Document Center List of Standards on Character Sets And Information Coding Including Coding Of Audio, Picture, Multimedia And Hypermedia Information, It Security Techniques, Encryption, Bar Coding, Electronic Signatures, Etc.
ICS Code 35.040
Return to ICS Index.Up to Level 1:
Down to Level 3:
- 35.040.01 (Information coding in general)
- 35.040.10 (Coding of character sets)
- 35.040.30 (Coding of graphical and photographical information)
- 35.040.40 (Coding of audio, video, multimedia and hypermedia information)
- 35.040.50 (Automatic identification and data capture techniques Including RFID, OCR, bar coding, etc.)
- 35.040.99 (Other standards related to information coding)
The following documents are a part of this series:
ASTM:
- ASTM-D6398 - Standard Practice to Enhance Identification of Drug Names on Labels (Withdrawn 2022)
- ASTM-E2185 - Standard Specification for Transferring Digital Voice Data Between Independent Digital Dictation Systems and Workstations (Withdrawn 2010)
- ASTM-E2560 - Standard Specification for Data Format for Pavement Profile
- ASTM-E2807 - Standard Specification for 3D Imaging Data Exchange, Version 1.0
- ASTM-E2842 - Standard Guide for Credentialing for Access to an Incident or Event Site
- ASTM-E2909 - Standard Guide for Investigation/Study/Assay Tab-Delimited Format for Nanotechnologies (ISA-TAB-Nano): Standard File Format for the Submission and Exchange of Data on Nanomaterials and Characterizations (Withdrawn 2021)
- ASTM-F149 - Standard Terminology Relating to Optical Character Recognition (Withdrawn 2017)
BSI:
- BIP-0003 - Information Security PD 3000 series on CD-ROM
- BIP-0018 - Simplifying the implementation of MPEG CD-ROM
- BIP-0020 - Securing Email and Electronic Messages
- BIP-0026 - ISO/IEC-27001 Complete Isms Documentation Toolkit
- BIP-0064 - Information security incident management. A methodology
- BIP-0068 - Delivering and managing real world network security
- BIP-0071 - Guidelines on Requirements and Preparation for ISMS Certification based on ISO/IEC 27001
- BIP-0072 - Are you ready for an ISMS audit based on ISO/IEC 27001?
- BIP-0073 - Guide to the Implementation and Auditing of ISMS Controls based on ISO/IEC 27001
- BIP-0105 - Information Security Based on ISO-27001/ISO-17799: a Management Guide
- BIP-0106 - Implementing Information Security Based on ISO 27001/ISO 17799: a Management Guide
- BIP-0139 - An Introduction to ISO/IEC 27001:2013
- BIP-0141 - ISO 27001:2013 ISMS Standalone Documentation Toolkit
- BIP-2008 - IMS and information security. (Integrated Management Systems Series)
- BS-3880-3 - Specification for paper tape for data processing. Representation of codes on paper tape
- BS-4730 - Specification for UK 7-bit coded character set
- BS-5249-1 - Specification. Representation of elements of data in interchanges using data processing systems.
- BS-5249-2 - Specification for representation of elements of data in interchanges using data processing systems.. Representation of human sexes
- BS-5249-3 - Representation of elements of data in interchanges using data processing systems. Specification for representation of latitude, longitude and altitude for geographical point locations
- BS-5374 - Specification for codes for the representation of names of countries
- BS-6879 - Code for the representation of names of counties and similar areas
- BS-7104 - Procedure for allocating a Bank Identifier Code (BIC)
- BS-7111 - Guide to modes of operation for a 64-bit block cipher algorithm
- BS-7112 - Procedures for achievement of interoperability and security by use of encipherment at the physical layer of OSI in telecommunication systems conveying automatic data processing information
- BS-7799 - Set of BS-7799-1 & BS-7799-2 - Information Security
- BS-7799-1 - Part 1: Code of Practice for Information Security Management, Information Technology
- BS-7799-3 - Information security management systems
- BS-8766 - Names and identifiers of individuals and groups. Data structure for interoperability. Specification
- BS-EN-12323 - AIDC technologies. Symbology specifications. Code 16K
- BS-EN-1332-4 - Identification card systems. Man-machine interface
- BS-EN-14603 - Information technology. Alphanumeric glyph image set for optical character recognition OCR-B. Shapes and dimensions of the printed image
- BS-EN-1556 - Bar coding. Terminology
- BS-EN-1571 - Bar coding. Data identifiers
- BS-EN-1572 - Bar coding. Unique identifier for transport units
- BS-EN-1573 - Bar code. Multi industry transport label
- BS-EN-16495 - Air Traffic Management. Information security for organisations supporting civil aviation operations
- BS-EN-28601 - Specification for representation of dates and times in information interchange
- BS-EN-419211-2 - Protection profiles for secure signature creation device
- BS-EN-419211-3 - Protection profiles for secure signature creation device
- BS-EN-419211-4 - Protection profiles for secure signature creation device
- BS-EN-419211-6 - Protection profiles for secure signature creation device
- BS-EN-61286 - Information technology. Coded graphic character set for use in the preparation of documents used in electrotechnology and for information interchange
- BS-EN-61937-5 - Digital audio. Interface for non-linear PCM encoded audio bitstreams applying IEC 60958
- BS-EN-61937-6 - Digital audio. Interface for non-linear PCM encoded audio bitstreams applying IEC 60958
- BS-EN-61937-8 - Digital audio. Interface for non-linear PCM encoded audio bitstreams applying IEC 60958
- BS-EN-61937-9 - Digital audio. Interface for non-linear PCM encoded audio bitstreams applying IEC 60958
- BS-EN-62261-1 - Television metadata
- BS-EN-62261-2 - Television METADATA
- BS-EN-62439 - High availability automation networks
- BS-EN-62439-1 - Industrial communication networks. High availability automation networks
- BS-EN-62439-2 - Industrial communication networks. High availability automation networks
- BS-EN-62439-3 - Industrial communication networks. High availability automation networks
- BS-EN-62439-4 - Industrial communication networks. High availability automation networks
- BS-EN-62439-5 - Industrial communication networks. High availability automation networks. Beacon redundancy protocol (BRP)
- BS-EN-62439-6 - Industrial communication networks. High availability automation networks
- BS-EN-62439-7 - Industrial communication networks. High availability automation networks
- BS-EN-62537 - Interface for loudspeakers with digital input signals based on IEC 60958
- BS-EN-796 - Bar coding. Symbology identifiers
- BS-EN-797 - Bar coding. Symbology specifications. 'EAN/UPC'
- BS-EN-798 - Bar coding. Symbology specifications. 'Codabar'
- BS-EN-799 - Bar coding. Symbology specifications. 'Code 128'
- BS-EN-IEC-62439-5 - Industrial communication networks. High availability automation networks
- BS-EN-ISO-13230 - Ophthalmic optics. Bar code specifications
- BS-EN-ISO-15415 - Information technology. Automatic identification and data capture techniques. Bar code print quality test specification. Two-dimensional symbols
- BS-EN-ISO-15438 - Information technology. Automatic identification and data capture techniques. Bar code symbology specifications. PDF417
- BS-EN-ISO-6709 - Standard representation of geographic point location by coordinates
- BS-EN-ISO/IEC11172-1 - Information technology. Coding of moving pictures and associated audio for digital storage media at up to about 1,5 Mbit/s. Systems
- BS-EN-ISO/IEC11172-2 - Information technology. Coding of moving pictures and associated audio for digital storage media at up to about 1,5 Mbit/s
- BS-EN-ISO/IEC11172-3 - Information technology. Coding of moving pictures and associated audio for digital storage media at up to about 1,5 Mbit/s
- BS-EN-ISO/IEC11172-4 - Information technology. Coding of moving pictures and associated audio for digital storage media at up to about 1,5 Mbit/s
- BS-EN-ISO/IEC-11544 - Information technology. Coded representation of picture and audio information. Progressive bi-level image compression
- BS-EN-ISO/IEC13818-1 - Information technology. Generic coding of moving pictures and associated audio information
- BS-EN-ISO/IEC13818-3 - Information technology. Generic coding of moving pictures and associated audio information
- BS-EN-ISO/IEC13818-9 - Information technology. Generic coding of moving pictures and associated audio information. Extension for real time interface for systems decoders
- BS-EN-ISO/IEC-15415 - Information Technology - Automatic Identification & Data Capture Techniques, Bar Code
- BS-EN-ISO/IEC-15416 - Information technology. Automatic identification and data capture techniques. Bar code print quality test specification. Linear symbols
- BS-EN-ISO/IEC-15419 - Information technology. Automatic identification and data capture techniques. Bar code digital imaging and printing performance testing
- BS-EN-ISO/IEC-15421 - Information technology. Automatic identification and data capture techniques. Bar code master test specifications
- BS-EN-ISO/IEC-15423 - Information technology. Automatic identification and data capture techniques. Bar code scanner and decoder performance testing
- BS-EN-ISO/IEC15426-2 - Information Technology - Automatic Identification & Data Capture Techniques, Bar Code
- BS-EN-ISO/IEC-15438 - Information technology. Automatic identification and data capture techniques. PDF417 bar code symbology specification
- BS-EN-ISO/IEC19762-1 - Information technology. Automatic identification and data capture (AIDC) techniques. Harmonized vocabulary
- BS-EN-ISO/IEC19762-3 - Information technology. Automatic identification and data capture (AIDC) techniques. Harmonized vocabulary
- BS-EN-ISO/IEC-27002 - Information security, cybersecurity and privacy protection. Information security controls
- BS-EN-ISO/IEC-27011 - Information technology. Security techniques. Code of practice for Information security controls based on ISO/IEC 27002 for telecommunications organizations
- BS-EN-ISO/IEC-27037 - Information technology. Security techniques. Guidelines for identification, collection, acquisition and preservation of digital evidence
- BS-EN-ISO/IEC-27038 - Information technology. Security techniques. Specification for digital redaction
- BS-EN-ISO/IEC-27040 - Information technology. Security techniques. Storage security
- BS-EN-ISO/IEC-27041 - Information technology. Security techniques. Guidance on assuring suitability and adequacy of incident investigative method
- BS-EN-ISO/IEC-27042 - Information technology. Security techniques. Guidelines for the analysis and interpretation of digital evidence
- BS-EN-ISO/IEC-27043 - Information technology. Security techniques. Incident investigation principles and processes
- BS-IEC-62443-2-1 - Industrial communication networks. Network and system security. Establishing an industrial automation and control system security program
- BS-ISO-10303-201 - Industrial automation systems and integration. Product data representation and exchange
- BS-ISO-10585 - Information and documentation. Armenian alphabet coded character set for bibliographic information interchange
- BS-ISO-10586 - Information and documentation. Georgian alphabet coded character set for bibliographic information interchange
- BS-ISO-11784 - Radio-frequency identification of animals. Code structure
- BS-ISO-11822 - Information and documentation. Extension of the Arabic alphabet coded character set for bibliographic information interchange
- BS-ISO-13491-1 - Financial services. Secure cryptographic devices (retail)
- BS-ISO-15000-5 - Electronic Business Extensible Markup Language (ebXML)
- BS-ISO-15394 - Packaging. Bar code and two-dimensional symbols for shipping, transport and receiving labels
- BS-ISO-15459-1 - Information technology. Unique identification of transport units. General
- BS-ISO-15668 - Banking. Secure file transfer (retail)
- BS-ISO-22742 - Packaging. Linear bar code and two-dimensional symbols for product packaging
- BS-ISO-26428-1 - Digital cinema (D-cinema) distribution master
- BS-ISO-26428-11 - Digital cinema (D-cinema) distribution master
- BS-ISO-26428-19 - Digital cinema (D-cinema) distribution master
- BS-ISO-26428-2 - Digital cinema (D-cinema) distribution master
- BS-ISO-26428-3 - Digital cinema (D-cinema) distribution master
- BS-ISO-26428-9 - Digital cinema (D-cinema) distribution master
- BS-ISO-26429-10 - Digital cinema (D-cinema) packaging
- BS-ISO-26429-3 - Digital cinema (D-cinema) packaging
- BS-ISO-26429-4 - Digital cinema (D-cinema) packaging
- BS-ISO-26429-6 - Digital cinema (D-cinema) packaging
- BS-ISO-26429-7 - Digital cinema (D-cinema) packaging
- BS-ISO-26429-8 - Digital cinema (D-cinema) packaging
- BS-ISO-26429-9 - Digital cinema (D-cinema) packaging
- BS-ISO-26430-1 - Digital cinema (D-cinema) operations
- BS-ISO-26430-2 - Digital cinema (D-cinema) operations
- BS-ISO-26430-3 - Digital cinema (D-cinema) operations
- BS-ISO-26430-4 - Digital cinema (D-cinema) operations
- BS-ISO-26430-5 - Digital cinema (D-cinema) operations
- BS-ISO-26430-6 - Digital cinema (D-cinema) operations
- BS-ISO-26430-9 - Digital cinema (D-cinema) operations
- BS-ISO-26433 - Digital cinema (D-cinema). XML Data types
- BS-ISO-28219 - Packaging. Labelling and direct product marking with linear bar code and two-dimensional symbols
- BS-ISO-28560-1 - Information and documentation. RFID in libraries
- BS-ISO-28560-2 - Information and documentation. RFID in libraries
- BS-ISO-28560-3 - Information and documentation. RFID in libraries
- BS-ISO-5426-2 - Information and documentation. Extension of the Latin alphabet coded character set for bibliographic information interchange
- BS-ISO-6709 - Standard Representation of Geographic Point Location by Coordinates
- BS-ISO-8957 - Information and documentation. Hebrew alphabet coded character sets for bibliographic information interchange
- BS-ISO-9448-9 - Tools for pressing. Guide bushes
- BS-ISO/IEC-10036 - Information technology. Font information interchange. Procedures for registration of font-related identifiers
- BS-ISO/IEC-10116 - Information technology. Security techniques. Modes of operation for an n-bit block cipher
- BS-ISO/IEC-10118-1 - Information technology. Security techniques. Hash-functions
- BS-ISO/IEC-10118-2 - Information technology. Security techniques. Hash-functions
- BS-ISO/IEC-10118-3 - IT Security techniques. Hash-functions
- BS-ISO/IEC-10118-4 - Information technology. Security techniques. Hash-functions
- BS-ISO/IEC-10646 - Information technology. Universal coded character set (UCS)
- BS-ISO/IEC-10918-1 - Information Technology, Digital Compression & Coding of Continuous-Tone Still Images,
- BS-ISO/IEC-10918-4 - Information technology. Digital compression and coding of continuous-tone still images
- BS-ISO/IEC-11179-1 - Information technology. Metadata registries (MDR)
- BS-ISO/IEC-11179-3 - Information technology. Metadata registries (MDR)
- BS-ISO/IEC-11179-5 - Information technology. Metadata registries (MDR)
- BS-ISO/IEC-11179-6 - Information technology. Metadata registries (MDR)
- BS-ISO/IEC-11770-2 - IT Security techniques. Key management
- BS-ISO/IEC-11770-3 - Information security. Key management
- BS-ISO/IEC-11770-4 - Information technology. Security techniques. Key management
- BS-ISO/IEC-11770-5 - Information security. Key management
- BS-ISO/IEC-11770-6 - Information technology. Security techniques. Key management
- BS-ISO/IEC-11889-1 - Information technology. Trusted Platform Module Library
- BS-ISO/IEC-11889-2 - Information technology. Trusted Platform Module Library
- BS-ISO/IEC-11889-3 - Information technology. Trusted Platform Module Library
- BS-ISO/IEC-11889-4 - Information technology. Trusted Platform Module Library
- BS-ISO/IEC-13335-1 - Information technology. Security techniques. Management of information and communications technology security
- BS-ISO/IEC-13335-2 - Information Technology, Guidelines for the Management of It Security, Managing & Plan
- BS-ISO/IEC-13335-3 - Information Technology, Guidelines for the Management of It Security, Techniques For
