via email in 1~3 business day superseded,2018-7-1,2013-6-1
GB/T 30282-2013 Information Security Technology - Techniques Requirements and Testing and Evaluation Approaches for Anti-spam Product 330.0 via email in 1~3 business day superseded,2023-12-1,2014-7-15
GB/Z 29830.1-2013 Information Technology - Security Technology - A Framework for IT Security Assurance - Part 1: Overview and Framework 330.0 via email in 1~3 business day valid,,2014-2-1
GB/T 32915-2016 Information security technology - Binary sequence randomness detection method 140.0 via email in 1~5 business day valid,,2017-3-1
GB/T 18238.1-2000 Information technology - Security techniques-Hash-function - Part 1: General 135.0 via email in 1~3 business day superseded2025-04-01,2025-4-1,2001-8-1
Previous Page     Next Page



Code of China
Search

GB/T 28456-2012 Testing specification for applications of IPsec protocol 
  Issued on: 2012-6-29   Price(USD): 1260.0
GB/T 31507-2015 Information security technology―General testing guide for security of smart card 
  Issued on: 2015-05-15   Price(USD): 670.0
GB/T 17902.3-2005 Information technology - Security techniques - Digital signatures with appendix - Part 3 : Certificate-based mechanisms 
  Issued on: 2005-4-19   Price(USD): 300.0
GM/T 0043-2015 Test specification for digital certificate interoperability 
  Issued on: 2025-07-01   Price(USD): 220.0
GB/T 34942-2017 Information security technology-The assessment method for security capability of cloud computing service 
  Issued on: 2017-11-01   Price(USD): 1725.0
GB/T 25068.5-2010 Information technology—Security techniques—IT network security—Part 5:Securing communications across networks using virtual private networks 
  Issued on: 2010-9-2   Price(USD): 250.0
GA/T 1390.2-2017 Information security technology—General requirements for classified protection of cyber security—Part 2:Special security requirements for cloud computing 
  Issued on: 2017-05-08   Price(USD): 490.0
GB/T 31497-2015 Information technology―Security techniques―Information security management―Measurement 
  Issued on: 2015-05-15   Price(USD): 750.0
GB/T 30284-2013 Technical Requirements of Security for Operating System in Smart Mobile Terminal (EAL2) 
  Issued on: 2013-12-31   Price(USD): 660.0
GB/T 20519-2006 Information security technology - Public key infrastructures - Privilege Management Center technical specification 
  Issued on: 2006-08-30   Price(USD): 420.0
GB 15843.2-1997 Information technology―Security techniques―Entity authentication―Part 2: Mechanisms using symmetric encipherment algorithms 
  Issued on: 1997-09-02   Price(USD): 160.0
GB/T 35291-2017 Information security technology―Cryptography token application interface specification 
  Issued on:   Price(USD): 690.0
GB/T 30269.601-2016 Information technology-Sensor network-Part 601:Information security:General technical specifications 
  Issued on: 2016-04-25   Price(USD): 640.0
GB/T 33562-2017 Information security technology―Secure domain name system deployment guide 
  Issued on: 2017-05-12   Price(USD): 250.0
GB/T 29246-2012 Information technology—Security techniques—Information security management systems—Overview and vocabulary 
  Issued on: 2012-12-31   Price(USD): 330.0
GB/T 30282-2013 Information Security Technology - Techniques Requirements and Testing and Evaluation Approaches for Anti-spam Product 
  Issued on: 2013-12-31   Price(USD): 330.0
GB/Z 29830.1-2013 Information Technology - Security Technology - A Framework for IT Security Assurance - Part 1: Overview and Framework 
  Issued on: 2013-11-12   Price(USD): 330.0
GB/T 32915-2016 Information security technology - Binary sequence randomness detection method 
  Issued on: 2016-08-29   Price(USD): 140.0
GB/T 18238.1-2000 Information technology - Security techniques-Hash-function - Part 1: General 
  Issued on: 2000-10-17   Price(USD): 135.0
About Us   |    Contact Us   |    Terms of Service   |    Privacy   |    Cancellation & Refund Policy   |    Payment
Tel: +86-10-8572 5655 | Fax: +86-10-8581 9515 | Email: coc@codeofchina.com | QQ: 672269886
Copyright: Beijing COC Tech Co., Ltd. 2008-2040