Blockchain and distributed ledger technologies. Overview of existing DLT systems for identity management
€370.00
Information security. Authenticated encryption
€329.00
Information technology. Security techniques. Encryption algorithms Block ciphers
€421.00
Blockchain and distributed ledger technologies (DLTs). Overview of trust anchors for DLT-based identity management
BS ISO/IEC 27033-7. Information technology. Network security Part 7. Guidelines for network virtualization
€24.00
Information technology. Network security Guidelines for network virtualization
€281.00
BS ISO/IEC 27035-4. Information technology. security incident management Part 4. Coordination
Information technology. Security techniques. Anonymous digital signatures Mechanisms using a group public key
Security techniques. Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management. Requirements and guidelines
BS ISO/IEC 24760-2. IT Security and Privacy. A framework for identity management Part 2. Reference architecture requirements
BS ISO/IEC 24760-3:2016.AMD1. Information technology. Security techniques. A framework for identity management Part 3. Practice. AMENDMENT 1. Identity Lifecycle processes
Cybersecurity. Security considerations throughout the product life cycle
€390.00
Cybersecurity. Supplier relationships Requirements
Fixed-time cybersecurity evaluation methodology for ICT products
Information technology. Security techniques. Security requirements for cryptographic modules