- BS-ISO/IEC-13335-4 - Information technology. Guidelines for the management of IT security
- BS-ISO/IEC-13335-5 - Information technology. Guidelines for the management of IT security
- BS-ISO/IEC-13522-1 - Information technology. Coding of multimedia and hypermedia information
- BS-ISO/IEC-13522-3 - Information technology. Coding of multimedia and hypermedia information
- BS-ISO/IEC-13522-7 - Information technology. Coding of multimedia and hypermedia information
- BS-ISO/IEC-13522-8 - Information technology. Coding of multimedia and hypermedia information stallation of lifts
- BS-ISO/IEC-13818-11 - Information technology. Generic coding of moving pictures and associated audio information
- BS-ISO/IEC-13818-7 - Information technology. Generic coding of moving pictures and associated audio information
- BS-ISO/IEC-13888-1 - Information security. Non-repudiation
- BS-ISO/IEC-13888-2 - Information technology. Security techniques. Non-repudiation
- BS-ISO/IEC-13888-3 - Information security. Non-repudiation
- BS-ISO/IEC-14495-1 - Information technology. Lossless and near-lossless compression of continuous-tone still images
- BS-ISO/IEC-14496-10 - Information technology. Coding of audio-visual objects
- BS-ISO/IEC-14496-12 - Information technology. Coding of audio-visual objects
- BS-ISO/IEC-14496-15 - Information technology. Coding of audio-visual objects. Carriage of network abstraction layer (NAL) unit structured video in ISO base media file format
- BS-ISO/IEC-14496-18 - Information technology. Coding of audio-visual objects
- BS-ISO/IEC-14496-22 - Information technology. Coding of audio-visual objects
- BS-ISO/IEC-14496-29 - Information technology. Coding of audio-visual objects
- BS-ISO/IEC-14651 - Information technology. International string ordering and comparison. Method for comparing character strings and description of the common template tailorable ordering
- BS-ISO/IEC-14888-1 - Information technology. Security techniques. Digital signatures with appendix
- BS-ISO/IEC-14888-2 - Information technology. Security techniques. Digital signatures with appendix
- BS-ISO/IEC-14888-3 - IT Security techniques. Digital signatures with appendix
- BS-ISO/IEC-15292 - Information technology. Security techniques. Protection profile registration procedures
- BS-ISO/IEC-15408-1 - Information security, cybersecurity and privacy protection Evaluation criteria for IT security
- BS-ISO/IEC-15408-2 - Information technology. Security techniques. Evaluation criteria for IT security
- BS-ISO/IEC-15408-3 - Information technolgy. Security techniques. Evaluation criteria for IT security
- BS-ISO/IEC-15415 - Information technology. Automatic identification and data capture techniques. Bar code symbol print quality test specification. Two-dimensional symbols
- BS-ISO/IEC-15417 - Information technology. Automatic identification and data capture techniques. Code 128 bar code symbology specification
- BS-ISO/IEC-15418 - Information technology. Automatic identification and data capture techniques. GS1 Application Identifiers and ASC MH10 Data Identifiers and maintenance
- BS-ISO/IEC-15420 - Information technology. Automatic identification and data capture techniques. EAN/UPC bar code symbology specification
- BS-ISO/IEC-15423 - Information technology. Automatic identification and data capture techniques. Bar code scanner and decoder performance testing
- BS-ISO/IEC-15424 - Information technology. Automatic identification and data capture techniques. Data Carrier Identifiers (including Symbology Identifiers)
- BS-ISO/IEC-15426-1 - Information technology. Automatic identification and data capture techniques. Bar code verifier conformance specification
- BS-ISO/IEC-15426-2 - Information technology. Automatic identification and data capture techniques. Bar code verifier conformance specification
- BS-ISO/IEC-15434 - Information technology. Automatic identification and data capture techniques. Syntax for high-capacity ADC media
- BS-ISO/IEC-15438 - Information technology. Automatic identification and data capture techniques. PDF417 bar code symbology specification
- BS-ISO/IEC-15444-12 - Information technology. JPEG 2000 image coding system
- BS-ISO/IEC-15444-2 - Information technology. JPEG 2000 image coding system
- BS-ISO/IEC-15459-1 - Information technology. Automatic identification and data capture techniques. Unique identification
- BS-ISO/IEC-15459-2 - Information technology. Automatic identification and data capture techniques. Unique identification
- BS-ISO/IEC-15459-3 - Information technology. Automatic identification and data capture techniques. Unique identification
- BS-ISO/IEC-15459-4 - Information technology. Automatic identification and data capture techniques. Unique identification
- BS-ISO/IEC-15459-5 - Information technology. Automatic identification and data capture techniques. Unique identification
- BS-ISO/IEC-15459-6 - Information technology. Automatic identification and data capture techniques. Unique identification
- BS-ISO/IEC-15459-8 - Information technology. Unique identifiers
- BS-ISO/IEC-15938-13 - Information technology. Multimedia content description interface
- BS-ISO/IEC-15945 - Information technology. Security techniques. Specification of TTP services to support the application of digital signatures
- BS-ISO/IEC-15946-1 - Information technology. Security techniques. Cryptographic techniques based on elliptic curves
- BS-ISO/IEC-15946-2 - Information technology. Security techniques. Cryptographic techniques based on elliptic curves
- BS-ISO/IEC-15946-3 - Information technology. Security techniques. Cryptographic techniques based on elliptic curves
- BS-ISO/IEC-15946-4 - Information technology. Security techniques. Cryptographic techniques based on elliptic curves
- BS-ISO/IEC-15946-5 - Information security. Cryptographic techniques based on elliptic curves
- BS-ISO/IEC-15946-5-TC - Tracked Changes. Information technology. Security techniques. Cryptographic techniques based on elliptic curves
- BS-ISO/IEC-15947 - Information technology. Security techniques. IT intrusion detection framework
- BS-ISO/IEC-15961 - Information technology. Radio frequency identification (RFID) for item management. Data protocol. Application interface
- BS-ISO/IEC-15961-1 - Information technology. Data protocol for radio frequency identification (RFID) for item management
- BS-ISO/IEC-15961-4 - Information technology. Radio frequency identification (RFID) for item management: Data protocol
- BS-ISO/IEC-15962 - Information technology. Radio frequency identification (RFID) for item management. Data protocol: data encoding rules and logical memory functions
- BS-ISO/IEC-15963 - Information technology. Radio frequency identification for item management. Unique identification for RF tags
- BS-ISO/IEC-16022 - Information technology. Automatic identification and data capture techniques. Data Matrix bar code symbology specification
- BS-ISO/IEC-16023 - Information technology. International symbology specification. Maxicode
- BS-ISO/IEC-16388 - Information technology. Automatic identification and data capture techniques. Code 39 bar code symbology specification
- BS-ISO/IEC-16390 - Information technology. Automatic identification and data capture techniques. Interleaved 2 of 5 bar code symbology specification
- BS-ISO/IEC-16480 - Information technology. Automatic identification and data capture techniques. Reading and display of ORM by mobile devices
- BS-ISO/IEC-17799 - Technologies de l'information. Techniques de securite. Code de bonne practique pour la gestion de la securite de l'information (French translation of BS ISO/IEC 17799:2005)
- BS-ISO/IEC-17825 - Information technology. Security techniques. Testing methods for the mitigation of non-invasive attack classes against cryptographic modules
- BS-ISO/IEC-17826 - Information technology. Cloud Data Management Interface (CDMITM) Version 2.0
- BS-ISO/IEC-17922 - Information technology. Security techniques. Telebiometric authentication framework using biometric hardware security module
- BS-ISO/IEC-18000-1 - Information technology. Radio frequency identification for item management
- BS-ISO/IEC-18000-2 - Information technology. Radio frequency identification for item management
- BS-ISO/IEC-18000-3 - Information technology. Radio frequency identification for item management
- BS-ISO/IEC-18000-4 - Information technology. Radio frequency identification for item management
- BS-ISO/IEC-18000-6 - Information technology. Radio frequency identification for item management
- BS-ISO/IEC-18000-61 - Information technology. Radio frequency identification for item management
- BS-ISO/IEC-18000-62 - Information technology. Radio frequency identification for item management
- BS-ISO/IEC-18000-63 - Information technology. Radio frequency identification for item management
- BS-ISO/IEC-18000-64 - Information technology. Radio frequency identification for item management
- BS-ISO/IEC-18000-7 - Information technology. Radio frequency identification for item management
- BS-ISO/IEC-18004 - Information technology. Automatic identification and data capture techniques. QR Code bar code symbology specification
- BS-ISO/IEC-18014-1 - Information technology. Security techniques. Time- stamping services
- BS-ISO/IEC-18014-2 - Information security. Time-stamping services
- BS-ISO/IEC-18014-3 - Information technology. Security techniques. Time-stamping services
- BS-ISO/IEC-18014-4 - Information technology. Security techniques. Time-stamping services
- BS-ISO/IEC-18028-1 - Information technology. Security techniques. IT network security
- BS-ISO/IEC-18028-2 - Information technology. Security techniques. IT network security
- BS-ISO/IEC-18028-3 - Information technology. Security techniques. IT network security
- BS-ISO/IEC-18028-4 - Information technology. Security techniques. IT network security
- BS-ISO/IEC-18028-5 - Information technology. Security techniques. IT network security
- BS-ISO/IEC-18031 - Information technology. Security techniques. Random bit generation
- BS-ISO/IEC-18032 - Information security. Prime number generation
- BS-ISO/IEC-18033-1 - Information security. Encryption algorithms
- BS-ISO/IEC-18033-2 - Information technology. Security techniques. Encryption algorithms
- BS-ISO/IEC-18033-3 - Information technology. Security techniques. Encryption algorithms
- BS-ISO/IEC-18033-4 - Information technology. Security techniques. Encryption algorithms
- BS-ISO/IEC-18045 - Information technology. Security techniques. Methodology for IT security evaluation
- BS-ISO/IEC-18046 - Information technology. Automatic identification and data capture techniques. Radio frequency identification device performance test methods
- BS-ISO/IEC-18046-1 - Information technology. Radio frequency identification device performance test methods
- BS-ISO/IEC-18046-3 - Information technology. Radio frequency identification device performance test methods
- BS-ISO/IEC-18046-4 - Information technology. Radio frequency identification device performance test methods
- BS-ISO/IEC-18047-2 - Information technology. Radio frequency identification device conformance test methods
- BS-ISO/IEC-18047-3 - Information technology. Radio frequency identification device conformance test methods
- BS-ISO/IEC-18047-4 - Information technology. Radio frequency identification device conformance test methods
- BS-ISO/IEC-18047-6 - Information technology. Radio frequency identification device conformance test methods
- BS-ISO/IEC-18180 - Information technology. Specification for the Extensible Configuration Checklist Description Format (XCCDF) Version 1.2
- BS-ISO/IEC-18305 - Information technology. Real time locating systems. Test and evaluation of localization and tracking systems
- BS-ISO/IEC-18370-1 - Information technology. Security techniques. Blind digital signatures
- BS-ISO/IEC-18370-2 - Information technology. Security techniques. Blind digital signatures
- BS-ISO/IEC-18477-1 - Information technology. Scalable compression and coding of continuous-tone still images
- BS-ISO/IEC-18477-2 - Information technology. Scalable compression and coding of continuous-tone still images
- BS-ISO/IEC-18477-3 - Information technology. Scalable compression and coding of continuous-tone still images
- BS-ISO/IEC-18477-6 - Information technology. Scalable compression and coding of continuous-tone still images
- BS-ISO/IEC-18477-7 - Information technology. Scalable compression and coding of continuous-tone still images
- BS-ISO/IEC-19592-1 - Information technology. Security techniques. Secret sharing
- BS-ISO/IEC-19762-1 - Information technology. Automatic identification and data capture (AIDC) techniques. Harmonized vocabulary
- BS-ISO/IEC-19762-2 - Information technology. Automatic identification and data capture (AIDC) techniques. Harmonized vocabulary
- BS-ISO/IEC-19762-3 - Information technology. Automatic identification and data capture (AIDC) techniques. Harmonized vocabulary. Radio frequency identification (RFID)
- BS-ISO/IEC-19762-4 - Information technology. Automatic identification and data capture (AIDC) techniques. Harmonized vocabulary
- BS-ISO/IEC-19762-5 - Information technology. Automatic identification and data capture (AIDC) techniques. Harmonized vocabulary
- BS-ISO/IEC-19763-1 - Information technology. Metamodel framework for interoperability (MFI)
- BS-ISO/IEC-19763-10 - Information technology. Metamodel framework for interoperability (MFI)
- BS-ISO/IEC-19763-12 - Information technology. Metamodel framework for interoperability (MFI)
- BS-ISO/IEC-19763-3 - Information technology. Metamodel framework for interoperability (MFI)
- BS-ISO/IEC-19763-5 - Information technology. Metamodel framework for interoperability (MFI)
- BS-ISO/IEC-19763-6 - Information technology. Metamodel framework for interoperability (MFI)
- BS-ISO/IEC-19763-7 - Information technology. Metamodel framework for interoperability (MFI)
- BS-ISO/IEC-19763-8 - Information technology. Metamodel framework for interoperability (MFI)
- BS-ISO/IEC-19772 - Information security. Authenticated encryption
- BS-ISO/IEC-19773 - Information technology. Metadata registries (MDR) modules
- BS-ISO/IEC-19784-1 - Information technology. Biometric application programming interface
- BS-ISO/IEC-19784-2 - Information technology. Biometric application programming interface
- BS-ISO/IEC-19785-1 - Information technology. Common Biometric Exchange Formats Framework
- BS-ISO/IEC-19785-2 - Information technology. Common Biometric Exchange Formats Framework
- BS-ISO/IEC-19785-3 - Information technology. Common Biometric Exchange Formats Framework
- BS-ISO/IEC-19785-4 - Information technology. Common Biometric Exchange Formats Framework
- BS-ISO/IEC-19790 - Information technology. Security techniques. Security requirements for cryptographic modules
- BS-ISO/IEC-19792 - Information technology. Security techniques. Security evaluation of biometrics
- BS-ISO/IEC-19794-1 - Information technology. Biometric data interchange formats
- BS-ISO/IEC-19794-10 - Information technology. Biometric data interchange formats
- BS-ISO/IEC-19794-11 - Information technology. Biometric data interchange formats
- BS-ISO/IEC-19794-14 - Information technology. Biometric data interchange formats
- BS-ISO/IEC-19794-2 - Information technology. Biometric data interchange formats
- BS-ISO/IEC-19794-3 - Information technology. Biometric data interchange formats
- BS-ISO/IEC-19794-4 - Information technology. Biometric data interchange formats
- BS-ISO/IEC-19794-5 - Information technology. Biometric data interchange formats
- BS-ISO/IEC-19794-6 - Information technology. Biometric data interchange formats
- BS-ISO/IEC-19794-7 - Information technology. Biometric data interchange formats
- BS-ISO/IEC-19794-8 - Information technology. Biometric data interchange formats
- BS-ISO/IEC-19794-9 - Information technology. Biometric data interchange formats
- BS-ISO/IEC-19795-1 - Information technology. Biometric performance testing and reporting
