Standard No. |
Title |
Price(USD) |
Delivery |
Status |
Add to Cart |
GB/T 17964-2000 |
Information technology--Security techniques--Modes of operation for an n-bit block cipher |
$220.00 |
via email in 1~3 business day |
superseded,2008-11-1,2000-8-1 |
|
GB/T 17964-2008 |
Information technology - Security techniques - Modes of operation for a block cipher |
$140.00 |
immediately |
superseded,2022-5-1,2008-11-1 |
|
GB/T 18018-1999 |
Security requirements for router |
$250.00 |
via email in 1~3 business day |
superseded,2007-12-1,2000-5-1 |
|
GB/T 18018-2007 |
Information security technology—Technical requirements for router security |
$240.00 |
via email in 1~3 business day |
superseded,2020-3-1,2007-12-1 |
|
GB/T 18018-2019 |
Information security technology—Technical requirement for router security |
$250.00 |
via email in 1~3 business day |
valid,,2020-3-1 |
|
GB/T 18238.1-2000 |
Information technology - Security techniques-Hash-function - Part 1: General |
$135.00 |
via email in 1~3 business day |
abolished2025-04-01,2025-4-1,2001-8-1 |
|
GB/T 18238.1-2024 |
Cybersecurity technology—Hash-functions—Part 1: General |
$270.00 |
via email in 1~3 business day |
valid,,2025-4-1 |
|
GB/T 18238.2-2002 |
Information technology - Security techniques - Hash-functions - Part 2: Hash-functions using an n-bit block cipher |
$250.00 |
via email in 1~3 business day |
abolished2025-04-01,2025-4-1,2002-12-1 |
|
GB/T 18238.2-2024 |
Cybersecurity technology—Hash-functions—Part 2: Hash-functions using a block cipher |
$435.00 |
via email in 1~5 business day |
valid,,2025-4-1 |
|
GB/T 18238.3-2002 |
Information technology - Security techniques - Hash-functions - Part 3: Dedicated hash-functions |
$600.00 |
via email in 1~3 business day |
abolished2025-04-01,2025-4-1,2002-12-1 |
|
GB/T 18238.3-2024 |
Cybersecurity technology—Hash-functions—Part 3: Dedicated hash-functions |
$190.00 |
via email in 1~3 business day |
valid,,2025-4-1 |
|
GB/T 18336.1-2008 |
Information technology - Security techniques - Evaluation criteria for IT security - Part 1: Introduction and general model |
$550.00 |
via email in 1~5 business day |
superseded,2016-1-1,2008-11-1 |
|
GB/T 18336.1-2015 |
Information technology―Security techniques―Evaluation criteria for IT security―Part 1:Introduction and general model |
$140.00 |
via email in 1~5 business day |
superseded,2024-11-1,2016-1-1 |
|
GB/T 18336.1-2024 |
Cybersecurity technology—Evaluation criteria for IT security—Part 1: Introduction and general model |
$1950.00 |
via email in 1~3 business day |
valid,,2024-11-1 |
|
GB/T 18336.2-2008 |
Information technology - Security techniques - Evaluation criteria for IT security - Part 2: Security functional requirements |
$2475.00 |
via email in 1~5 business day |
superseded,2016-1-1,2008-11-1 |
|
GB/T 18336.2-2015 |
Information technology―Security techniques―Evaluation criteria for IT security―Part 2:Security functional components |
$490.00 |
via email in 1~5 business day |
superseded,2024-11-1,2016-1-1 |
|
GB/T 18336.2-2024 |
Cybersecurity technology—Evaluation criteria for IT security—Part 2: Security functional components |
$3945.00 |
via email in 1~3 business day |
valid,,2024-11-1 |
|
GB/T 18336.3-2008 |
Information Technology - Security Techniques - Evaluation criteria for IT security - Part 3: Security assurance requirements |
$1510.00 |
via email in 1~5 business day |
superseded,2016-1-1,2008-11-1 |
|
GB/T 18336.3-2015 |
Information technology―Security techniques―Evaluation criteria for IT security―Part 3:Security assurance components |
$490.00 |
via email in 1~5 business day |
superseded,2024-11-1,2016-1-1 |
|
GB/T 18336.3-2024 |
Cybersecurity technology—Evaluation criteria for IT security—Part 3: Security assurance components |
$2475.00 |
via email in 1~5 business day |
valid,,2024-11-1 |
|
* Related standard quantity: * Page quantity: *
Current: * First
Previous
[1][2][3][4][5][6][7][8][9][10][11]
Next
End
* Related standard quantity: * Page quantity: *
Current: * First
Previous
[1][2][3][4][5][6][7][8][9][10][11]
Next
End
|