Фильтр :
Стандарт и/или проект находящийся в компетенции ISO/TC 68/SC 2 Секретариата | Этап | ICS |
---|---|---|
Mobile financial services — Customer identification guidelines |
60.60 | |
Financial services — Code-scanning payment security |
40.93 | |
Banking — Requirements for message authentication (wholesale) |
95.99 | |
Banking — Requirements for message authentication (wholesale) |
95.99 | |
Banking — Requirements for message authentication (wholesale) — Technical Corrigendum 1: . |
95.99 | |
Banking — Approved algorithms for message authentication — Part 1: DEA |
95.99 | |
Banking — Approved algorithm for message authentication — Part 2: Message authenticator algorithms |
95.99 | |
Banking — Approved algorithms for message authentication — Part 2: Message authenticator algorithm |
95.99 | |
Banking — Key management (wholesale) |
95.99 | |
Banking — Key management (wholesale) — Technical Corrigendum 1: . |
95.99 | |
Banking — Banking telecommunication messages — Bank identifier codes |
95.99 | |
Guidelines for security framework of information systems of TPP services |
30.20 | |
Banking — Personal Identification Number management and security — Part 1: PIN protection principles and techniques |
95.99 | |
Banking — Personal Identification Number (PIN) management and security — Part 1: Basic principles and requirements for online PIN handling in ATM and POS systems |
95.99 | |
Financial services — Personal Identification Number (PIN) management and security — Part 1: Basic principles and requirements for PINs in card-based systems |
95.99 | |
Financial services — Personal Identification Number (PIN) management and security — Part 1: Basic principles and requirements for PINs in card-based systems — Amendment 1 |
95.99 | |
Financial services — Personal Identification Number (PIN) management and security — Part 1: Basic principles and requirements for PINs in card-based systems |
90.93 | |
Financial services — Personal Identification Number (PIN) management and security — Part 1: Basic principles and requirements for PINs in card-based systems |
30.98 | |
Banking — Personal Identification Number management and security — Part 2: Approved algorithm(s) for PIN encipherment |
95.99 | |
Banking — Personal Identification Number management and security — Part 2: Approved algorithms for PIN encipherment |
95.99 | |
Financial services — Personal Identification Number (PIN) management and security — Part 2: Approved algorithms for PIN encipherment |
90.92 | |
Banking — Personal Identification Number management and security — Part 3: Requirements for offline PIN handling in ATM and POS systems |
95.99 | |
Financial services — Personal Identification Number (PIN) management and security — Part 4: Requirements for PIN handling in eCommerce for Payment Transactions |
90.93 | |
Banking — Personal Identification Number (PIN) management and security — Part 4: Guidelines for PIN handling in open networks |
95.99 | |
Financial services — Personal Identification Number (PIN) management and security — Part 5: Methods for generation, change, and verification of PINs using 16-byte block ciphers |
30.00 |
|
Banking and related financial services — Requirements for message authentication (retail) |
95.99 | |
Banking — Procedures for message encipherment (wholesale) — Part 1: General principles |
95.99 | |
Banking — Procedures for message encipherment (wholesale) — Part 2: DEA algorithm |
95.99 | |
Financial transaction cards — Security architecture of financial transaction systems using integrated circuit cards — Part 1: Card life cycle |
95.99 | |
Financial transaction cards — Security architecture of financial transaction systems using integrated circuit cards — Part 1: Card life cycle — Technical Corrigendum 1: . |
95.99 | |
Financial transaction cards — Security architecture of financial transaction systems using integrated circuit cards — Part 2: Transaction process |
95.99 | |
Financial transaction cards — Security architecture of financial transaction systems using integrated circuit cards — Part 3: Cryptographic key relationships |
95.99 | |
Financial transaction cards — Security architecture of financial transaction systems using integrated circuit cards — Part 4: Secure application modules |
95.99 | |
Financial transaction cards — Security architecture of financial transaction systems using integrated circuit cards — Part 4: Secure application modules — Technical Corrigendum 1: . |
95.99 | |
Financial transaction cards — Security architecture of financial transaction systems using integrated circuit cards — Part 5: Use of algorithms |
95.99 | |
Financial transaction cards — Security architecture of financial transaction systems using integrated circuit cards — Part 6: Cardholder verification |
95.99 | |
Financial transaction cards — Security architecture of financial transaction systems using integrated circuit cards — Part 7: Key management |
95.99 | |
Financial transaction cards — Security architecture of financial transaction systems using integrated circuit cards — Part 8: General principles and overview |
95.99 | |
Banking and related financial services — Sign-on authentication |
95.99 | |
Banking — Key management by means of asymmetric algorithms — Part 1: Principles, procedures and formats |
