Telebiometric authentication framework using biometric hardware security module Read more about Telebiometric authentication framework using biometric hardware security module
Testing methods for the mitigation of non-invasive attack classes against cryptographic modules Read more about Testing methods for the mitigation of non-invasive attack classes against cryptographic modules
Cryptographic techniques based on elliptic curves -- Part 5: Elliptic curve generation Read more about Cryptographic techniques based on elliptic curves -- Part 5: Elliptic curve generation
Cryptographic techniques based on elliptic curves -- Part 1: General Read more about Cryptographic techniques based on elliptic curves -- Part 1: General
Specification of TTP services to support the application of digital signatures Read more about Specification of TTP services to support the application of digital signatures
Information technology — Reference Architecture for Service Oriented Architecture (SOA RA) — Part 2: Reference Architecture for SOA Solutions Read more about Information technology — Reference Architecture for Service Oriented Architecture (SOA RA) — Part 2: Reference Architecture for SOA Solutions
Information technology — Reference Architecture for Service Oriented Architecture (SOA RA) — Part 1: Terminology and concepts for SOA Read more about Information technology — Reference Architecture for Service Oriented Architecture (SOA RA) — Part 1: Terminology and concepts for SOA
Information technology — Cloud computing — Reference architecture Read more about Information technology — Cloud computing — Reference architecture
Information technology — Cloud computing — Overview and vocabulary Read more about Information technology — Cloud computing — Overview and vocabulary
Information technology — Open Virtualization Format (OVF) specification Read more about Information technology — Open Virtualization Format (OVF) specification
Information technology — Security techniques — Vulnerability handling processes Read more about Information technology — Security techniques — Vulnerability handling processes
Information technology — Reference Architecture for Service Oriented Architecture (SOA RA) — Part 3: Service Oriented Architecture ontology Read more about Information technology — Reference Architecture for Service Oriented Architecture (SOA RA) — Part 3: Service Oriented Architecture ontology