Cybersecurity

Available (269)

Showing 49 - 60 per page



Digital signatures with appendix -- Part 2: Integer factorization based mechanisms

This part of ISO/IEC 14888 specifies digital signatures with appendix whose security is based on the difficulty of factoring the modulus in use. For each signature scheme, it specifies:
a) the relationships and constraints between all the data elements required for signing and verifying;
b) a signature mechanism, i.e., how to produce a signature of a message with the data elements required for signing;
c) a verification mechanism, i.e., how to verify a signature of a message with the data elements required for verifying.

ISO/IEC 14888-2:2008

IEEE 1686-2007 - PE/PSCC - IEEE Standard for Substation Intelligent Electronic Devices (IEDs) Cyber Security Capabilities

In this standards are defined the functions and features to be provided in substation intelligent electronic devices (IEDs) to accommodate critical infrastructure protection programs.
This standards also addresses the security regarding the access, operation, configuration, firmware revision, and data retrieval from an IED.

IEEE 1686-2013 - PE/PSCC - IEEE Standard for Intelligent Electronic Devices Cyber Security Capabilities

In this standards are defined the functions and features to be provided in intelligent electronic devices (IEDs) to accommodate critical infrastructure protection programs.
This standards also addresses the security regarding the access, operation, configuration, firmware revision, and data retrieval from an IED.

IEEE 2600-2008 - C/CPSC - IEEE Standard for Information Technology: Hardcopy Device and System Security

This standard defines security requirements (all aspects of security including but not limited to authentication, authorization, privacy, integrity, device management, physical security, and information security) for manufacturers, users, and others on the selection, installation, configuration, and usage of hardcopy devices (HCDs) and systems, including printers, copiers, and multifunction devices (MFDs), and the computer systems that support these devices.

Check character systems

This International Standard specifies a set of check character systems capable of protecting strings against errors which occur when people copy or type data. This International Standard specifies conformance requirements for products described as generating check characters or checking strings using the systems given in this International Standard.

ISO/IEC 7064:2003

Digital signature schemes giving message recovery -- Part 2: Integer factorization based mechanisms

This part of ISO/IEC 9796 specifies three digital signature schemes giving message recovery, two of which are deterministic (non-randomized) and one of which is randomized. The security of all three schemes is based on the difficulty of factorizing large numbers. All three schemes can provide either total or partial message recovery.

ISO/IEC 9796-2:2010

Digital signature schemes giving message recovery -- Part 3: Discrete logarithm based mechanisms

This part of ISO/IEC 9796 specifies six digital signature schemes giving message recovery. The security of these schemes is based on the difficulty of the discrete logarithm problem, which is defined on a finite field or an elliptic curve over a finite field.

ISO/IEC 9796-3:2006

Guidelines for the use and management of Trusted Third Party services

Associated with the provision and operation of a Trusted Third Party (TTP) are a number of security-related issues for which general guidance is necessary to assist business entities, developers and providers of systems and services, etc. This includes guidance on issues regarding the roles, positions and relationships of TTPs and the entities using TTP services, the generic security requirements, who should provide what type of security, what the possible security solutions are, and the operational use and management of TTP service security.

ISO/IEC TR 14516:2002

Digital signatures with appendix -- Part 1: General

ISO/IEC 14888 specifies several digital signature mechanisms with appendix for messages of arbitrary length.
This part of ISO/IEC 14888 contains general principles and requirements for digital signatures with appendix. It also contains definitions and symbols which are used in all parts of ISO/IEC 14888.

ISO/IEC 14888-1:2008