ISO/IEC 18031:2011
|
Information technology Security techniques Random bit generation
|
ISO 15782-1:2009
|
Certificate management for financial services Part 1: Public key certificates
|
ISO 12855:2015
|
Electronic fee collection Information exchange between service provision and toll charging
|
ISO/IEC 9646-7:1995
|
Information technology Open Systems Interconnection Conformance testing methodology and framework Part 7: Implementation Conformance Statements
|
ISO/IEC 27001:2013
|
Information technology — Security techniques — Information security management systems — Requirements
|
ISO/IEC 8825-2:2015
|
Information technology ASN.1 encoding rules: Specification of Packed Encoding Rules (PER) Part 2:
|
ISO/IEC 14888-3:2016
|
Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms
|
ISO/IEC 27003:2017
|
Information technology — Security techniques — Information security management systems — Guidance
|
EN 15509:2014
|
Electronic fee collection - Interoperability application profile for DSRC
|
ISO/IEC 8825-1:2015
|
Information technology ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER) Part 1:
|
ISO 17573:2010
|
Electronic fee collection Systems architecture for vehicle-related tolling
|
TR 102 893 : 1.1.1
|
INTELLIGENT TRANSPORT SYSTEMS (ITS); SECURITY; THREAT, VULNERABILITY AND RISK ANALYSIS (TVRA)
|
ISO/IEC 18033-2:2006
|
Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers
|
ISO/IEC 8825-4:2015
|
Information technology ASN.1 encoding rules: XML Encoding Rules (XER) Part 4:
|
ISO/IEC 18033-3:2010
|
Information technology Security techniques Encryption algorithms Part 3: Block ciphers
|
FIPS PUB 140-2 : 0
|
SECURITY REQUIREMENTS FOR CRYPTOGRAPHIC MODULES
|
ISO/IEC 19790:2012
|
Information technology — Security techniques — Security requirements for cryptographic modules
|
CEN/TS 16702-1:2014
|
Electronic fee collection - Secure monitoring for autonomous toll systems - Part 1: Compliance checking
|
ISO/IEC 27002:2013
|
Information technology Security techniques Code of practice for information security controls
|
ISO/TS 14907-2:2016
|
Electronic fee collection Test procedures for user and fixed equipment Part 2: Conformance test for the on-board unit application interface
|
CEN/TR 16690:2014
|
Electronic fee collection - Guidelines for EFC applications based on in-vehicle ITS stations
|
ISO/IEC 10181-1:1996
|
Information technology Open Systems Interconnection Security frameworks for open systems: Overview
|
ISO/TS 17575-1:2010
|
Electronic fee collection Application interface definition for autonomous systems Part 1: Charging
|
ISO/IEC 9594-8:2017
|
Information technology Open Systems Interconnection The Directory Part 8: Public-key and attribute certificate frameworks
|
ISO 14906:2011
|
Electronic fee collection Application interface definition for dedicated short-range communication
|
ISO 7498-2:1989
|
Information processing systems Open Systems Interconnection Basic Reference Model Part 2: Security Architecture
|
ISO/IEC 14888-1:2008
|
Information technology Security techniques Digital signatures with appendix Part 1: General
|
ISO/IEC 27005:2011
|
Information technology Security techniques Information security risk management
|
CEN/TR 16092:2011
|
Electronic fee collection - Requirements for pre-payment systems
|
ISO/IEC 7816-3:2006
|
Identification cards — Integrated circuit cards — Part 3: Cards with contacts — Electrical interface and transmission protocols
|
ISO/TS 13141:2010
|
Electronic fee collection Localisation augmentation communication for autonomous systems
|
ISO/IEC 9797-1:2011
|
Information technology Security techniques Message Authentication Codes (MACs) Part 1: Mechanisms using a block cipher
|
ISO/IEC 10118-3:2004
|
Information technology Security techniques Hash-functions Part 3: Dedicated hash-functions
|
ISO/TS 12813:2009
|
Electronic fee collection Compliance check communication for autonomous systems
|
CEN/TS 16702-2:2015
|
Electronic fee collection - Secure monitoring for autonomous toll systems - Part 2: Trusted recorder
|
ISO/TS 17575-3:2011
|
Electronic fee collection Application interface definition for autonomous systems Part 3: Context data
|
ISO/IEC 27000:2016
|
Information technology Security techniques Information security management systems Overview and vocabulary
|
ISO/IEC 14888-2:2008
|
Information technology Security techniques Digital signatures with appendix Part 2: Integer factorization based mechanisms
|
ISO/IEC 11770-1:2010
|
Information technology Security techniques Key management Part 1: Framework
|
ISO/IEC 11770-3:2015
|
Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques
|