- BS-ISO/IEC-19795-2 - Information technology. Biometric performance testing and reporting
- BS-ISO/IEC-19795-4 - Information technology. Biometric performance testing and reporting
- BS-ISO/IEC-19795-6 - Information technology. Biometric performance testing and reporting
- BS-ISO/IEC-198223-10 - Information technology. Conformance test methods for security service crypto suites
- BS-ISO/IEC-19823-10 - Information technology. Conformance test methods for security service crypto suites
- BS-ISO/IEC-20008-2 - Information technology. Security techniques. Anonymous digital signatures
- BS-ISO/IEC-20009-1 - Information technology. Security techniques. Anonymous entity authentication
- BS-ISO/IEC-20009-2 - Information technology. Security techniques. Anonymous entity authentication
- BS-ISO/IEC-20243 - Information Technology. Open Trusted Technology ProviderTM Standard (O-TTPS). Mitigating maliciously tainted and counterfeit products
- BS-ISO/IEC-20648 - Information technology. TLS specification for storage systems
- BS-ISO/IEC-20944-1 - Information technology. Metadata Registries Interoperability and Bindings (MDR-IB)
- BS-ISO/IEC-20944-2 - Information technology. Metadata Registries Interoperability and Bindings (MDR-IB)
- BS-ISO/IEC-20944-3 - Information technology. Metadata Registries Interoperability and Bindings (MDR-IB)
- BS-ISO/IEC-20944-4 - Information technology. Metadata Registries Interoperability and Bindings (MDR-IB)
- BS-ISO/IEC-20944-5 - Information technology. Metadata Registries Interoperability and Bindings (MDR-IB)
- BS-ISO/IEC-21000-5 - Information technology. Multimedia framework (MPEG-21)
- BS-ISO/IEC-21000-6 - Information Technology, Multimedia Framework (MPEG-21), Rights Data Dictionary
- BS-ISO/IEC-21000-7 - Information technology. Multimedia framework (MPEG-21)
- BS-ISO/IEC-23000-15 - Information technology. Multimedia application format (MPEG-A)
- BS-ISO/IEC-23001-10 - Information technology. MPEG systems technologies
- BS-ISO/IEC-23001-11 - Information technology. MPEG systems technologies
- BS-ISO/IEC-23001-12 - Information technology. MPEG systems technologies
- BS-ISO/IEC-23001-7 - Information technology. MPEG systems technologies
- BS-ISO/IEC-23001-8 - Information technology. MPEG systems technologies
- BS-ISO/IEC-23002-4 - Information technology. MPEG video technologies
- BS-ISO/IEC-23003-3 - Information technology. MPEG audio technologies
- BS-ISO/IEC-23003-4 - Information technology. MPEG audio technologies
- BS-ISO/IEC-23008-10 - Information technology. High efficiency coding and media delivery in heterogeneous environments
- BS-ISO/IEC-23008-11 - Information technology. High efficiency coding and media delivery in heterogeneous environments
- BS-ISO/IEC-23008-2 - Information technology. High efficiency coding and media delivery in heterogeneous environments
- BS-ISO/IEC-23008-3 - Information technology. High efficiency coding and media delivery in heterogeneous environments
- BS-ISO/IEC-23008-5 - Information technology. High efficiency coding and media delivery in heterogeneous environments
- BS-ISO/IEC-23008-8 - Information technology. High efficiency coding and media delivery in heterogeneous environments
- BS-ISO/IEC-23009-1 - Information technology. Dynamic adaptive streaming over HTTP (DASH)
- BS-ISO/IEC-24708 - Information technology. Biometrics. BioAPI Interworking Protocol
- BS-ISO/IEC-24709-1 - Information technology. Conformance testing for the biometric application programming interface (BioAPI)
- BS-ISO/IEC-24709-2 - Information technology. Conformance testing for the biometric application programming interface (BioAPI)
- BS-ISO/IEC-24713-1 - Information technology. Biometric profiles for interoperability and data interchange
- BS-ISO/IEC-24713-2 - Information technology. Biometric profiles for interoperability and data interchange
- BS-ISO/IEC-24713-3 - Information technology. Biometric profiles for interoperability and data interchange
- BS-ISO/IEC-24723 - Information technology. Automatic identification and data capture techniques. GS1 composite bar code symbology specification
- BS-ISO/IEC-24724 - Information technology. Automatic identification and data capture techniques. GS1 DataBar bar code symbology specification
- BS-ISO/IEC-24728 - Information technology. Automatic identification and data capture techniques. MicroPDF417 bar code symbology specification
- BS-ISO/IEC-24730-1 - Information technology. Real-time locating systems (RTLS)
- BS-ISO/IEC-24730-2 - Information technology. Real time locating systems (RTLS)
- BS-ISO/IEC-24730-21 - Information technology. Real time locating systems (RTLS)
- BS-ISO/IEC-24730-22 - Information technology. Real-time locating systems (RTLS)
- BS-ISO/IEC-24730-5 - Information technology. Real-time locating systems (RTLS)
- BS-ISO/IEC-24730-61 - Information technology. Real time locating systems (RTLS)
- BS-ISO/IEC-24730-62 - Information technology. Real time locating systems (RTLS)
- BS-ISO/IEC-24753 - Information technology. Radio frequency identification (RFID) for item management. Application protocol: encoding and processing rules for sensors and batteries
- BS-ISO/IEC-24759 - Information technology. Security techniques. Test requirements for cryptographic modules
- BS-ISO/IEC-24760-1 - Information technology. Security techniques. A framework for identity management
- BS-ISO/IEC-24761 - Information technology. Security techniques. Authentication context for biometrics
- BS-ISO/IEC-24762 - Information technology. Security techniques. Guidelines for information and communications technology disaster recovery services
- BS-ISO/IEC-24769-2 - Information technology. Real-time locating systems (RTLS) device conformance test methods
- BS-ISO/IEC-24769-5 - Information technology. Automatic identification and data capture techniques. Real time locating systems (RTLS) device conformance test methods
- BS-ISO/IEC-24769-61 - Information Technology. Real Time Locating System (RTLS) Device Conformance Test Methods
- BS-ISO/IEC-24769-62 - Information Technology. Real Time Locating System (RTLS) Device Conformance Test Methods
- BS-ISO/IEC-24770 - Information technology. Real-time locating system (RTLS) device performance test methods. Test methods for air interface communication at 2,4 GHz
- BS-ISO/IEC-24770-61 - Information technology. Real Time Locating System (RTLS) device performance test methods
- BS-ISO/IEC-24770-62 - Information technology. Real-time locating system (RTLS) device performance test methods
- BS-ISO/IEC-24778 - Information technology. Automatic identification and data capture techniques. Aztec Code bar code symbology specification
- BS-ISO/IEC-24779-1 - Information technology. Cross-jurisdictional and societal aspects of implementation of biometric technologies. Pictograms, icons and symbols for use with biometric systems
- BS-ISO/IEC-24779-9 - Information technology. Cross-jurisdictional and societal aspects of implementation of biometric technologies. Pictograms, icons and symbols for use with biometric systems
- BS-ISO/IEC-24791-2 - Information technology. Radio frequency identification (RFID) for item management. Software system infrastructure
- BS-ISO/IEC-24791-3 - Information technology. Radio frequency identification (RFID) for item management. Software system infrastructure
- BS-ISO/IEC-24791-5 - Information technology. Radio frequency identification (RFID) for item management. Software system infrastructure
- BS-ISO/IEC-27000 - Information technology. Security techniques. Information security management systems. Overview and vocabulary
- BS-ISO/IEC-27001 - Information security, cybersecurity and privacy protection. Information security management systems. Requirements
- BS-ISO/IEC-27002 - Information technology. Security techniques. Code of practice for information security controls
- BS-ISO/IEC-27003 - Information technology. Security techniques. Information security management systems. Guidance
- BS-ISO/IEC-27004 - Information technology. Security techniques. Information security management. Monitoring, measurement, analysis and evaluation
- BS-ISO/IEC-27005 - Information technology. Security techniques. Information security risk management
- BS-ISO/IEC-27006 - Information technology. Security techniques. Requirements for bodies providing audit and certification of information security management systems
- BS-ISO/IEC-27007 - Information security, cybersecurity and privacy protection. Guidelines for information security management systems auditing
- BS-ISO/IEC-27009 - Information technology. Security techniques. Sector-specific application of ISO/IEC 27001. Requirements
- BS-ISO/IEC-27010 - Information technology. Security techniques. Information security management for inter-sector and inter-organizational communications
- BS-ISO/IEC-27011 - Information security, cybersecurity and privacy protection. Information security controls based on ISO/IEC 27002 for telecommunications organizations
- BS-ISO/IEC-27011-TC - Tracked Changes. Information security, cybersecurity and privacy protection. Information security controls based on ISO/IEC 27002 for telecommunications organizations
- BS-ISO/IEC-27013 - Information security, cybersecurity and privacy protection. Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1
- BS-ISO/IEC-27014 - Information security, cybersecurity and privacy protection. Governance of information security
- BS-ISO/IEC-27017 - Information technology. Security techniques. Code of practice for information security controls based on ISO/IEC 27002 for cloud services
- BS-ISO/IEC-27018 - Information technology. Security techniques. Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors
- BS-ISO/IEC-27032 - Cybersecurity. Guidelines for Internet security
- BS-ISO/IEC-27033-1 - Information technology. Security techniques. Network security
- BS-ISO/IEC-27033-2 - Information technology. Security techniques. Network security
- BS-ISO/IEC-27033-4 - Information technology. Security techniques. Network security
- BS-ISO/IEC-27033-5 - Information technology. Security techniques. Network security
- BS-ISO/IEC-27033-6 - Information technology. Security techniques. Network security
- BS-ISO/IEC-27034-1 - Information technology. Security techniques. Application security
- BS-ISO/IEC-27034-2 - Information technology. Security techniques. Application security
- BS-ISO/IEC-27034-6 - Information technology. Security techniques. Application security
- BS-ISO/IEC-27035 - Information technology. Security techniques. Information security incident management
- BS-ISO/IEC-27035-1 - Information technology. Security techniques. Information security incident management
- BS-ISO/IEC-27035-2 - Information technology. Information security incident management
- BS-ISO/IEC-27036-1 - Cybersecurity. Supplier relationships
- BS-ISO/IEC-27036-2 - Cybersecurity. Supplier relationships
- BS-ISO/IEC-27036-4 - Information technology. Security techniques. Information security for supplier relationships
- BS-ISO/IEC-27037 - Information technology. Security techniques. Guidelines for identification, collection, acquisition, and preservation of digital evidence
- BS-ISO/IEC-27038 - Information technology. Security techniques. Specification for digital redaction
- BS-ISO/IEC-27039 - Information technology. Security techniques. Selection, deployment and operations of intrusion detection and prevention systems (IDPS)
- BS-ISO/IEC-27040 - Information technology. Security techniques. Storage security
- BS-ISO/IEC-27041 - Information technology. Security techniques. Guidance on assuring suitability and adequacy of incident investigative method
- BS-ISO/IEC-27042 - Information technology. Security techniques. Guidelines for the analysis and interpretation of digital evidence
- BS-ISO/IEC-27043 - Information technology. Security techniques. Incident investigation principles and processes
- BS-ISO/IEC-27050-1 - Information technology. Security techniques. Electronic discovery
- BS-ISO/IEC-27050-3 - Information technology. Electronic discovery
- BS-ISO/IEC-29100 - Information technology. Security techniques. Privacy framework
- BS-ISO/IEC-29101 - Information technology. Security techniques. Privacy architecture framework
- BS-ISO/IEC-29109-1 - Information technology. Conformance testing methodology for biometric data interchange formats defined in ISO/IEC 19794
- BS-ISO/IEC-29109-2 - Information technology. Conformance testing methodology for biometric data interchange formats defined in ISO/IEC 19794
- BS-ISO/IEC-29109-4 - Information technology. Conformance testing methodology for biometric data interchange formats defined in ISO/IEC 19794
- BS-ISO/IEC-29109-5 - Information technology. Conformance testing methodology for biometric data interchange formats defined in ISO/IEC 19794
- BS-ISO/IEC-29109-6 - Information technology. Conformance testing methodology for biometric data interchange formats defined in ISO/IEC 19794
- BS-ISO/IEC-29109-7 - Information technology. Conformance testing methodology for biometric data interchange formats defined in ISO/IEC 19794
- BS-ISO/IEC-29109-8 - Information technology. Conformance testing methodology for biometric data interchange formats defined in ISO/IEC 19794
- BS-ISO/IEC-29109-9 - Information technology. Conformance testing methodology for biometric data interchange formats defined in ISO/IEC 19794
- BS-ISO/IEC-29115 - Information technology. Security techniques. Entity authentication assurance framework
- BS-ISO/IEC-29120-1 - Information technology. Machine readable test data for biometric testing and reporting
- BS-ISO/IEC-29128 - Information technology. Security techniques. Verification of cryptographic protocols
- BS-ISO/IEC-29133 - Information technology. Automatic identification and data capture techniques. Quality test specification for rewritable hybrid media data carriers
- BS-ISO/IEC-29141 - Information technology. Biometrics. Tenprint capture using biometric application programming interface (BioAPI)
- BS-ISO/IEC-29146 - Information technology Security techniques A framework for access management
- BS-ISO/IEC-29147 - Information technology. Security techniques. Vulnerability disclosure
- BS-ISO/IEC-29150 - Information technology. Security techniques. Signcryption
- BS-ISO/IEC-29159-1 - Information technology. Biometric calibration, augmentation and fusion data
- BS-ISO/IEC-29160 - Information technology. Radio frequency identification for item management. RFID Emblem
- BS-ISO/IEC-29161 - Information technology. Data structure. Unique identification for the Internet of Things
- BS-ISO/IEC-29164 - Information technology. Biometrics. Embedded BioAPI
- BS-ISO/IEC-29167-1 - Information technology. Automatic identification and data capture techniques
- BS-ISO/IEC-29170-2 - Information technology. Advanced image coding and evaluation
- BS-ISO/IEC-29173-1 - Information technology. Mobile item identification and management
- BS-ISO/IEC-29175 - Information technology. Mobile item identification and management. User data for Mobile AIDC services
- BS-ISO/IEC-29176 - Information technology. Mobile item identification and management. Consumer privacy-protection protocol for Mobile RFID services
- BS-ISO/IEC-29177 - Information technology. Automatic identification and data capture technique. Identifier resolution protocol for multimedia information access triggered by tag-based identification
- BS-ISO/IEC-29178 - Information technology. Mobile item identification and management. Service broker for Mobile AIDC services
- BS-ISO/IEC-29190 - Information technology. Security techniques. Privacy capability assessment model
- BS-ISO/IEC-29191 - Information technology. Security techniques. Requirements for partially anonymous, partially unlinkable authentication
- BS-ISO/IEC-29192-1 - Information technology. Security techniques. Lightweight cryptography
- BS-ISO/IEC-29192-2 - Information security. Lightweight cryptography
- BS-ISO/IEC-29192-3 - Information technology. Security techniques. Lightweight cryptography
