We need your consent to use the individual data so that you can see information about your interests, among other things. Click "OK" to give your consent.
ISO (International Organization for Standardization) is the world’s largest producer of optional international standards. International standards determine current specifications of products, services and certified methods, helping to streamline the industry. As they are created on the basis of international agreement, they assist in overcoming barriers in international trade.
Information processing — Character structure for start/stop and synchronous character oriented transmission
(Traitement de l´information — Structure des caracteres pour la transmission arythmique et synchrone orientée caractere)
Standard published on 25.7.1985
Selected format:Information technology - Security techniques - Key management - Part 1: Framework
Standard published on 22.11.2010
Selected format:IT Security techniques - Key management - Part 2: Mechanisms using symmetric techniques
Standard published on 28.9.2018
Selected format:Information security - Key management - Part 3: Mechanisms using asymmetric techniques
Standard published on 22.10.2021
Selected format:
Information security - Key management - Part 3: Mechanisms using asymmetric techniques - Amendment 1: TFNS identity-based key agreement
(Securite de l´information - Gestion de cles - Partie 3: Mecanismes utilisant des techniques asymetriques - Amendement 1: Accord de cle basee sur l´identite TFNS)
Change published on 28.4.2025
Selected format:Information technology - Security techniques - Key management - Part 4: Mechanisms based on weak secrets
Standard published on 17.11.2017
Selected format:Information technology - Security techniques - Key management - Part 4: Mechanisms based on weak secrets - Amendment 1: Unbalanced Password-Authenticated Key Agreement with Identity-Based Cryptosystems (UPAKA-IBC)
Change published on 6.9.2019
Selected format:Information technology - Security techniques - Key management - Part 4: Mechanisms based on weak secrets - Amendment 2: Leakage-resilient password-authenticated key agreement with additional stored secrets
Change published on 2.2.2021
Selected format:Information security - Key management - Part 5: Group key management
Standard published on 10.11.2020
Selected format:Information technology - Security techniques - Key management - Part 6: Key derivation
Standard published on 5.10.2016
Selected format:Latest update: 2025-10-01 (Number of items: 2 235 923)
© Copyright 2025 NORMSERVIS s.r.o.