Standard No. |
Title |
Price(USD) |
Delivery |
Status |
Add to Cart |
GB/T 15732-1995 |
General word set for Chinese character keyboard input |
$1350.00 |
via email in 1~3 business day |
valid,,1996-4-1 |
|
GB/T 15775-1995 |
Classification and codes for forestry resources--Injurious tree-insects |
$1845.00 |
via email in 1~3 business day |
abolished2011-12-01 ,2011-12-1,1996-7-1 |
|
GB/T 15775-2011 |
Classification and codes of forest pests |
$2250.00 |
via email in 1~10 business day |
valid,,2011-12-1 |
|
GB/T 15778-1995 |
Classification and codes for forestry resources - Natural reserves |
$220.00 |
via email in 1~3 business day |
valid,,1996-7-1 |
|
GB/T 15843.1-1999 |
Information technology―Security techniques―Entity authentication―Part 1:General |
$150.00 |
via email in 1~3 business day |
abolished2008-11-01,2008-11-1,2000-5-1 |
|
GB/T 15843.1-2017 |
Information technology―Security techniques―Entity authentication―Part 1:General |
$200.00 |
via email in 1~3 business day |
valid,,2018-7-1 |
|
GB/T 15843.2-2008 |
Information technology - Security techniques - Entity authentication - Part 2:Mechanisms using symmetric encipherment algorithm |
$190.00 |
via email in 1~3 business day |
superseded,2018-7-1,2008-11-1 |
|
GB/T 15843.2-2017 |
Information technology―Security techniques―Entity authentication―Part 2:Mechanisms using symmetric encipherment algorithms |
$220.00 |
via email in 1~3 business day |
to be superseded,2025-4-1,2018-7-1 |
|
GB/T 15843.3-1998 |
Information technology―Security techniques―Entity authentication―Part 3: Mechanisms using asymmetric signature techniques |
$120.00 |
via email in 1~3 business day |
superseded,2008-11-1,1999-8-1 |
|
GB/T 15843.3-2008 |
Information technology - Security techniques - Entity authentication - Part 3: Mechanisms using digital signature techniques |
$150.00 |
via email in 1~3 business day |
superseded,2016-11-1,2008-11-1 |
|
GB/T 15843.4-1999 |
Information technology―Security techniques―Entity authentication―Part 4:Mechanisms using a cryptographic check function |
$130.00 |
via email in 1~3 business day |
superseded,2008-11-1,2000-5-1 |
|
GB/T 15843.4-2008 |
Information technology - Security techniques - Entity authentication - Part 4: Mechanisms using a cryptographic check function |
$130.00 |
via email in 1~3 business day |
abolished2024-10-01,2024-10-1,2008-11-1 |
|
GB/T 15843.5-2005 |
Information technology - Security techniques - Entity authentication - Part5 : Mechanisms using zero knowledge techniques |
$260.00 |
via email in 1~3 business day |
valid,,2005-10-1 |
|
GB/T 15843.6-2018 |
Information technology—Security techniques—Entity authentication—Part 6:Mechanisms using manual data transfer |
$480.00 |
via email in 1~5 business day |
valid,,2019-4-1 |
|
GB/T 15851.3-2018 |
Information technology—Security techniques—Digital signature schemes giving message recovery—Part 3:Discrete logarithm based mechanisms |
$690.00 |
via email in 1~5 business day |
valid,,2019-7-1 |
|
GB/T 15852.1-2008 |
Information technology - Security techniques - Message Authentication Codes(MACs) - Part 1: Mechanisms using a block cipher |
$280.00 |
via email in 1~3 business day |
superseded,2021-7-1,2008-12-1 |
|
GB/T 15852.1-2020 |
Information technology—Security techniques—Message authentication codes—Part 1:Mechanisms using a block cipher |
$645.00 |
via email in 1~5 business day |
valid,,2021-7-1 |
|
GB/T 15852.2-2012 |
Information technology—Security techniques—Message Authentication Codes (MACs)—Part 2:Mechanisms using a dedicated hash-function |
$390.00 |
via email in 1~3 business day |
to be abolished2025-04-01,2025-4-1,2013-6-1 |
|
GB/T 15852.3-2019 |
Information technology—Security techniques—Message authentication codes(MACs)—Part 3:Mechanisms using a universal hash-function |
$310.00 |
via email in 1~5 business day |
valid,,2020-3-1 |
|
GB/T 16300-1996 |
Information classification and codes of civil aviation |
$124.00 |
via email in 1~3 business day |
valid,,1996-12-1 |
|
|