95.99 | |
Banking — Key management by means of asymmetric algorithms — Part 2: Approved algorithms using the RSA cryptosystem |
95.99 | |
Banking — Key management (retail) — Part 1: Introduction to key management |
95.99 | |
Banking — Key management (retail) — Part 1: Principles |
95.99 | |
Banking — Key management (retail) — Part 2: Key management techniques for symmetric ciphers |
95.99 | |
Banking — Key management (retail) — Part 2: Symmetric ciphers, their key management and life cycle |
95.99 | |
Financial services — Key management (retail) — Part 2: Symmetric ciphers, their key management and life cycle |
95.99 | |
Banking — Key management (retail) — Part 3: Key life cycle for symmetric ciphers |
95.99 | |
Banking — Key management (retail) — Part 4: Key management techniques using public key cryptosystems |
95.99 | |
Banking — Key management (retail) — Part 4: Asymmetric cryptosystems — Key management and life cycle |
95.99 | |
Banking — Key management (retail) — Part 5: Key life cycle for public key cryptosystems |
95.99 | |
Banking — Key management (retail) — Part 6: Key management schemes |
95.99 | |
Financial services — Key management (retail) |
60.60 | |
Banking — Secure cryptographic devices (retail) — Part 1: Concepts, requirements and evaluation methods |
95.99 | |
Banking — Secure cryptographic devices (retail) — Part 1: Concepts, requirements and evaluation methods |
95.99 | |
Financial services — Secure cryptographic devices (retail) — Part 1: Concepts, requirements and evaluation methods |
90.92 | |
Financial services — Secure cryptographic devices (retail) — Part 1: Concepts, requirements and evaluation methods |
30.99 | |
Banking — Secure cryptographic devices (retail) — Part 2: Security compliance checklists for devices used in magnetic stripe card systems |
95.99 | |
Banking — Secure cryptographic devices (retail) — Part 2: Security compliance checklists for devices used in financial transactions |
95.99 | |
Financial services — Secure cryptographic devices (retail) — Part 2: Security compliance checklists for devices used in financial transactions |
95.99 | |
Financial services — Secure cryptographic devices (retail) — Part 2: Security compliance checklists for devices used in financial transactions |
95.99 | |
Financial services — Secure cryptographic devices (retail) — Part 2: Security compliance checklists for devices used in financial transactions |
60.60 | |
Banking — Key management related data element (retail) |
95.99 | |
Financial services — Key management related data element — Application and usage of ISO 8583 data elements 53 and 96 |
95.99 | |
Financial services — Key-management-related data element — Application and usage of ISO 8583-1 data elements for encryption |
60.60 | |
Banking, securities and other financial services — Information security guidelines |
95.99 | |
Banking and related financial services — Information security guidelines |
95.99 | |
Banking and related financial services — Information security guidelines — Amendment 1 |
95.99 | |
Financial services — Information security guidelines |
95.99 | |
Financial services — Recommendations on cryptographic algorithms and their use |
20.00 |
|
Financial services — Recommendations on cryptographic algorithms and their use |
90.92 | |
Banking — Secure file transfer (retail) |
95.99 | |
Certificate management for financial services — Part 1: Public key certificates |
95.99 | |
Certificate management for financial services — Part 1: Public key certificates |
95.99 | |
Banking — Certificate management — Part 2: Certificate extensions |
95.99 | |
Banking — Requirements for message authentication using symmetric techniques |
95.99 | |
Financial services — Requirements for message authentication using symmetric techniques |
95.99 | |
Financial services — Requirements for message authentication using symmetric techniques |
60.60 | |
Banking — Security and other financial services — Framework for security in financial systems |
95.99 | |
Security controls and implementation guidance for third party payment service providers |
20.00 |
|
Banking and related financial services — Triple DEA — Modes of operation — Implementation guidelines |
90.93 | |
Financial services — Biometrics — Part 1: Security framework |
95.99 | |
Financial services — Biometrics — Security framework |
95.99 | |
Financial services — Biometrics — Security framework |
60.60 | |
Banking and related financial services — Key wrap using AES |
90.92 | |
Banking and related financial services — Key wrap using AES — Amendment 1 |
30.98 | |
Banking and related financial services — Key wrap using AES |
40.20 | |
Public key infrastructure for financial services — Practices and policy framework |
95.99 | |
Public key infrastructure for financial services — Practices and policy framework |
90.20 | |
Financial services — Third-party payment service providers |
60.60 | |
Security objectives of information systems of third-party payment services |
60.60 | |
Security aspects for digital currencies |
50.00 | |
Financial services — Security information for PKI in blockchain and DLT implementations |
60.60 |
По запросу ничего не найдено. Пожалуйста, попробуйте изменить настройки фильтра.