- BS-ISO/IEC-29192-4 - Information technology. Security techniques. Lightweight cryptography
- BS-ISO/IEC-29192-5 - Information technology. Security techniques. Lightweight cryptography
- BS-ISO/IEC-29794-1 - Information technology. Biometric sample quality
- BS-ISO/IEC-29794-6 - Information technology. Biometric sample quality
- BS-ISO/IEC-30106-1 - Information technology. Object oriented BioAPI
- BS-ISO/IEC-30106-2 - Information technology. Object oriented BioAPI
- BS-ISO/IEC-30106-3 - Information technology. Object oriented BioAPI
- BS-ISO/IEC-30108-1 - Information technology. Biometric Identity Assurance Services
- BS-ISO/IEC-30111 - Information technology. Security techniques. Vulnerability handling processes
- BS-ISO/IEC-30116 - Information technology. Automatic identification and data capture techniques. Optical Character Recognition (OCR) quality testing
- BS-ISO/IEC-6523-1 - Information technology. Structure for the identification of organizations and organization parts
- BS-ISO/IEC-6523-2 - Information technology. Structure for the identification of organizations and organization parts
- BS-ISO/IEC-8632-3 - Information technology. Computer graphics. Metafile for the storage and transfer of picture description information
- BS-ISO/IEC-8632-4 - Information technology. Computer graphics. Metafile for the storage and transfer of picture description information
- BS-ISO/IEC-8859-1 - Information technology. 8-bit single-byte coded graphic character sets
- BS-ISO/IEC-8859-15 - Information technology. 8-bit single-byte coded graphic character sets
- BS-ISO/IEC-8859-4 - Information technology. 8-bit single-byte coded graphic character sets
- BS-ISO/IEC-9541-1 - Information technology. Font information interchange
- BS-ISO/IEC-9541-2 - Information technology. Font information interchange
- BS-ISO/IEC-9796-2 - Information technology. Security techniques. Digital signature schemes giving message recovery
- BS-ISO/IEC-9796-3 - Information technology. Security techniques. Digital signature schemes giving message recovery
- BS-ISO/IEC-9797-2 - Information security. Message authentication codes (MACs)
- BS-ISO/IEC-9797-3 - Information technology. Security techniques. Message Authentication Codes (MACs)
- BS-ISO/IEC-9798-1 - Information technology. Security techniques. Entity authentication
- BS-ISO/IEC-9798-2 - IT Security techniques. Entity authentication
- BS-ISO/IEC-9798-3 - IT Security techniques. Entity authentication
- BS-ISO/IEC-9798-4 - Information technology. Security techniques. Entity authentication
- BS-ISO/IEC-9798-5 - Information technology. Security techniques. Entity authentication
- BS-ISO/IEC-9798-6 - Information technology. Security techniques. Entity authentication
- BS-ISO/IEC-9979 - Information technology. Security techniques. Procedures for the registration of cryptographic algorithms
- BS-ISO/IEC-TR-14516 - Information technology. Security techniques. Guidelines for the use and management of trusted third party services
- BS-ISO/IEC-TR-15285 - Information technology. An operational model for characters and glyphs
- BS-ISO/IEC-TR-15947 - Information technology. Security techniques. IT intrusion detection framework
- CWA-13404 - Catalogue of High-Level Naming Schemes & Incompatibility Issues
- CWA-13620-1 - Escrow Guide, Guidelines for Acquirers, Developers, Escrow Agents & Quality Assessors,
- CWA-13620-2 - Guide To Using Source Code Escrow To Protect Procurement, Escrowguide, Guidelines For
- CWA-13620-3 - Developer's Guide To Taking Part in Source Code Escrow, Escrowguide, Guidelines for Ac
- CWA-13620-4 - Guide To Providing a Reliable Escrow Service, Escrowguide, Guidelines for Acquirers, D
- CWA-13620-5 - Guide To Auditing the Escrow Process, Escrowguide, Guidelines for Acquirers, Developer
- CWA-13873 - Information Technology, Multilingual European Subsets in ISO/IEC 10646-1
- CWA-14088-3 - Part 3: Protocols of Security & the Interoperable Authentication at the Level of the S
- CWA-14167-1 - Security Requirements for Trustworthy Systems Managing Certificates for Electronic Sig
- CWA-14167-2 - Crytographic Module for Csp Signing Operations With Back-Up, Protection Profile (Cmcso
- CWA-14167-3 - Cryptographic Module for Csp Key Generation Services, Protection Profile (CMCKG-Pp)
- CWA-14167-4 - Cryptographic Module for Csp Signing Operations, Protection Profile (CMCSO-Pp)
- CWA-14168 - Secure Signature-Creation Devices
- CWA-14169 - Secure Signature-Creation Devices 'Eal 4+'
- CWA-14170 - Security Requirements for Signature Creation Applications
- CWA-14171 - General Guidelines for Electronic Signature Verification
- CWA-14172-1 - Eessi Conformity Assessment Guidance, General Introduction
- CWA-14172-2 - Eessi Conformity Assessment Guidance, Certification Authority Services & Processes
- CWA-14172-3 - Eessi Conformity Assessment Guidance, Trustworthy Systems Managing Certificates for El
- CWA-14172-4 - Eessi Conformity Assessment Guidance, Signature-Creation Applications & General Guidel
- CWA-14172-5 - Eessi Conformity Assessment Guidance, Secure Signature-Creation Devices
- CWA-14172-6 - Eessi Conformity Assessment Guidance, Signature-Creation Device Supporting Signatures
- CWA-14172-7 - Eessi Conformity Assessment Guidance, Cryptographic Modules Used by Certification Ser
- CWA-14172-8 - Eessi Conformity Assessment Guidance, Time-Stamping Authority Services & Processes
- CWA-14355 - Guidelines for the Implementation of Secure Signature-Creation Devices
- CWA-14365-1 - Guide on the Use of Electronic Signatures, Legal & Technical Aspects
- CWA-14365-2 - Guide on the Use of Electronic Signatures, Protection Profile for Software Signature C
- CWA-14590 - Description of Language Capabilities
- CWA-14708 - Practical Use of Electronic Signatures in E-Commerce: a Guide for Smes
- CWA-15262 - Inventory of Data Protection Auditing Practices
- CWA-15263 - Analysis of Privacy Protection Technologies, Privacy-Enhancing Technologies (Pet), PRI
- CWA-15929 - Best Practices for the Design & Development of Critical Information Systems
- CWA-16036 - CYBER-Identity, Unique Identification Systems for Organizations & Parts Thereof
- CWA-16200 - Guide To the Development & Use of Standards Compliant Data Formats for Engineering Mat
- DD-8723-5 - Structured vocabularies for information retrieval. Guide
- DD-CEN-14826 - Postal services. Automatic identificaton of items. Two dimensional code symbol print quality specification or machine readable Digital Postage Marks
- DD-ENV-13608-1 - Health informatics. Security for healthcare communication. Concepts and terminology
- DD-ENV-13608-2 - Health informatics. Security for healthcare communication. Secure data objects
- DD-ENV-13608-3 - Health informatics. Security for healthcare communication
- DD-ENV-13710 - European Ordering Rules, Ordering of Characteristics From the Latin, Greek & Cyrillic
- DD-ENV-41506 - Information Systems Interconnection. Data stream formats for information received from or transmitted to the Teletex service or private information processing systems using Teletex technology
- DD-IEC-62045-1 - Multimedia security. Guideline for privacy protection of equipment and systems in and out of use. General
- DD-IEC/PAS-62443-3 - Security for industrial process measurement and control
- DISC-PD-3003 - Are you ready for a BS 7799 audit
- KIT-20 - Information Security Standards Kit
- PAS-555 - Cyber security risk. Governance and management. Specification
- PAS-74 - Internet safety. Access control systems for the protection of children online. Specification
- PAS-754 - Software Trustworthiness. Governance and management. Specification
- PD-3002 - Guide To BS-7799 Risk Assessment
- PD-3003 - Are You Ready for a BS-7799 Audit
- PD-3004 - Guide To the Implementation & Auditing of BS-7799 Controls
- PD-3005 - Guide on the Selection of BS-7799-2 Controls
- PD-6631 - Technical guide to ISO/IEC 13522-5:1997. Information technology. Coding of multimedia and hypermedia information. Support for base-level interactive applications (MHEG-5)
- PD-6777 - Guide to practical implementation of JPEG 2000
- PD-CEN-419221-1 - Protection Profiles for TSP cryptographic modules
- PD-CEN-419221-2 - Protection Profiles for TSP cryptographic modules
- PD-CEN-419221-3 - Protection Profiles for TSP Cryptographic modules
- PD-CEN-419221-4 - Protection Profiles for TSP cryptographic modules
- PD-CEN-419261 - Security requirements for trustworthy systems managing certificates and time-stamps
- PD-IEC-62443-2-3 - Security for industrial automation and control systems
- PD-IEC-62871-1 - Professional video storage products. Tape-less camera recorder using MXF file format. Encoding guidelines
- PD-ISO-28560-4 - Information and documentation. RFID in libraries
- PD-ISO/IEC-15443-1 - Information technology. Security techniques. Security assurance framework
- PD-ISO/IEC-15443-2 - Information technology. Security techniques. Security assurance framework
- PD-ISO/IEC-15443-3 - Information technology. Security techniques. A framework for IT security assurance
- PD-ISO/IEC-15446 - Information technology. Security techniques. Guidance for the production of protection profiles and security targets
- PD-ISO/IEC-18044 - Information technology. Security techniques. Information security incident management
- PD-ISO/IEC-18046 - Information technology. Automatic identification and data capture techniques. Radio frequency identification device performance test methods
- PD-ISO/IEC-18047-2 - Information technology. Radio frequency identification device conformance test methods. Test methods for air interface communications below 135 kHz
- PD-ISO/IEC-18047-6 - Information technology. Radio frequency identification device conformance test methods
- PD-ISO/IEC-18047-7 - Information technology. Radio frequency identification device conformance test methods
- PD-ISO/IEC-19566-1 - Information technology. JPEG Systems
- PD-ISO/IEC-19763-9 - Information technology. Metamodel framework for interoperability (MFI)
- PD-ISO/IEC-19782 - Information technology. Automatic identification and data capture techniques. Effects of gloss and low substrate opacity on reading of bar coding symbols
- PD-ISO/IEC-19791 - Information technology. Security techniques. Security assessment of operational systems
- PD-ISO/IEC-19795-3 - Information technology. Biometric performance testing and reporting
- PD-ISO/IEC-20004 - Information technology. Security techniques. Refining software vulnerability analysis under ISO/IEC 15408 and ISO/IEC 18045
- PD-ISO/IEC-20027 - Biometrics interoperability profiles. Best practices for slap tenprint captures
- PD-ISO/IEC-20943-5 - Information technology. Procedures for achieving metadata registry content consistency
- PD-ISO/IEC-20943-6 - Information technology. Procedures for achieving metadata registry content consistency
- PD-ISO/IEC-23008-13 - Information technology. High efficiency coding and media delivery in heterogeneous environments
- PD-ISO/IEC-23009-3 - Information technology. Dynamic adaptive streaming over HTTP (DASH)
- PD-ISO/IEC-24710 - Information technology. Radio frequency identification for item management. Elementary tag licence plate funtionality for ISO/IEC 18000 air interface definitions
- PD-ISO/IEC-24720 - Information technology. Automatic identification and data capture techniques. Guidelines for direct part marking (DPM)
- PD-ISO/IEC-24722 - Information technology. Biometrics. Multimodal and other multibiometric fusion
- PD-ISO/IEC-24741 - Information technology. Biometrics. Overview and application
- PD-ISO/IEC-27001 - Information Security Management Systems
- PD-ISO/IEC-27008 - Information technology. Security techniques. Guidelines for the assessment of information security controls
- PD-ISO/IEC-27019 - Information technology. Security techniques. Information security management guidelines based on ISO/IEC 27002 for process control systems specific to the energy utility industry
- PD-ISO/IEC-27023 - Information technology. Security techniques. Mapping the revised editions of ISO/IEC 27001 and ISO/IEC 27002
- PD-ISO/IEC-29144 - Information technology. Biometrics. The use of biometric technology in commercial Identity Management applications and processes
- PD-ISO/IEC-29149 - Information technology. Security techniques. Best practices for the provision and use of time-stamping services
- PD-ISO/IEC-29156 - Information technology. Guidance for specifying performance requirements to meet security and usability needs in applications using biometrics
- PD-ISO/IEC-29158 - Information technology. Automatic identification and data capture techniques. Direct Part Mark (DPM) Quality Guideline
- PD-ISO/IEC-29172 - Information technology. Mobile item identification and management. Reference architecture for Mobile AIDC services
- PD-ISO/IEC-29189 - Information technology. Biometrics. Evaluation of examiner assisted biometric applications
- PD-ISO/IEC-29194 - Information Technology. Biometrics. Guide on designing accessible and inclusive biometric systems
- PD-ISO/IEC-29195 - Traveller processes for biometric recognition in automated border
- PD-ISO/IEC-29196 - Information technology. Guidance for biometric enrolment
- PD-ISO/IEC-29198 - Information technology. Biometrics. Characterization and measurement of difficulty for fingerprint databases for technology evaluation
- PD-ISO/IEC-29794-4 - Information technology. Biometric sample quality
- PD-ISO/IEC-29794-5 - Information technology. Biometric sample quality
- PD-ISO/IEC-30104 - Information Technology. Security Techniques. Physical Security Attacks, Mitigation Techniques and Security Requirements
- PD-ISO/IEC-30110 - Information technology. Cross jurisdictional and societal aspects of implementation of biometric technologies. Biometrics and children
- PD-ISO/IEC-30125 - Information technology. Biometrics used with mobile devices
IEC:
- IEC-61937-6 - Digital audio - Interface for non-linear PCM encoded audio bitstreams applying IEC 60958 - Part 6: Non-linear PCM bitstreams according to the MPEG-2 AAC and MPEG-4 AAC formats
- IEC-61937-6-AM1 - Amendment 1 - Digital audio - Interface for non-linear PCM encoded audio bitstreams applying IEC 60958 - Part 6: Non-linear PCM bitstreams according to the MPEG-2 AAC and MPEG-4 AAC formats
- IEC-61937-8 - Digital audio - Interface for non-linear PCM encoded audio bitstreams applying IEC 60958 - Part 8: Non-linear PCM bitstreams according to the Windows Media Audio (WMA) Professional format
- IEC-61937-9 - Digital audio - Interface for non-linear PCM encoded audio bitstreams applying IEC 60958 - Part 9: Non-linear PCM bitstreams according to the MAT format
- IEC-61966-9 - Multimedia systems and equipment - Colour measurement and management - Part 9: Digital cameras
- IEC-62045-1 - Multimedia security - Guideline for privacy protection of equipment and systems in and out of use - Part 1: General
- IEC-62090 - Product package labels for electronic components using bar code and two-dimensional symbologies
- IEC-62243 - Artificial Intelligence Exchange and Service Tie to All Test Environments (AI-ESTATE)
- IEC-62261-1 - Part 1: Metadata Dictionary Structure, Television Metadata
- IEC-62261-2 - Part 2: Data Encoding Protocol Using Key-Length-Value, Television Metadata
- IEC-62439 - High Availability Automation Networks
- IEC-62439-1 - Industrial communication networks - High availability automation networks - Part 1: General concepts and calculation methods
- IEC-62439-1-AM2 - Amendment 2 - Industrial communication networks - High availability automation networks - Part 1: General concepts and calculation methods
- IEC-62439-2 - Industrial communication networks - High availability automation networks - Part 2: Media Redundancy Protocol (MRP)
- IEC-62439-3 - Industrial communication networks - High availability automation networks - Part 3: Parallel Redundancy Protocol (PRP) and High-availability Seamless Redundancy (HSR)
- IEC-62439-3-RL - Industrial communication networks - High availability automation networks - Part 3: Parallel Redundancy Protocol (PRP) and High-availability Seamless Redundancy (HSR)
