Standard No. |
Title |
Price(USD) |
Delivery |
Status |
Add To Cart |
GB/T 38556-2020 |
Information security technology—Technical specifications for one-time-password cryptographic application |
720 (USD) |
via email in
1-5 business day
|
TO BE VALID
|
|
GB/T 29767-2013 |
Information security techniques—Public key infrastructure—Bridge Certification Authority leveled certificate specification |
360 (USD) |
via email in
1-3 business day
|
VALID
|
|
GB/T 37935-2019 |
Information security technology—Trusted computing specification—Trusted software base |
420 (USD) |
via email in
1-3 business day
|
VALID
|
|
GM/T 0068-2019 |
Open third party resource authorization protocol framework |
|
via email in
|
VALID
|
please email coc@codeofchina.com for quotation
|
LD/T 30.1-2009 |
Human resources and social security electronic authentication system—Part 1:Architecture specification |
300 (USD) |
via email in
1-3 business day
|
VALID
|
|
GM/T 0070-2019 |
Technical requirement for applications of cryptography in electronic insurance policy |
|
via email in
|
VALID
|
please email coc@codeofchina.com for quotation
|
GB/T 30276-2013 |
Information security technology—Vulnerability management criterion specification |
180 (USD) |
via email in
1-3 business day
|
VALID
|
|
GB/T 38645-2020 |
Information security techniques—Guide for cybersecurity incident emergency exercises |
900 (USD) |
via email in
1-8 business day
|
TO BE VALID
|
|
GB/T 20281-2015 |
nformation security technology—Security technical requirements and testing and evaluation approaches for firewall |
960 (USD) |
via email in
1-8 business day
|
VALID
|
|
SJ 20951-2005 |
Interface requirements for universal data encryption module |
150 (USD) |
via email in
1-3 business day
|
VALID
|
|
GB/T 33133.1-2016 |
Information security technology—ZUC stream cipher algorithm—Part 1:Algorithm description |
300 (USD) |
via email in
1-3 business day
|
VALID
|
|
GB/T 36619-2018 |
Information security technology—Naming specification on domain names of chinese government organs and public institutions |
180 (USD) |
via email in
1-3 business day
|
VALID
|
|
GB/T 15843.4-1999 |
Information technology—Security techniques—Entity authentication—Part 4:Mechanisms using a cryptographic check function |
|
via email in
1-3 business day
|
ABOLISHED
|
please email coc@codeofchina.com for quotation
|
GB/T 35284-2017 |
Information security technology—Requirements and assessment methods for website identity and system security |
360 (USD) |
via email in
1-3 business day
|
VALID
|
|
GB/T 30280-2013 |
Information security technology—Authentication and authorization—Geospatial eXtensible Access Control Markup Language(GeoXACML) |
360 (USD) |
via email in
1-3 business day
|
VALID
|
|
GB/T 20274.2-2008 |
Information security technology - Evaluation framework for information systems security assurance Part 2: Technical assurance |
1500 (USD) |
via email in
1-10 business day
|
VALID
|
|
GM/T 0072-2019 |
Technical requirements for the applying of cryptography in remote mobile payment |
|
via email in
|
VALID
|
please email coc@codeofchina.com for quotation
|
GB/T 35283-2017 |
Information security techniques—Specification for the structure ofdesktop core configuration baseline |
540 (USD) |
via email in
1-5 business day
|
VALID
|
|
GB/T 31501-2015 |
Information security technology—Authentication and authorization—Specification for authorization application programming decision interface |
840 (USD) |
via email in
1-8 business day
|
VALID
|
|
GB/T 17903.1-1999 |
Information technology--Security techniques--Non-repudiation--Part 1:General |
|
via email in
1-3 business day
|
ABOLISHED
|
please email coc@codeofchina.com for quotation
|
|