China Security technology GB Standards Search Result |
![]() |
1. Ready translated GB standards ![]() 2. Other English version GB Standards are not ready translated, only after get your order, then we translate them, time usually need 3-5 days . |
![]() |
GB/T 32918.1-2016 Information Security technology—Public key cryptographic algorithm SM2 based on elliptic curves—Part 1: General - 英文版 |
![]() |
|
![]() |
GB/T 32907-2016 Information Security technology—SM4 block cipher algorthm - 英文版 |
![]() |
|
![]() |
GB/T 15843.3-2016 Information technology—Security techniques—Entity authentication—Part 3: Mechanisms using digital signature techniques - 英文版 |
![]() |
|
![]() |
GB/T 30269.601-2016 Information technology—Sensor network—Part 601: Information security general technical specifications - 英文版 |
![]() |
|
![]() |
GB/T 32213-2015 Information Security technology—Public key infrastructure—Specifications for remote password authentication and key establishment - 英文版 |
![]() |
|
![]() |
GB/T 31722-2015 Information technology—Security techniques—Information security risk management - 英文版 |
![]() |
|
![]() |
GB/T 31509-2015 Information Security technology—Guide of implementation for information security risk assessment - 英文版 |
![]() |
|
![]() |
GB/T 31507-2015 Information Security technology—General testing guide for security of smart card - 英文版 |
![]() |
|
![]() |
GB/T 31506-2015 Information Security technology—Security technology guidelines for web portal system of government - 英文版 |
![]() |
|
![]() |
GB/T 31505-2015 Information Security technology—Technique requirements and testing and evaluation approaches for host-based firewall and personal firewall - 英文版 |
![]() |
|
![]() |
GB/T 31504-2015 Information Security technology—Authentication and authorization—Digital identity information service framework specification - 英文版 |
![]() |
|
![]() |
GB/T 31503-2015 Information Security technology—Encryption and signature message syntax for electronic document - 英文版 |
![]() |
|
![]() |
GB/T 31502-2015 Information Security technology―Security protect framework of electronic payment system - 英文版 |
![]() |
|
![]() |
GB/T 31501-2015 Information Security technology—Authentication and authorization—Specification for authorization application programming decision interface - 英文版 |
![]() |
|
![]() |
GB/T 31500-2015 Information Security technology—Requirement of data recovery service for storage media - 英文版 |
![]() |
|
![]() |
GB/T 31499-2015 Information Security technology—Technical requirements and testing and evaluation approaches for unified threat management products - 英文版 |
![]() |
|
![]() |
GB/T 31497-2015 Information technology—Security techniques—Information security management—Measurement - 英文版 |
![]() |
|
![]() |
GB/T 31496-2015 Information technology—Security techniques—Information security management system implementation guidance - 英文版 |
![]() |
|
![]() |
GB/T 31495.3-2015 Information Security technology—Indicator system of information security assurance and evaluation methods—Part 3: Implementation guide - 英文版 |
![]() |
|
![]() |
GB/T 31495.2-2015 Information Security technology—Indicator system of information security assurance and evaluation methods—Part 2: Indicator system - 英文版 |
![]() |
|
![]() |
GB/T 31495.1-2015 Information Security technology—Indicator system of information security assurance and evaluation methods—Part 1: Concepts and model - 英文版 |
![]() |
|
![]() |
GB/T 20281-2015 Information Security technology—Security technical requirements and testing and evaluation approaches for firewall - 英文版 |
![]() |
|
![]() |
GB/T 20279-2015 Information Security technology—Security technical requirements of network and terminal separation products - 英文版 |
![]() |
|
![]() |
GB/T 20277-2015 Information Security technology—Testing and evaluation approaches of network and terminal separation products - 英文版 |
![]() |
|
![]() |
GB/T 18336.3-2015 Information technology—Security techniques—Evaluation criteria for IT security—Part 3: Security assurance components - 英文版 |
![]() |
|
![]() |
GB/T 18336.2-2015 Information technology—Security techniques—Evaluation criteria for IT security—Part 2: Security functional components - 英文版 |
![]() |
|
![]() |
GB/T 18336.1-2015 Information technology—Security techniques—Evaluation criteria for IT security—Part 1: Introduction and general model - 英文版 |
![]() |
|
![]() |
GB/T 31168-2014 Information Security technology―Security capability requirements of cloud computing services - 英文版 |
![]() |
|
![]() |
GB/T 31167-2014 Information Security technology―Security guide of cloud computing services - 英文版 |
![]() |
|
![]() |
GB/Z 30286-2013 Information Security technology—Guide for the production of information system protect profile and information system security target - 英文版 |
![]() |
Find out:501Items | To Page of: First -Previous-Next -Last | [6] [7] [8] [9] [10] [11] [12] |