- IEC-62439-4 - Industrial communication networks - High availability automation networks - Part 4: Cross-network Redundancy Protocol (CRP)
- IEC-62439-4-AM1 - Amendment 1 - Industrial communication networks - High availability automation networks - Part 4: Cross-network Redundancy Protocol (CRP)
- IEC-62439-5 - Industrial communication networks - High availability automation networks - Part 5: Beacon Redundancy Protocol (BRP)
- IEC-62439-6 - Industrial communication networks - High availability automation networks - Part 6: Distributed Redundancy Protocol (DRP)
- IEC-62439-7 - Industrial communication networks - High availability automation networks - Part 7: Ring-based Redundancy Protocol (RRP)
- IEC-62443-1-1 - Industrial communication networks - Network and system security - Part 1-1: Terminology, concepts and models
- IEC-62443-2-3 - Security for industrial automation and control systems - Part 2-3: Patch management in the IACS environment
- IEC-62443-2-4 - Security for industrial automation and control systems - Part 2-4: Security program requirements for IACS service providers
- IEC-62443-3-1 - Industrial communication networks - Network and system security - Part 3-1: Security technologies for industrial automation and control systems
- IEC-62537 - Interface for loudspeakers with digital input signals based on IEC 60958
- IEC-62636 - Multimedia home server systems - Implementation of digital rights permission code
- IEC-62871-1 - Professional video strage products - Tape-less camera recorder using MXF file format - Encoding guidelines - Part 1: MXF Operational Pattern
ISO:
- ISO-10585 - Information and documentation -- Armenian alphabet coded character set for bibliographic information interchange
- ISO-10586 - Information and documentation -- Georgian alphabet coded character set for bibliographic information interchange
- ISO-1073-1 - Alphanumeric character sets for optical recognition - Part 1: Character set OCR-A - Shapes and dimensions of the printed image
- ISO-1073-2 - Alphanumeric character sets for optical recognition - Part 2: Character set OCR-B - Shapes and dimensions of the printed image
- ISO-10754 - Information and documentation -- Extension of the Cyrillic alphabet coded character set for non-Slavic languages for bibliographic information interchange
- ISO-1113 - Information processing - Representation of the 7- bit coded character set on punched tape
- ISO-11822 - Information and documentation -- Extension of the Arabic alphabet coded character set for bibliographic information interchange
- ISO-13230 - Ophthalmic optics -- Bar code specifications
- ISO-15000-1 - Electronic business eXtensible Markup Language (ebXML) - Part 1: Messaging service core specification
- ISO-15000-2 - Electronic business eXtensible Markup Language (ebXML) - Part 2: Applicability Statement (AS) profile of ebXML messaging service
- ISO-15000-3 - Electronic business eXtensible Markup Language (ebXML) - Part 3: Registry and repository
- ISO-15000-4 - Electronic business eXtensible Markup Language (ebXML) - Part 4: Registry services specification (ebRS)
- ISO-15000-5 - Electronic Business Extensible Markup Language (ebXML) - Part 5: Core Components Specification (CCS)
- ISO-15000-5-AM1 - Amendment 1, Part 5: Ebxml Core Components Technical Specification, Version 2.01 (Ebcc
- ISO-15394 - Packaging - Bar code and two-dimensional symbols for shipping, transport and receiving labels
- ISO-15444-1 - Information technology - JPEG 2000 image coding system: Core coding system
- ISO-18231 - Iron ores - Wavelength dispersive X-ray fluorescence spectrometers - Determination of precision
- ISO-1831 - Printing specifications for optical character recognition
- ISO-2033 - Information processing - Coding of machine readable characters (MICR and OCR)
- ISO-2047 - Information processing - Graphical representations for the control characters of the 7- bit coded character set
- ISO-26428-1 - Digital cinema (D-cinema) distribution master - Part 1: Image characteristics
- ISO-26428-11 - Digital cinema (D-cinema) distribution master - Part 11: Additional frame rates
- ISO-26428-19 - Digital cinema (D-cinema) distribution master - Part 19: Serial digital interface signal formatting for additional frame rates level AFR2 and level AFR4
- ISO-26428-2 - Digital cinema (D-cinema) distribution master - Part 2: Audio characteristics
- ISO-26428-3 - Digital cinema (D-cinema) distribution master - Part 3: Audio channel mapping and channel labeling
- ISO-26428-9 - Digital cinema (D-cinema) distribution master - Part 9: Image pixel structure level 3 - Serial digital interface signal formatting
- ISO-26429-10 - Digital cinema (D-cinema) packaging - Part 10: Stereoscopic picture track file
- ISO-26429-3 - Digital cinema (D-cinema) packaging - Part 3: Sound and picture track file
- ISO-26429-4 - Digital cinema (D-cinema) packaging - Part 4: MXF JPEG 2000 application
- ISO-26429-6 - Digital cinema (D-cinema) packaging - Part 6: MXF track file essence encryption
- ISO-26429-7 - Digital cinema (D-cinema) packaging - Part 7: Composition playlist
- ISO-26429-8 - Digital cinema (D-cinema) packaging - Part 8: Packing list
- ISO-26429-9 - Digital cinema (D-cinema) packaging - Part 9: Asset mapping and file segmentation
- ISO-26430-1 - Digital cinema (D-cinema) operations - Part 1: Key delivery message
- ISO-26430-2 - Digital cinema (D-cinema) operations - Part 2: Digital certificate
- ISO-26430-3 - Digital cinema (D-cinema) operations - Part 3: Generic extra-theater message format
- ISO-26430-4 - Digital cinema (D-cinema) operations - Part 4: Log record format specification
- ISO-26430-5 - Digital cinema (D-cinema) operations - Part 5: Security log event class and constraints
- ISO-26430-6 - Digital cinema (D-cinema) operations - Part 6: Auditorium security messages for intra-theater communications
- ISO-26430-9 - Digital cinema (D-cinema) operations - Part 9: Key delivery bundle
- ISO-26433 - Digital cinema (D-cinema) - XML data types
- ISO-28219 - Packaging - Labelling and direct product marking with linear bar code and two-dimensional symbols
- ISO-28560-1 - Information and documentation - RFID in libraries - Part 1: Data elements and general guidelines for implementation
- ISO-28560-2 - Information and documentation - RFID in libraries - Part 2: Encoding of RFID data elements based on rules from ISO/IEC 15962
- ISO-28560-3 - Information and documentation - RFID in libraries - Part 3: Fixed length encoding
- ISO-28560-4 - Information and documentation - RFID in libraries - Part 4: Encoding of data elements based on rules from ISO/IEC 15962 in an RFID tag with partitioned memory
- ISO-3275 - Information processing - Implementation of the 7- bit coded character set and its 7- bit and 8- bit extensions on 3,81 mm magnetic cassette for data interchange
- ISO-5426 - Extension of the Latin alphabet coded character set for bibliographic information interchange
- ISO-5426-2 - Information and documentation -- Extension of the Latin alphabet coded character set for bibliographic information interchange -- Part 2: Latin characters used in minor European languages and obsolete typography
- ISO-5427 - Extension of the Cyrillic alphabet coded character set for bibliographic information interchange
- ISO-5428 - Greek alphabet coded character set for bibliographic information interchange
- ISO-6093 - Information processing - Representation of numerical values in character strings for information interchange
- ISO-6438 - Documentation -- African coded character set for bibliographic information interchange
- ISO-6586 - Data processing - Implementation of the ISO 7- bit and 8- bit coded character sets on punched cards
- ISO-6630 - Documentation -- Bibliographic control characters
- ISO-6709 - Standard representation of geographic point location by coordinates
- ISO-6861 - Information and documentation -- Glagolitic alphabet coded character set for bibliographic information interchange
- ISO-6862 - Information and documentation -- Mathematical coded character set for bibliographic information interchange
- ISO-6936 - Information processing - Conversion between the two coded character sets of ISO 646 and ISO 6937-2 and the CCITT international telegraph alphabet No. 2 (ITA 2)
- ISO-8957 - Information and documentation -- Hebrew alphabet coded character sets for bibliographic information interchange
- ISO-9036 - Information processing - Arabic 7-bit coded character set for information interchange
- ISO-9160 - Information processing - Data encipherment - Physical layer interoperability requirements
- ISO-9281-1 - Information technology - Picture coding methods - Part 1: Identification
- ISO-9281-2 - Information technology - Picture coding methods - Part 2: Procedure for registration
- ISO-962 - Information processing - Implementation of the 7- bit coded character set and its 7- bit and 8-bit extensions on 9- track 12,7 mm (0.5 in) magnetic tape
- ISO/IEC-10116 - Information technology - Security techniques - Modes of operation for an n-bit block cipher
- ISO/IEC-10118-1 - Information technology - Security techniques - Hash-functions - Part 1: General
- ISO/IEC-10118-2 - Information technology - Security techniques - Hash-functions - Part 2: Hash-functions using an n-bit block cipher
- ISO/IEC-10118-3 - IT Security techniques - Hash-functions - Part 3: Dedicated hash-functions
- ISO/IEC-10118-3-1 - Information technology - Security techniques - Hash-functions - Part 3: Dedicated hash-functions - Amendment 1: Dedicated Hash-Function 8 (SHA-224)
- ISO/IEC-10118-4 - Information technology - Security techniques - Hash-functions - Part 4: Hash-functions using modular arithmetic
- ISO/IEC-10118-4-AM1 - - Amendment 1: Object identifiers
- ISO/IEC-10367 - Information technology - Standardized coded graphic character sets for use in 8-bit codes
- ISO/IEC-10538 - Information technology - Control functions for text communication
- ISO/IEC-10646 - Information technology - Universal coded character set (UCS)
- ISO/IEC-10646-1 - Information technology -- Universal Multiple-Octet Coded Character Set (UCS) -- Part 1: Architecture and Basic Multilingual Plane
- ISO/IEC-10646-1-1 - Amendment 1: Mathematical Symbols & Other Characters, Part 1: Architecture & Basic Multili
- ISO/IEC-10646-1-1 CD - Amendment 1: Mathematical Symbols & Other Characters, Part 1: Architecture & Basic Multili
- ISO/IEC-10646-1 CD - Information Technology - Universal Multiple-Octet Coded Character Set (Ucs) - Part 1: Arch
- ISO/IEC-10646-2 - Part 2: Supplementary Planes, Information Technology - Universal Multiple-Octet Coded Char
- ISO/IEC-10646-3 - Amendment 3: Lepcha, Ol Chiki, Saurashtra, Vai & Other Characters, Information Technol
- ISO/IEC-10646-4 - Amendment 4: Cham, Game Tiles, & Other Characters, Information Technology - Universal
- ISO/IEC-10646-5 - Amendment 5: Tai Tham, Tai Viet, Avestan, Egyptian Hieroglyphs, Cjk Unified Ideographs
- ISO/IEC-10646-6 - Amendment 6: Bamum, Javanese, Lisu, Meetei Mayek, Samaritan, & Other Characters, Infor
- ISO/IEC-10646-AM1 - - Amendment 1: Information technology - Universal coded character set (UCS) - Amendment 1: CJK Unified Ideographs Extension H, Vithkuqi, Old Uyghur, Cypro-Minoan, and other characters
- ISO/IEC-10646-AM 1 - - Amendment 1: Cherokee supplement and other characters
- ISO/IEC-10646-AM2 - - Amendment 2: Nandinagari, Georgian extension, and other characters
- ISO/IEC-10646-AM 2 - Amendment 2: N'ko, PHAGS-Pa, Phoenician & Other Characters, Information Technology -
- ISO/IEC-10646-AM3 - Amendment 3: Lepcha, Ol Chiki, Saurashtra, Vai & Other Characters, Information Technol
- ISO/IEC-10646-AM7 - Amendment 7: Mandaic, Batak, Brahmi, & Other Characters, Information Technology - Univ
- ISO/IEC-10918-1 - Information technology - Digital compression and coding of continuous-tone still images: Requirements and guidelines
- ISO/IEC-10918-2 - Information technology - Digital compression and coding of continuous-tone still images: Compliance testing
- ISO/IEC-10918-3 - Information technology - Digital compression and coding of continuous-tone still images: Extensions
- ISO/IEC-10918-3-1 - Provisions to allow registration of new compression types and versions in the SPIFF header
- ISO/IEC-10918-4 - Information technology -- Digital compression and coding of continuous-tone still images: Registration of JPEG profiles, SPIFF profiles, SPIFF tags, SPIFF colour spaces, APPn markers, SPIFF compression types and Registration Authorities (REGAUT) -- Part 4:
- ISO/IEC-10918-4-AM1 - - Amendment 1: Application specific marker list
- ISO/IEC-109185 - Information technology - Digital compression and coding of continuous-tone still images: JPEG File Interchange Format (JFIF)
- ISO/IEC-10918-5 - Information technology - Digital compression and coding of continuous-tone still images: JPEG File Interchange Format (JFIF)
- ISO/IEC-10918-6 - Information technology - Digital compression and coding of continuous-tone still images: Application to printing systems
- ISO/IEC-11172-1 - Information technology - Coding of moving pictures and associated audio for digital storage media at up to about 1,5 Mbit/s - Part 1: Systems
- ISO/IEC-11172-2 - Information technology - Coding of moving pictures and associated audio for digital storage media at up to about 1,5 Mbit/s - Part 2: Video
- ISO/IEC-11172-3 - Information technology - Coding of moving pictures and associated audio for digital storage media at up to about 1,5 Mbit/s - Part 3: Audio
- ISO/IEC-11172-4 - Information technology - Coding of moving pictures and associated audio for digital storage media at up to about 1,5 Mbit/s - Part 4: Conformance testing
- ISO/IEC-11172-5 - Information technology - Coding of moving pictures and associated audio for digital storage media at up to about 1,5 Mbit/s - Part 5: Software simulation
- ISO/IEC-11179-1 - Information technology - Metadata registries (MDR) - Part 1: Framework
- ISO/IEC-11179-2 - Information technology - Metadata registries (MDR) - Part 2: Classification
- ISO/IEC-11179-3 - Information technology - Metadata registries (MDR) - Part 3: Metamodel for registry common facilities
- ISO/IEC-11179-4 - Information technology - Metadata registries (MDR) - Part 4: Formulation of data definitions
- ISO/IEC-11179-5 - Information technology - Metadata registries (MDR) - Part 5: Naming principles
- ISO/IEC-11179-6 - Information technology - Metadata registries (MDR) - Part 6: Registration
- ISO/IEC-11544 - Information technology - Coded representation of picture and audio information - Progressive bi-level image compression
- ISO/IEC-11770-1 - Information technology - Security techniques - Key management - Part 1: Framework
- ISO/IEC-11770-2 - IT Security techniques - Key management - Part 2: Mechanisms using symmetric techniques
- ISO/IEC-11770-3 - Information security - Key management - Part 3: Mechanisms using asymmetric techniques
- ISO/IEC-11770-4 - Information technology - Security techniques - Key management - Part 4: Mechanisms based on weak secrets
- ISO/IEC-11770-5 - Information security - Key management - Part 5: Group key management
- ISO/IEC-11770-6 - Information technology - Security techniques - Key management - Part 6: Key derivation
- ISO/IEC-11889-1 - Information technology - Trusted Platform Module Library - Part 1: Architecture
- ISO/IEC-11889-2 - Information technology - Trusted Platform Module Library - Part 2: Structures
- ISO/IEC-11889-3 - Information technology - Trusted Platform Module Library - Part 3: Commands
- ISO/IEC-11889-4 - Information technology - Trusted Platform Module Library - Part 4: Supporting Routines
- ISO/IEC-13335-1 - Part 1: Concepts and Models for Information and Communications Technology Security Management,
- ISO/IEC-13335-3 - Part 3: Techniques for the Management of It Security, Information Technology - Guidelines
- ISO/IEC-13335-4 - Part 4: Selection of Safeguards, Information Technology - Guidelines for the Management Of
