ISO/TR 24679-6:2017 Fire safety engineering — Performance of structures in fire — Part 6: Example of an eight-storey office concrete building
The objective of this Recommendation is to provide guidance on security requirements for trusted nodes in QKD networks. This Recommendation will identify the security threats and provide security requirements of trusted node, as well as some implementation examples to meet the requirements.
Recommendation ITU-T X.1712 specifies security threats and security requirements for key management in quantum key distribution networks (QKDNs), and then it specifies security measures of key management to meet the security requirements. This Recommendation provides support for design, implementation, and operation of key management in QKDN with approved security.
Information technology security techniques — Security requirements, test and evaluation methods for quantum key distribution — Part 1: Requirements
The present document specifies protection of QKD modules against Trojan horse attacks launched against a time-varying phase, polarisation or intensity modulator that encodes or decodes at least one of bit values, basis values or the intensities of signal, decoy or vacuum states from the quantum channel.
This Technical Report provides security considerations for quantum key distribution (QKD) network. It describes the following: