
【国际标准】 Information technology — Security techniques — Digital signatures with appendix — Part 1: General
本网站 发布时间:
2025-08-20
开通会员免费在线看70000余条国内标准,赠送文本下载次数,单本最低仅合13.3元!还可享标准出版进度查询、定制跟踪推送、标准查新等超多特权!  
查看详情>>

适用范围:
暂无
标准号:
ISO/IEC 14888-1:1998 EN
标准名称:
Information technology — Security techniques — Digital signatures with appendix — Part 1: General
英文名称:
Information technology — Security techniques — Digital signatures with appendix — Part 1: General标准状态:
废止-
发布日期:
1998-12-20 -
实施日期:
出版语种:
EN
- 推荐标准
- ISO/IEC 11889-1:2009 EN b9df0a76 Information technology — Trusted Platform Module — Part 1: Overview
- ISO/IEC 11889-1:2015 EN b6f30849 Information technology — Trusted platform module library — Part 1: Architecture
- ISO/IEC 11889-3:2009 EN 15e584c8 Information technology — Trusted Platform Module — Part 3: Structures
- ISO/IEC 11889-3:2015 EN 606817a9 Information technology — Trusted Platform Module Library — Part 3: Commands
- ISO/IEC 11889-4:2009 EN a3ed08fd Information technology — Trusted Platform Module — Part 4: Commands
- ISO/IEC 11889-4:2015 EN 1826c830 Information technology — Trusted Platform Module Library — Part 4: Supporting Routines
- ISO/IEC 13888-1:2020 EN 3714ed9b Information security — Non-repudiation — Part 1: General
- ISO/IEC 15408-2:2022 EN f5bf5b71 Information security, cybersecurity and privacy protection - Evaluation criteria for IT security - Part 2: Security functional components
- ISO/IEC 15408-3:2022 EN 187cf7d6 Information security, cybersecurity and privacy protection - Evaluation criteria for IT security - Part 3: Security assurance components
- ISO/IEC 15408-4:2022 EN b4a6849d Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 4: Framework for the specification of evaluation methods and activities
- ISO/IEC 15408-5:2022 EN f0b52c44 Information security, cybersecurity and privacy protection - Evaluation criteria for IT security - Part 5: Pre-defined packages of security requirements
- ISO/IEC 18014-1:2008/Amd 1:2025 EN 79834ac0 Information technology — Security techniques — Time-stamping services — Part 1: Framework — Amendment 1
- ISO/IEC 18033-2:2006/Amd 1:2017 EN ed12b9f8 Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers — Amendment 1: FACE
- ISO/IEC 18033-4:2011/Amd 1:2020 EN 02a2aef8 Information technology — Security techniques — Encryption algorithms — Part 4: Stream ciphers — Amendment 1: ZUC
- ISO/IEC 18045:2022 EN 4e2b6ee5 Information security, cybersecurity and privacy protection - Evaluation criteria for IT security - Methodology for IT security evaluation