- ISO/IEC-13522-1 - Information technology - Coding of multimedia and hypermedia information - Part 1: MHEG object representation - Base notation (ASN.1)
- ISO/IEC-13522-3 - Information technology - Coding of multimedia and hypermedia information - Part 3: MHEG script interchange representation
- ISO/IEC-13522-4 - Information technology - Coding of multimedia and hypermedia information - Part 4: MHEG registration procedure
- ISO/IEC-13522-5 - Information technology - Coding of multimedia and hypermedia information - Part 5: Support for base-level interactive applications
- ISO/IEC-13522-6 - Information technology - Coding of multimedia and hypermedia information - Part 6: Support for enhanced interactive applications
- ISO/IEC-13522-7 - Information technology -- Coding of multimedia and hypermedia information -- Part 7: Interoperability and conformance testing for ISO/IEC 13522-5
- ISO/IEC-13522-8 - Information technology -- Coding of multimedia and hypermedia information -- Part 8: XML notation for ISO/IEC 13522-5
- ISO/IEC-13818-1 - Information technology - Generic coding of moving pictures and associated audio information - Part 1: Systems
- ISO/IEC-13818-10 - Information technology -- Generic coding of moving pictures and associated audio information -- Part 10: Conformance extensions for Digital Storage Media Command and Control (DSM-CC)
- ISO/IEC-13818-11 - Information technology - Generic coding of moving pictures and associated audio information - Part 11: IPMP on MPEG-2 systems
- ISO/IEC-13818-1-1 - - Amendment 1: Delivery of timeline for external data
- ISO/IEC-13818-1-2 - - Amendment 2: Carriage of layered HEVC
- ISO/IEC-13818-1-3 - - Amendment 3: Carriage of green metadata in MPEG2 systems
- ISO/IEC-13818-1-4 - - Amendment 4: New profiles and levels for MPEG4 audio descriptor
- ISO/IEC-13818-1-5 - - Amendment 5: Carriage of MPEGH 3D audio over MPEG2 systems
- ISO/IEC-13818-1-6 - - Amendment 6: Carriage of Quality Metadata in MPEG-2 Systems
- ISO/IEC-13818-1 CD - Information Technology - Generic Coding of Moving Pictures &Associated Audio Information:
- ISO/IEC-13818-2 - Information technology - Generic coding of moving pictures and associated audio information - Part 2: Video
- ISO/IEC-13818-2-1 - Amendment 1: Content Description Data, Information Technology - Generic Coding of Moving P
- ISO/IEC-13818-2-2 - Amendment 2: Support for Colur Spaces, Information Technology - Generic Coding of Movi
- ISO/IEC-13818-2-3 - Amendment 3: New Level for 1080@50P/60P, Information Technology - Generic Coding of Mo
- ISO/IEC-13818-2 CD - Information Technology - Generic Coding of Moving Pictures &Associated Audio Information:
- ISO/IEC-13818-3 - Information technology - Generic coding of moving pictures and associated audio information - Part 3: Audio
- ISO/IEC-13818-4 - Information technology - Generic coding of moving pictures and associated audio information - Part 4: Conformance testing
- ISO/IEC-13818-4-1 - Information technology - Generic coding of moving pictures and associated audio information - Part 4: Conformance testing - Amendment 1: MPEG-2 IPMP conformance testing
- ISO/IEC-13818-4-2 - Information technology - Generic coding of moving pictures and associated audio information - Part 4: Conformance testing - Amendment 2: Additional audio conformance test sequences
- ISO/IEC-13818-4-3 - Information technology - Generic coding of moving pictures and associated audio information - Part 4: Conformance testing - Amendment 3: Level for 1080@50p/60p conformance testing
- ISO/IEC-13818-4 CD - Information technology - Generic coding of moving pictures and associated audio information - Part 4: Conformance testing
- ISO/IEC-13818-5 - Information technology - Generic coding of moving pictures and associated audio information - Part 5: Software simulation
- ISO/IEC-13818-5-1-1 - Technical Corrigendum 1 To ISO/IEC-13818-5, Information Technology - Generic Coding of Mov
- ISO/IEC-13818-5-2 - Amendment 2: MPEG-2 Ipmp Reference Software, Information Technology - Generic Coding O
- ISO/IEC-13818-6 - Information technology - Generic coding of moving pictures and associated audio information - Part 6: Extensions for DSM-CC
- ISO/IEC-13818-6-1 - Additions to support data broadcasting
- ISO/IEC-13818-6-2 - Additions to support synchronized download services, opportunistic data services and resource announcement in broadcast and interactive services
- ISO/IEC-13818-6-3 - Information technology - Generic coding of moving pictures and associated audio information - Part 6: Extensions for DSM-CC - Amendment 3: Transport buffer model in support of synchronized user-to-network download protocol
- ISO/IEC-13818-7 - Information technology - Generic coding of moving pictures and associated audio information - Part 7: Advanced Audio Coding (AAC)
- ISO/IEC-13818-7-1 - Information technology - Generic coding of moving pictures and associated audio information - Part 7: Advanced Audio Coding (AAC) - Amendment 1: Transport of MPEG Surround in AAC
- ISO/IEC-13818-9 - Information technology - Generic coding of moving pictures and associated audio information - Part 9: Extension for real time interface for systems decoders
- ISO/IEC-13888-1 - Information security - Non-repudiation - Part 1: General
- ISO/IEC-13888-2 - Information technology - Security techniques - Non-repudiation - Part 2: Mechanisms using symmetric techniques
- ISO/IEC-13888-3 - Information security - Non-repudiation - Part 3: Mechanisms using asymmetric techniques
- ISO/IEC-14492 - Information technology - Lossy/lossless coding of bi-level images
- ISO/IEC-14492-1 - Encoder - Amendment 1: Encoder
- ISO/IEC-14492-2 - Encoder - Amendment 2: Extension of adaptive templates for halftone coding
- ISO/IEC-14492-3 - Information technology - Lossy/lossless coding of bi-level images - Amendment 3: Extension to colour coding
- ISO/IEC-14495-1 - Information technology - Lossless and near-lossless compression of continuous-tone still images: Baseline
- ISO/IEC-14495-2 - Information technology - Lossless and near-lossless compression of continuous-tone still images: Extensions
- ISO/IEC-14496-1 - Information technology - Coding of audio-visual objects - Part 1: Systems
- ISO/IEC-14496-10 - Information technology - Coding of audio-visual objects - Part 10: Advanced video coding
- ISO/IEC-14496-10-1 - Amendment 1 - Support for colour spaces and aspect ratio definitions, Information technology -- Coding of audio-visual objects -- Part 10: Advanced Video Coding
- ISO/IEC-14496-10-2 - Amendment 2 - New profiles for professional applications, Information technology -- Coding of audio-visual objects -- Part 10: Advanced Video Coding
- ISO/IEC-14496-10-AM1 - - Amendment 1: Multi-Resolution frame compatible stereoscopic video with depth maps, additional supplemental enhancement information and video usability information
- ISO/IEC-14496-10-AM2 - Amendment 2: MVC extensions for inclusion of depth maps, Information technology -- Coding of audio-visual objects -- Part 10: Advanced Video Coding
- ISO/IEC-14496-11 - Information technology - Coding of audio-visual objects - Part 11: Scene description and application engine
- ISO/IEC-14496-1-1 - Information technology - Coding of audio-visual objects - Part 1: Systems - Amendment 1: Usage of LASeR in MPEG-4 systems and Registration Authority for MPEG-4 descriptors
- ISO/IEC-14496-11-5 - - Amendment 5: Support for Symbolic Music Notation
- ISO/IEC-14496-11-6 - Information technology - Coding of audio-visual objects - Part 11: Scene description and application engine - Amendment 6:
- ISO/IEC-14496-11-AM7 - ExtendedCore2D profile
- ISO/IEC-14496-12 - Information technology - Coding of audio-visual objects - Part 12: ISO base media file format
- ISO/IEC-14496-1-2 - - Amendment 2: Support for raw audio-visual data
- ISO/IEC-14496-12-1 - - Amendment 1: DRC Extensions
- ISO/IEC-14496-12-2 - - Amendment 2: Support for image file format
- ISO/IEC-14496-12-3 - - Amendment 3: Font streams and other improvements to file format
- ISO/IEC-14496-13 - Information technology - Coding of audio-visual objects - Part 13: Intellectual Property Management and Protection (IPMP) extensions
- ISO/IEC-14496-1-3 - Amendment 3: Jpeg 2000 Support in MPEG-4, Part 1: Systems, Information Technology - Co
- ISO/IEC-14496-14 - Information technology - Coding of audio-visual objects - Part 14: MP4 file format
- ISO/IEC-14496-1-4 - Amendment 4: Sl Extensions & Afx Streams, Part 1: Systems, Information Technology - Coding
- ISO/IEC-14496-14-AM1 - - Amendment 1: Handling of MPEG-4 audio enhancement layers
- ISO/IEC-14496-15 - Information technology - Coding of audio-visual objects - Part 15: Carriage of network abstraction layer (NAL) unit structured video in the ISO base media file format
- ISO/IEC-14496-15-1 - - Amendment 1: Handling of unspecified NAL unit types and other improvements
- ISO/IEC-14496-15-2 - Amendment 2: File Format Support for Scalable Video Coding (Svc), Information Technolo
- ISO/IEC-14496-16 - Information technology - Coding of audio-visual objects - Part 16: Animation Framework eXtension (AFX)
- ISO/IEC-14496-16-1 - Information technology - Coding of audio-visual objects - Part 16: Animation Framework eXtension (AFX) - Amendment 1: Efficient representation of 3D meshes with multiple attributes
- ISO/IEC-14496-16-2 - - Amendment 2: Multi-resolution 3D mesh compression
- ISO/IEC-14496-16-3 - - Amendment 3: Printing material and 3D graphics coding for browsers
- ISO/IEC-14496-17 - Information technology - Coding of audio-visual objects - Part 17: Streaming text format
- ISO/IEC-14496-1-7 - Amendment 7: Use of Avc (Advanced Video Coding) in MPEG-4 Systems, Part 1: Systems, Inform
- ISO/IEC-14496-18 - Information technology - Coding of audio-visual objects - Part 18: Font compression and streaming
- ISO/IEC-14496-1-8 - Amendment 8: New Object Typeindication Code Points, Part 1: Systems, Information Tech
- ISO/IEC-14496-18-AM1 - - Amendment 1: Updated semantics of decoderSpecificInfo and font data description for ISOBMFF
- ISO/IEC-14496-19 - Information technology - Coding of audio-visual objects - Part 19: Synthesized texture stream
- ISO/IEC-14496-2 - Information technology - Coding of audio-visual objects - Part 2: Visual
- ISO/IEC-14496-20 - Information technology - Coding of audio-visual objects - Part 20: Lightweight Application Scene Representation (LASeR) and Simple Aggregation Format (SAF)
- ISO/IEC-14496-20-1 - Information technology - Coding of audio-visual objects - Part 20: Lightweight Application Scene Representation (LASeR) and Simple Aggregation Format (SAF) - Amendment 1: Extensions to support SVGT1.2
- ISO/IEC-14496-20/A2 - Information technology - Coding of audio-visual objects - Part 20: Lightweight Application Scene Representation (LASeR) and Simple Aggregation Format (SAF) - Amendment 2: Technology for scene adaptation
- ISO/IEC-14496-20-A3 - Information technology - Coding of audio-visual objects - Part 20: Lightweight Application Scene Representation (LASeR) and Simple Aggregation Format (SAF) - Amendment 3: Presentation and Modification of Structured Information (PMSI)
- ISO/IEC-14496-21 - Information technology - Coding of audio-visual objects - Part 21: MPEG-J Graphics Framework eXtensions (GFX)
- ISO/IEC-14496-2-1 - Streaming video profile - Amendment 1: Error resilient simple scalable profile
- ISO/IEC-14496-22 - Information technology - Coding of audio-visual objects - Part 22: Open Font Format
- ISO/IEC-14496-2-2 - Streaming video profile - Amendment 2: New Levels for Simple Profile
- ISO/IEC-14496-22-AM1 - - Amendment 1: Color font technology and other updates
- ISO/IEC-14496-22-AM2 - - Amendment 2: Information technology - Coding of audio-visual objects - Part 22: Open Font Format - Amendment 2: Extending colour font functionality and other updates
- ISO/IEC-14496-23 - Information technology - Coding of audio-visual objects - Part 23: Symbolic Music Representation
- ISO/IEC-14496-2-3 - Streaming video profile - Amendment 3: Support for colour spaces
- ISO/IEC-14496-24 - Information technology - Coding of audio-visual objects - Part 24: Audio and systems interaction
- ISO/IEC-14496-2-4 - Streaming video profile - Amendment 4: Simple profile level 6
- ISO/IEC-14496-25 - Information technology - Coding of audio-visual objects - Part 25: 3D Graphics Compression Model
- ISO/IEC-14496-2-5 - Information technology - Coding of audio-visual objects - Part 2: Visual - Amendment 5: Simple studio profile levels 5 and 6
- ISO/IEC-14496-26 - Information technology - Coding of audio-visual objects - Part 26: Audio conformance
- ISO/IEC-14496-26-AM2 - Information technology - Coding of audio-visual objects - Part 26: Audio conformance - Amendment 2: BSAC conformance for broadcasting
- ISO/IEC-14496-26-AM4 - - Amendment 4: AAC Additional Multichannel Conformance Data
- ISO/IEC-14496-27 - Information technology - Coding of audio-visual objects - Part 27: 3D Graphics conformance
- ISO/IEC-14496-27-AM2 - Amendment 2: Scalable complexity 3D mesh coding conformance, Information technology -- Coding of audio-visual objects -- Part 27: 3D Graphics conformance
- ISO/IEC-14496-27-AM3 - Information technology - Coding of audio-visual objects - Part 27: 3D Graphics conformance - Amendment 3: Scalable complexity 3D mesh coding conformance in 3DGCM
- ISO/IEC-14496-27-AM4 - Information technology - Coding of audio-visual objects - Part 27: 3D Graphics conformance - Amendment 4: Conformance for efficient representation of 3D meshes with multiple attributes
- ISO/IEC-14496-27-AM5 - - Amendment 5: Multi-resolution 3D mesh compression
- ISO/IEC-14496-27-AM6 - - Amendment 6: Pattern-based 3D mesh coding conformance
- ISO/IEC-14496-28 - Information technology - Coding of audio-visual objects - Part 28: Composite font representation
- ISO/IEC-14496-29 - Information technology - Coding of audio-visual objects - Part 29: Web video coding
- ISO/IEC-14496-3 - Information technology - Coding of audio-visual objects - Part 3: Audio
- ISO/IEC-14496-30 - Information technology - Coding of audio-visual objects - Part 30: Timed text and other visual overlays in ISO base media file format
- ISO/IEC-14496-3-1 - Information technology - Coding of audio-visual objects - Part 3: Audio - Amendment 1: HD-AAC profile and MPEG Surround signaling
- ISO/IEC-14496-3-2 - Information technology - Coding of audio-visual objects - Part 3: Audio - Amendment 2: ALS simple profile and transport of SAOC
- ISO/IEC-14496-3-3 - Information technology - Coding of audio-visual objects - Part 3: Audio - Amendment 3: Transport of unified speech and audio coding (USAC)
- ISO/IEC-14496-3-4 - - Amendment 4: New levels for AAC profiles
- ISO/IEC-14496-3-5 - - Amendment 5: Support for Dynamic Range Control, New Levels for ALS Simple Profile, and Audio Synchronization
- ISO/IEC-14496-3-6 - - Amendment 6: Profiles, levels and downmixing method for 22.2 channel programs
- ISO/IEC-14496-3-8 - Amendment 8: Mp4Ff Box for Original Audio File Information, Information Technology -
- ISO/IEC-14496-3-9 - Amendment 9: Enhanced Low Delay AAC, Part 3: Audio, Information Technology - Coding Of
- ISO/IEC-14496-4 - Information technology - Coding of audio-visual objects - Part 4: Conformance testing
- ISO/IEC-14496-4-1 - Information technology - Coding of audio-visual objects - Part 4: Conformance testing - Amendment 1: Conformance testing for MPEG-4
- ISO/IEC-14496-4-10 - Information technology - Coding of audio-visual objects - Part 4: Conformance testing - Amendment 10 Conformance extensions for simple profile levels 4a and 5
- ISO/IEC-14496-4-11 - Amendment 11: Parametric Stereo Conformance, Part4: Conformance Testing, Information T
- ISO/IEC-14496-4-12 - Amendment 12: Morphing & Textures Conformance, Information Technology - Coding of Audi
- ISO/IEC-14496-4-13 - Amendment 13: Parametric Coding for High Quality Audio Conformance, Part 4: Conformanc
- ISO/IEC-14496-4-14 - Amendment 14: Bsac Conformance, Information Technology - Coding of Audio-Visual Object
