Standard No. |
Title |
Price(USD) |
Delivery |
Status |
Add To Cart |
GB/T 38647.1-2020 |
Information technology—Security techniques—Anonymous digital signatures—Part 1:General |
420 (USD) |
via email in
1-3 business day
|
TO BE VALID
|
|
GB/T 38635.1-2020 |
Information security technology—Identity-based cryptographic algorithms SM9—Part 1:General |
660 (USD) |
via email in
1-5 business day
|
TO BE VALID
|
|
LD/T 30.3-2009 |
Human resources and social security electronic authentication system—Part 3:Format specifications of digital certificate and CRL |
480 (USD) |
via email in
1-5 business day
|
VALID
|
|
GM/T 0076-2019 |
Cryptography technical requirements for banking card information systems |
|
via email in
|
VALID
|
please email coc@codeofchina.com for quotation
|
GB/T 37953-2019 |
Information security technology—Security requirements and evaluation approaches for industrial control network monitor |
610 (USD) |
via email in
1 business day
|
VALID
|
|
GB/Z 24364-2009 |
Information security technology—Guidelines for information security risk management |
720 (USD) |
via email in
1-5 business day
|
VALID
|
|
GB/T 31167-2014 |
Information security technology—Security guide of cloud computing services |
420 (USD) |
via email in
1-3 business day
|
VALID
|
|
GB/T 37091-2018 |
Information security technology—Security office USB disk technology requirement |
|
via email in
|
VALID
|
please email coc@codeofchina.com for quotation
|
GB/T 25066-2010 |
Information security technology—Type and code of information security product |
300 (USD) |
via email in
1-3 business day
|
VALID
|
|
GB/T 25068.4-2010 |
Information technology—Security techniques—IT network security—Part 4:Securing remote access |
660 (USD) |
via email in
1-5 business day
|
VALID
|
|
GB/T 31722-2015 |
Information technology—Security techniques—Information security risk management |
720 (USD) |
via email in
1-5 business day
|
VALID
|
|
GB/T 35291-2017 |
Information security technology—Cryptography token application interface specification |
840 (USD) |
via email in
1-8 business day
|
VALID
|
|
GB/T 15843.3-2008 |
Information technology - Security techniques - Entity authentication - Part 3:Mechanisms using digital signature techniques |
180 (USD) |
via email in
1-3 business day
|
ABOLISHED
|
|
GB/T 36637-2018 |
Information security technology—Guidelines for the information and communication technology supply chain risk management |
480 (USD) |
via email in
1-5 business day
|
VALID
|
|
GB/T 37956-2019 |
Information security technology—Technology requirement for website security cloud protection platform |
160 (USD) |
via email in
1 business day
|
VALID
|
|
GB/T 38542-2020 |
Information security technology—Technical framework for authentication of mobile smart terminals based on biometric |
300 (USD) |
via email in
1-3 business day
|
TO BE VALID
|
|
GB/T 18238.1-2000 |
Information technology-Security techniques-Hash-function-Part 1:General |
105 (USD) |
via email in
1-3 business day
|
VALID
|
|
GB/T 38638-2020 |
Information security technology—Trusted computing—Architecture of trusted computing |
180 (USD) |
via email in
1-3 business day
|
TO BE VALID
|
|
GB/T 15852.1-2008 |
Information technology - Security techniques - Message Authentication Codes(MACs) - Part 1: Mechanisms using a block cipher |
420 (USD) |
via email in
1-3 business day
|
VALID
|
|
GB/T 20945-2007 |
Information security technology—Technical requirements testing and evaluation approaches for information system security audit products |
465 (USD) |
via email in
1-5 business day
|
ABOLISHED
|
|
|