Electrotechincal

Electrotechincal



KS ISO/IEC 23264-1:2021

Information security - Redaction of authentic data - Part 1: General

Specifies properties of cryptographic mechanisms to redact authentic data. In particular, it defines the processes involved in those mechanisms, the participating parties, and the cryptographic properties...

Kes 3,038.00

KSISO/IEC4922-1:2023

Information security - Secure multiparty computation - Part 1: General

Specifies definitions, terminology and processes for secure multiparty computation and related technology, in order to establish a taxonomy and enable interoperability...

Kes 3,038.00

KS ISO/IEC 23837-1:2023

Information security - Security requirements, test and evaluation methods for quantum key distribution - Part 1: Requirements

Specifies a general framework for the security evaluation of quantum key distribution (QKD) according to the ISO/IEC 15408 series. ..

Kes 4,820.00

KSISO/IEC 27102:2019

Information security management - Guidelines for cyber-insurance

Provides guidelines when considering purchasing cyber-insurance as a risk treatment option to manage the impact of a cyber-incident within the organizations information security risk management framework..

Kes 3,308.00

KS ISO/IEC 20897-1:2020

Information security, cybersecurity and privacy protection Physically unclonable functions Part 1: Security requirements

Specifies the security requirements for physically unclonable functions (PUFs). Specified security requirements concern the output properties, tamper-resistance and unclonability of a single and a batch of PUFs..

Kes 3,308.00

KS ISO/IEC18045:2022

Information security, cybersecurity and privacy protection Evaluation criteria for IT security Methodology for IT security evaluation

Defines the minimum actions to be performed by an evaluator in order to conduct an ISO/IEC 15408 series evaluation, using the criteria and evaluation evidence defined in the ISO/IEC 15408 series...

Kes 20,291.00

KS ISO/IEC 15408-2:2022

Information security, cybersecurity and privacy protection Evaluation criteria for IT security Part 2: Security functional components

Defines the required structure and content of security functional components for the purpose of security evaluation. It includes a catalogue of functional components that meets the common security functionality requirements of many IT products...

Kes 20,291.00

KS ISO/IEC 20897-2:2022

Information security, cybersecurity and privacy protection Physically unclonable functions Part 2: Test and evaluation methods

specifies the test and evaluation methods for physically unclonable functions (PUFs). ..

Kes 3,605.00

Showing 781 to 790 of 918 (92 Pages)