- ISO/IEC-14496-4-15 - Amendment 15: Lossless Coding of Oversampled Audio, Part 4: Conformance Testing, Info
- ISO/IEC-14496-4-16 - Amendment 16: MPEG-J Gfx Conformance, Part 4: Conformance Testing, Information Technol
- ISO/IEC-14496-4-17 - Information technology - Coding of audio-visual objects - Part 4: Conformance testing - Amendment 17: Advanced text and 2D graphics conformance
- ISO/IEC-14496-4-18 - Amendment 18: Conformance of MPEG-1/2 Audio in MPEG-4, Part4: Conformance Testing, Inf
- ISO/IEC-14496-4-19 - Amendment 19: Audio Lossless Coding (Als), Part 4: Conformance Testing, Information Te
- ISO/IEC-14496-4-2 - Information technology - Coding of audio-visual objects - Part 4: Conformance testing - Amendment 2: MPEG-4 conformance extensions for XMT and media nodes
- ISO/IEC-14496-4-20 - Amendment 20: Scalable To Lossless Coding (Sls) Conformance, Part 4: Conformance Testi
- ISO/IEC-14496-4-21 - Amendment 21: Geometry & Shadow Conformance, Part 4: Conformance Testing, Information
- ISO/IEC-14496-4-22 - Amendment 22: Audiobifs V3 Conformance, Part 4: Conformance Testing, Information Tech
- ISO/IEC-14496-4-23 - Information technology - Coding of audio-visual objects - Part 4: Conformance testing - Amendment 23: Synthesized texture conformance
- ISO/IEC-14496-4-24 - Information technology - Coding of audio-visual objects - Part 4: Conformance testing - Amendment 24: File format conformance
- ISO/IEC-14496-4-25 - Information technology - Coding of audio-visual objects - Part 4: Conformance testing - Amendment 25: LASeR and SAF conformance
- ISO/IEC-14496-4-26 - Information technology - Coding of audio-visual objects - Part 4: Conformance testing - Amendment 26: Conformance levels and bitstreams for Open Font Format
- ISO/IEC-14496-4-27 - Information technology - Coding of audio-visual objects - Part 4: Conformance testing - Amendment 27: LASeR and SAF extensions conformance
- ISO/IEC-14496-4-28 - Information technology - Coding of audio-visual objects - Part 4: Conformance testing - Amendment 28: Conformance extensions for simple profile level 6
- ISO/IEC-14496-4-29 - Information technology - Coding of audio-visual objects - Part 4: Conformance testing - Amendment 29: Symbolic Music Representation conformance
- ISO/IEC-14496-4-3 - Information technology - Coding of audio-visual objects - Part 4: Conformance testing - Amendment 3: Visual new levels and tools
- ISO/IEC-14496-4-30 - Information technology - Coding of audio-visual objects - Part 4: Conformance testing - Amendment 30: Conformance testing for new profiles for professional applications
- ISO/IEC-14496-4-31 - Information technology - Coding of audio-visual objects - Part 4: Conformance testing - Amendment 31: Conformance testing for SVC profiles
- ISO/IEC-14496-4-32 - Amendment 32: Frame-Based Animated Mesh Compression Conformance, Part 4: Conformance T
- ISO/IEC-14496-4-35 - Information technology - Coding of audio-visual objects - Part 4: Conformance testing - Amendment 35: Simple studio profile levels 5 and 6 conformance testing
- ISO/IEC-14496-4-37 - Conformance testing for MPEG-4 - Amendment 3: Additional file format conformance
- ISO/IEC-14496-4-38 - Conformance testing for MPEG-4 - Amendment 3: Conformance testing for Multiview Video Coding
- ISO/IEC-14496-4-4 - Information technology - Coding of audio-visual objects - Part 4: Conformance testing - Amendment 4: IPMPX conformance extensions
- ISO/IEC-14496-4-40 - Information technology - Coding of audio-visual objects - Part 4: Conformance testing - Amendment 40: ExtendedCore2D conformance
- ISO/IEC-14496-4-41 - - Amendment 4: Conformance testing of MVC plus depth extension of AVC
- ISO/IEC-14496-4-42 - - Amendment 4: Conformance testing of Multi-Resolution Frame Compatible Stereo Coding extension of AVC
- ISO/IEC-14496-4-43 - AMENDMENT 43: 3D-AVC conformance testing, Part 4: Conformance testing, Information technology - Coding of audio-visual objects
- ISO/IEC-14496-4-45 - - Amendment 4: Conformance Testing for the Multi-resolution Frame Compatible Stereo Coding with Depth Maps Extension of AVC
- ISO/IEC-14496-4-5 - Information technology - Coding of audio-visual objects - Part 4: Conformance testing - Amendment 5: Conformance extensions for error-resilient simple scalable profile
- ISO/IEC-14496-4-6 - Information technology - Coding of audio-visual objects - Part 4: Conformance testing - Amendment 6: Advanced Video Coding conformance
- ISO/IEC-14496-4-7 - Amendment 7: Afx Conformance Extensions, Information Technology - Coding of Audio-Visu
- ISO/IEC-14496-4-8 - Amendment 8: High Efficiency Advanced Audio Coding, Audio Bifs, & Structured Audio Con
- ISO/IEC-14496-4-9 - Information technology - Coding of audio-visual objects - Part 4: Conformance testing - Amendment 9: AVC fidelity range extensions conformance
- ISO/IEC-14496-5 - Information technology - Coding of audio-visual objects - Part 5: Reference software
- ISO/IEC-14496-5-1 - Information technology - Coding of audio-visual objects - Part 5: Reference software - Amendment 1: Reference software for MPEG-4
- ISO/IEC-14496-5-10 - Information technology - Coding of audio-visual objects - Part 5: Reference software - Amendment 10: SSC, DST, ALS and SLS reference software
- ISO/IEC-14496-5-11 - Information technology - Coding of audio-visual objects - Part 5: Reference software - Amendment 11: MPEG-J GFX Reference software
- ISO/IEC-14496-5-12 - Information technology - Coding of audio-visual objects - Part 5: Reference software - Amendment 12: Updated file format reference software
- ISO/IEC-14496-5-13 - Information technology - Coding of audio-visual objects - Part 5: Reference software - Amendment 13: Geometry and shadow reference software
- ISO/IEC-14496-5-14 - Information technology - Coding of audio-visual objects - Part 5: Reference software - Amendment 14: Open Font Format reference software
- ISO/IEC-14496-5-16 - Information technology - Coding of audio-visual objects - Part 5: Reference software - Amendment 16: Symbolic Music Representation reference software
- ISO/IEC-14496-5-17 - Information technology - Coding of audio-visual objects - Part 5: Reference software - Amendment 17: Reference software for LASeR and SAF
- ISO/IEC-14496-5-18 - Information technology - Coding of audio-visual objects - Part 5: Reference software - Amendment 18: Reference software for new profiles for professional applications
- ISO/IEC-14496-5-19 - Information technology - CXoding of audio-visual objects - Part 5: Reference software - Amendment 19: Reference software for Scalable Video Coding
- ISO/IEC-14496-5-2 - Information technology - Coding of audio-visual objects - Part 5: Reference software - Amendment 2: MPEG-4 reference software extensions for XMT and media nodes
- ISO/IEC-14496-5-20 - Information technology - Coding of audio-visual objects - Part 5: Reference software - Amendment 20: MPEG-1 and -2 on MPEG-4 reference software and BSAC extensions
- ISO/IEC-14496-5-21 - Information technology - Coding of audio-visual objects - Part 5: Reference software - Amendment 21: Frame-based Animated Mesh Compression reference software
- ISO/IEC-14496-5-22 - Reference software for MPEG-4 - Amendment 2: Reference software for 3D Graphics Compression Model (3DGCM)
- ISO/IEC-14496-5-23 - Reference software for MPEG-4 - Amendment 2: Synthesized texture reference software
- ISO/IEC-14496-5-24 - Information technology . Coding of audio-visual objects . Part 5: Reference software - Amendment 24: Reference software for AAC-ELD
- ISO/IEC-14496-5-25 - Reference software for MPEG-4 - Amendment 2: Reference software for scene partitioning
- ISO/IEC-14496-5-27 - Amendment 27: Scalable Complexity 3D Mesh Coding Reference Software, Part 5: Reference
- ISO/IEC-14496-5-28 - Amendment 28: Reference Software for Laser Adaptation Tools, Part 5: Reference Softwar
- ISO/IEC-14496-5-29 - Information technology - Coding of audio-visual objects - Part 5: Reference software - Amendment 29: Reference software for LASeR presentation and modification of structured information (PMSI) tools
- ISO/IEC-14496-5-3 - Information technology - Coding of audio-visual objects - Part 5: Reference software - Amendment 3: Visual new level and tools
- ISO/IEC-14496-5-4 - Information technology - Coding of audio-visual objects - Part 5: Reference software - Amendment 4: IPMPX reference software extensions
- ISO/IEC-14496-5-5 - Information technology - Coding of audio-visual objects - Part 5: Reference software - Amendment 5: Reference software extensions for error resilient simple scalable profile
- ISO/IEC-14496-5-6 - Information technology - Coding of audio-visual objects - Part 5: Reference software - Amendment 6: Advanced Video Coding (AVC) and High Efficiency Advanced Audio Coding (HE AAC) reference software
- ISO/IEC-14496-5-7 - Information technology - Coding of audio-visual objects - Part 5: Reference software - Amendment 7: AFX reference software extensions
- ISO/IEC-14496-5-8 - Information technology - Coding of audio-visual objects - Part 5: Reference software - Amendment 8: AVC fidelity range extensions reference software
- ISO/IEC-14496-5-9 - Information technology - Coding of audio-visual objects - Part 5: Reference software - Amendment 9: Morphing & Textures reference software
- ISO/IEC-14496-5-AM15 - Reference software for MPEG-4 - Amendment 1: Reference software for Multiview Video Coding
- ISO/IEC-14496-5-AM26 - Information technology - Coding of audio-visual objects - Part 5: Reference software - Amendment 26: Reference software for scalable complexity 3D mesh coding in 3DG compression model
- ISO/IEC-14496-5-AM30 - Information technology - Coding of audio-visual objects - Part 5: Reference software - Amendment 30: ExtendedCore2D reference software
- ISO/IEC-14496-5-AM31 - Information technology - Coding of audio-visual objects - Part 5: Reference software - Amendment 31: Reference software for efficient representation of 3D meshes with multiple attributes
- ISO/IEC-14496-5-AM32 - AMENDMENT 32: Reference software for multi-resolution 3D mesh compression, Part 5: Reference software, Information technology - Coding of audio-visual objects
- ISO/IEC-14496-5-AM34 - Amendment 34: Reference software of the multi-resolution frame compatible stereo coding of AVC, Information technology - Coding of audio-visual objects - Part 5: Reference software
- ISO/IEC-14496-5-AM35 - AMENDMENT 35: 3D-AVC Reference software, Part 5: Reference software, Information technology - Coding of audio-visual objects
- ISO/IEC-14496-5-AM37 - AMENDMENT 37: New levels for the AAC profiles, uniDRC support, AAC block length parameter corrections, Part 5: Reference software, Information technology - Coding of audio-visual objects
- ISO/IEC-14496-5-AM39 - - Amendment 3: Reference software for the Multi-resolution Frame Compatible Stereo Coding with Depth Maps of AVC
- ISO/IEC-14496-6 - Information technology -- Coding of audio-visual objects -- Part 6: Delivery Multimedia Integration Framework (DMIF)
- ISO/IEC-14496-7 - Information technology - Coding of audio-visual objects - Part 7: Optimized reference software for coding of audio-visual objects
- ISO/IEC-14496-7-CD - Part 7: Optimized Reference Software for Coding of Audio-Visual Objects, Information Techn
- ISO/IEC-14496-8 - Information technology - Coding of audio-visual objects - Part 8: Carriage of ISO/IEC 14496 contents over IP networks
- ISO/IEC-14496-9 - Information technology - Coding of audio-visual objects - Part 9: Reference hardware description
- ISO/IEC-14516 - Information technology - Security techniques - Guidelines for the use and management of Trusted Third Party services
- ISO/IEC-14651 - Information technology - International string ordering and comparison - Method for comparing character strings and description of the common template tailorable ordering
- ISO/IEC-14651-1 - Information technology - International string ordering and comparison - Method for comparing character strings and description of the common template tailorable ordering - Amendment 1
- ISO/IEC-14651-1-FREN - Information technology - International string ordering and comparison - Method for comparing character strings and description of the common template tailorable ordering - Amendment 1
- ISO/IEC-14651-2 - - Amendment 2
- ISO/IEC-14888-1 - Information technology - Security techniques - Digital signatures with appendix - Part 1: General
- ISO/IEC-14888-2 - Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
- ISO/IEC-14888-3 - IT Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms
- ISO/IEC-14888-3-AM1 - Information technology - Security techniques - Digital signatures with appendix - Part 3: Certificate-based mechanisms - Amendment 1: Elliptic Curve Russian Digital Signature Algorithm, Schnorr Digital Signature Algorithm, Elliptic Curve Schnorr Digital Signature Algorithm, and Elliptic Curve Full Schnorr Digital Signature Algorithm
- ISO/IEC-14888-3-AM2 - Information technology - Security techniques - Digital signatures with appendix - Part 3: Certificate-based mechanisms - Amendment 2: Optimizing hash inputs
- ISO/IEC-14957 - Information technology - Representation of data element values - Notation of the format
- ISO/IEC-15200 - Information technology - Adaptive Lossless Data Compression algorithm (ALDC)
- ISO/IEC-15292 - Information Technology - Security Techniques - Protection Profile Registration Procedures
- ISO/IEC-15408-1 - Information security, cybersecurity and privacy protection - Evaluation criteria for IT security - Part 1: Introduction and general model
- ISO/IEC-15408-2 - Information security, cybersecurity and privacy protection - Evaluation criteria for IT security - Part 2: Security functional components
- ISO/IEC-15408-3 - Information security, cybersecurity and privacy protection - Evaluation criteria for IT security - Part 3: Security assurance components
- ISO/IEC-15415 - Information technology - Automatic identification and data capture techniques - Bar code symbol print quality test specification - Two-dimensional symbols
- ISO/IEC-15415-PACKAG - ISO/IEC 15415 / ISO/IEC 15416 Automatic Identification and Data Capture Techniques Package
- ISO/IEC-15416 - Automatic identification and data capture techniques - Bar code print quality test specification - Linear symbols
- ISO/IEC-15417 - Information technology - Automatic identification and data capture techniques - Code 128 bar code symbology specification
- ISO/IEC-15418 - Information technology - Automatic identification and data capture techniques - GS1 Application Identifiers and ASC MH10 Data Identifiers and maintenance
- ISO/IEC-15419 - Information technology - Automatic identification and data capture techniques - Bar code digital imaging and printing performance testing
- ISO/IEC-15420 - Information technology - Automatic identification and data capture techniques - EAN/UPC bar code symbology specification
- ISO/IEC-15421 - Information technology - Automatic identification and data capture techniques - Bar code master test specifications
- ISO/IEC-15423 - Information technology - Automatic identification and data capture techniques - Bar code scanner and decoder performance testing
- ISO/IEC-15423-1 - Part 1: Linear Symbols, Information Technology - Automatic Identification and Data Capture T
- ISO/IEC-15424 - Information technology - Automatic identification and data capture techniques - Data Carrier Identifiers (including Symbology Identifiers)
- ISO/IEC-15426-1 - Information technology - Automatic identification and data capture techniques - Bar code verifier conformance specification - Part 1: Linear symbols
- ISO/IEC-15426-2 - Information technology - Automatic identification and data capture techniques - Bar code verifier conformance specification - Part 2: Two-dimensional symbols
- ISO/IEC-15434 - Information technology - Automatic identification and data capture techniques - Syntax for high-capacity ADC media
- ISO/IEC-15438 - Information technology - Automatic identification and data capture techniques - PDF417 bar code symbology specification
- ISO/IEC-15443-1 - Information technology - Security techniques - Security assurance framework - Part 1: Introduction and concepts
- ISO/IEC-15443-2 - Information technology - Security techniques - Security assurance framework - Part 2: Analysis
- ISO/IEC-15443-3 - Part 3: Analysis of Assurance Methods, Information Technology - Security Techniques -
- ISO/IEC-15444-1 - Information technology - JPEG 2000 image coding system - Part 1: Core coding system
- ISO/IEC-15444-10 - Information technology - JPEG 2000 image coding system: Extensions for three-dimensional data
- ISO/IEC-15444-11 - Information technology - JPEG 2000 image coding system: Wireless
- ISO/IEC-15444-1-1 - Codestream restrictions - Amendment 1: Profiles for digital cinema applications
- ISO/IEC-15444-11-AM1 - - Amendment 1: IP based wireless networks
- ISO/IEC-15444-12 - Information technology - JPEG 2000 image coding system - Part 12: ISO base media file format
- ISO/IEC-15444-1-2 - Codestream restrictions - Amendment 2: Extended profiles for cinema and video production and archival applications
- ISO/IEC-15444-12-1 - - Amendment 1: Various enhancements including support for large metadata
- ISO/IEC-15444-12-2 - - Amendment 2: Carriage of timed text and other visual overlays
- ISO/IEC-15444-12-3 - - Amendment 3: Font streams and other improvements to file format
- ISO/IEC-15444-13 - Information technology - JPEG 2000 image coding system: An entry level JPEG 2000 encoder
- ISO/IEC-15444-1-3 - Amendment 3: Profiles for Broadcast Applications, Information Technology - Jpeg 2000 I
- ISO/IEC-15444-14 - Information technology - JPEG 2000 image coding system - Part 14: XML representation and reference
- ISO/IEC-15444-1-4 - - Amendment 4: Guidelines for digital cinema applications
- ISO/IEC-15444-1-5 - - Amendment 5: Enhancements for digital cinema and archive profiles (additional frame rates)
- ISO/IEC-15444-1-6 - - Amendment 6: Updated ICC profile support and resolution clarification
- ISO/IEC-15444-1-7 - Profiles for an interoperable master format (IMF)
- ISO/IEC-15444-1-8 - Profiles for an interoperable master format IMF
- ISO/IEC-15444-2 - Information technology - JPEG 2000 image coding system - Part 2: Extensions
- ISO/IEC-15444-2-2 - Enhancement to quantization method - Amendment 2: Extended capabilities marker segment
- ISO/IEC-15444-2-3 - - Amendment 3: Box-based file format for JPEG XR, extended ROI boxes, XML boxing, compressed channel definition boxes, and representation of floating point
- ISO/IEC-15444-2-4 - - Amendment 4: Block coder extension
- ISO/IEC-15444-3 - Information technology - JPEG 2000 image coding system: Motion JPEG 2000
- ISO/IEC-15444-3-2 - Amendment 2: Motion Jpeg 2000 Derived From ISO Base Media File Format, Information Technol
- ISO/IEC-15444-3-AM1 - Information technology - JPEG 2000 image coding system: Motion JPEG 2000 - Amendment 1: Additional profiles for archiving applications
- ISO/IEC-15444-4 - Information technology - JPEG 2000 image coding system - Part 4: Conformance testing
- ISO/IEC-15444-5 - Information technology - JPEG 2000 image coding system - Part 5: Reference software
- ISO/IEC-15444-5-1 - Enhancement to quantization method - Amendment 1: Reference software for the JP2 file format
- ISO/IEC-15444-5-AM2 - - Amendment 2
- ISO/IEC-15444-6 - Information technology - JPEG 2000 image coding system - Part 6: Compound image file format
- ISO/IEC-15444-6-1 - Amendment 1: Hidden Text Metadata, Information Technology - Jpeg 2000 Image Coding Sy
- ISO/IEC-15444-8 - Information technology - JPEG 2000 image coding system - Part 8: Secure JPEG 2000
- ISO/IEC-15444-8/A1 - - Amendment 1: File format security
- ISO/IEC-15444-9 - Information technology - JPEG 2000 image coding system - Part 9: Interactivity tools, APIs and protocols
- ISO/IEC-15444-9-1 - - Amendment 1: APIs, metadata, and editing
- ISO/IEC-15444-9-2 - - Amendment 2: JPIP extensions
- ISO/IEC-15444-9-3 - - Amendment 3: JPIP extensions to 3D data
- ISO/IEC-15444-9-AM4 - - Amendment 4: JPIP server and client profiles
- ISO/IEC-15444-9-AM5 - - Amendment 5: UDP transport and additional enhancements to JPIP
- ISO/IEC-15446 - Information technology - Security techniques - Guidance for the production of protection profiles and security targets
- ISO/IEC-15459-1 - Information technology - Automatic identification and data capture techniques - Unique identification - Part 1: Individual transport units
- ISO/IEC-15459-2 - Information technology - Automatic identification and data capture techniques - Unique identification - Part 2: Registration procedures
- ISO/IEC-15459-3 - Information technology - Automatic identification and data capture techniques - Unique identification - Part 3: Common rules
- ISO/IEC-15459-4 - Information technology - Automatic identification and data capture techniques - Unique identification - Part 4: Individual products and product packages
- ISO/IEC-15459-5 - Information technology - Automatic identification and data capture techniques - Unique identification - Part 5: Individual returnable transport items (RTIs)
- ISO/IEC-15459-6 - Information technology - Automatic identification and data capture techniques - Unique identification - Part 6: Groupings
- ISO/IEC-15459-8 - Information technology - Unique identifiers - Part 8: Grouping of transport units
- ISO/IEC-15816 - Information technology - Security techniques - Security information objects for access control
- ISO/IEC-15938-1 - Information technology - Multimedia content description interface - Part 1: Systems
- ISO/IEC-15938-10 - Information technology - Multimedia content description Interface - Part 10: Schema definition
- ISO/IEC-15938-11 - Information technology - Multimedia content description Interface - Part 11: MPEG-7 profile schemas
- ISO/IEC-15938-1-1 - Corrigendum
- ISO/IEC-15938-11-AM1 - Information technology - Multimedia content description Interface - Part 11: MPEG-7 profile schemas - Amendment 1: Audiovisual description profile (AVDP) schema
- ISO/IEC-15938-12 - Information technology - Multimedia content description interface - Part 12: Query format
- ISO/IEC-15938-1-2 - Amendment 2: Fast access extension
- ISO/IEC-15938-12-AM1 - Amendment 1: Reference Software and Flat Metadata Output, Part 12: Query Format, Informa
- ISO/IEC-15938-12-AM2 - Amendment 2: Semantic enhancement
- ISO/IEC-15938-2 - Information technology - Multimedia content description interface - Part 2: Description definition language
- ISO/IEC-15938-3 - Information technology - Multimedia content description interface - Part 3: Visual
- ISO/IEC-15938-3-1 - Amendment 1: Visual extensions
- ISO/IEC-15938-3-2 - Amendment 2: Perceptual 3D Shape Descriptor
- ISO/IEC-15938-3-3 - - Amendment 3: Image signature tools
- ISO/IEC-15938-3-AM4 - Information technology - Multimedia content description interface - Part 3: Visual - Amendment 4: Video signature tools
- ISO/IEC-15938-4 - Information technology - Multimedia content description interface - Part 4: Audio
- ISO/IEC-15938-4-1 - Amendment 1: Audio extensions
- ISO/IEC-15938-4-2 - Amendment 2: High-level descriptors
- ISO/IEC-15938-5 - Information technology - Multimedia content description interface - Part 5: Multimedia description schemes
- ISO/IEC-15938-5-1 - Amendment 1: Multimedia description schemes extensions
- ISO/IEC-15938-5-2 - Amendment 2: Multimedia description schemes user preference extensions
- ISO/IEC-15938-5-3 - - Amendment 3: Improvements to geographic descriptor
- ISO/IEC-15938-5-4 - Information technology - Multimedia content description interface - Part 5: Multimedia description schemes - Amendment 4: Social metadata
- ISO/IEC-15938-5-5 - - Amendment 5: Quality metadata, multiple text encodings, extended classification metadata
- ISO/IEC-15938-6 - Information technology - Multimedia content description interface - Part 6: Reference software
- ISO/IEC-15938-6-1 - Amendment 1: Reference software extensions
- ISO/IEC-15938-6-2 - - Amendment 2: Reference software of perceptual 3D shape descriptor
- ISO/IEC-15938-6-3 - - Amendment 3: Reference software for image signature tools
- ISO/IEC-15938-6-4 - Amendment 4: Reference Software for Video Signature Tools, Part 6: Reference Software,
- ISO/IEC-15938-7 - Information technology - Multimedia content description interface - Part 7: Conformance testing
- ISO/IEC-15938-7-1 - Amendment 1: Conformance extensions
- ISO/IEC-15938-7-2 - - Amendment 2: Fast access extensions conformance
- ISO/IEC-15938-7-3 - - Amendment 3: Conformance testing of perceptual 3D shape descriptor
- ISO/IEC-15938-7-4 - - Amendment 4: Improvements to geographic descriptor conformance
- ISO/IEC-15938-7-5 - - Amendment 5: Conformance testing for image signature tools
- ISO/IEC-15938-7-6 - Amendment 6: Conformance Testing for Video Signature Tools, Part 7: Conformance Testi
- ISO/IEC-15938-8 - Information technology - Multimedia content description interface - Part 8: Extraction and use of MPEG-7 descriptions
- ISO/IEC-15938-8-1 - Amendment 1: Extensions of extraction and use of MPEG-7 descriptions
- ISO/IEC-15938-8-2 - - Amendment 2: Extraction and use of MPEG-7 perceptual 3D shape descriptor
- ISO/IEC-15938-8-3 - - Amendment 3: Technologies for digital photo management using MPEG-7 visual tools
- ISO/IEC-15938-8-4 - Information technology - Multimedia content description interface - Part 8: Extraction and use of MPEG-7 descriptions - Amendment 4: Extraction of audio features from compressed formats
- ISO/IEC-15938-8/A5 - - Amendment 5: Extraction and matching of image signature tools
- ISO/IEC-15938-8-AM6 - Information technology - Multimedia content description interface - Part 8: Extraction and use of MPEG-7 descriptions - Amendment 6: Extraction and matching of video signature tools
- ISO/IEC-15938-9 - Information technology - Multimedia content description interface - Part 9: Profiles and levels
- ISO/IEC-15938-9-AM1 - Information technology - Multimedia content description interface - Part 9: Profiles and levels - Amendment 1: Extensions to profiles and levels
- ISO/IEC-15945 - Information technology - Security techniques - Specification of TTP services to support the application of digital signatures
- ISO/IEC-15946-1 - Information technology - Security techniques - Cryptographic techniques based on elliptic curves - Part 1: General
- ISO/IEC-15946-2 - Part 2: Digital Signatures, Information Technology - Security Techniques - Cryptographic T
- ISO/IEC-15946-3 - Part 3: Key Establishment, Information Technology - Securitytechniques - Cryptographic Te
- ISO/IEC-15946-4 - Part 4: Digital Signatures Giving Message Recovery, Information Technology - Security Tech
- ISO/IEC-15946-5 - Information security - Cryptographic techniques based on elliptic curves - Part 5: Elliptic curve generation
- ISO/IEC-15947 - Information Technology - Security Techniques - It Intrusiondetection Framework
- ISO/IEC-15961 - Information technology - Radio frequency identification (RFID) for item management - Data protocol: application interface
- ISO/IEC-15961-1 - Information technology - Data protocol for radio frequency identification (RFID) for item management - Part 1: Application interface
- ISO/IEC-15961-4 - Information technology - Radio frequency identification (RFID) for item management: Data protocol - Part 4: Application interface commands for battery assist and sensor functionality
- ISO/IEC-15962 - Information technology - Radio frequency identification (RFID) for item management - Data protocol: data encoding rules and logical memory functions
- ISO/IEC-15963 - Information technology - Radio frequency identification for item management - Unique identification for RF tags
- ISO/IEC-16022 - Information technology - Automatic identification and data capture techniques - Data Matrix bar code symbology specification
- ISO/IEC-16023 - Information technology -- International symbology specification -- MaxiCode
- ISO/IEC-16388 - Information technology - Automatic identification and data capture techniques - Code 39 bar code symbology specification
- ISO/IEC-16390 - Information technology - Automatic identification and data capture techniques - Interleaved 2 of 5 bar code symbology specification
- ISO/IEC-16480 - Information technology - Automatic identification and data capture techniques - Reading and display of ORM by mobile devices
- ISO/IEC-16485 - Information technology -- Mixed Raster Content (MRC)
- ISO/IEC-16500-1 - Information technology -- Generic digital audio-visual systems -- Part 1: System reference models and scenarios
- ISO/IEC-16500-2 - Information technology -- Generic digital audio-visual systems -- Part 2: System dynamics, scenarios and protocol requirements
- ISO/IEC-16500-3 - Information technology -- Generic digital audio-visual systems -- Part 3: Contours: Technology domain
- ISO/IEC-16500-4 - Information technology -- Generic digital audio-visual systems -- Part 4: Lower-layer protocols and physical interfaces
- ISO/IEC-16500-5 - Information technology -- Generic digital audio-visual systems -- Part 5: High and mid-layer protocols
- ISO/IEC-16500-6 - Information technology -- Generic digital audio-visual systems -- Part 6: Information representation
- ISO/IEC-16500-7 - Information technology -- Generic digital audio-visual systems -- Part 7: Basic security tools
- ISO/IEC-16500-8 - Information technology -- Generic digital audio-visual systems -- Part 8: Management architecture and protocols
- ISO/IEC-16500-9 - Information technology -- Generic digital audio-visual systems -- Part 9: Usage information protocols
- ISO/IEC-16501 - Information technology -- Generic digital audio-visual systems -- Technical Report on ISO/IEC 16500 -- Description of digital audio-visual functionalities
- ISO/IEC-17799 - Sell as ISO/IEC-27002
- ISO/IEC-17825 - Information technology - Security techniques - Testing methods for the mitigation of non-invasive attack classes against cryptographic modules
- ISO/IEC-17826 - Information technology - Cloud Data Management Interface (CDMI) Version 2.0.0
- ISO/IEC-18000-1 - Information technology - Radio frequency identification for item management - Part 1: Reference architecture and definition of parameters to be standardized
- ISO/IEC-18000-2 - Information technology - Radio frequency identification for item management - Part 2: Parameters for air interface communications below 135 kHz
- ISO/IEC-18000-3 - Information technology - Radio frequency identification for item management - Part 3: Parameters for air interface communications at 13,56 MHz
- ISO/IEC-18000-4 - Information technology - Radio frequency identification for item management - Part 4: Parameters for air interface communications at 2,45 GHz
- ISO/IEC-18000-6 - Information technology - Radio frequency identification for item management - Part 6: Parameters for air interface communications at 860 MHz to 960 MHz General
- ISO/IEC-18000-61 - Information technology - Radio frequency identification for item management - Part 61: Parameters for air interface communications at 860 MHz to 960 MHz Type A
- ISO/IEC-18000-6-1 - Amendment 1: Extension With Type C & Update of Types a & B, Part 6: Parameters for Ai
- ISO/IEC-18000-62 - Information technology - Radio frequency identification for item management - Part 62: Parameters for air interface communications at 860 MHz to 960 MHz Type B
- ISO/IEC-18000-63 - Information technology - Radio frequency identification for item management - Part 63: Parameters for air interface communications at 860 MHz to 960 MHz Type C
- ISO/IEC-18000-64 - Information technology - Radio frequency identification for item management - Part 64: Parameters for air interface communications at 860 MHz to 960 MHz Type D
- ISO/IEC-18000-7 - Information technology - Radio frequency identification for item management - Part 7: Parameters for active air interface communications at 433 MHz
- ISO/IEC-18001 - Information technology - Radio frequency identification for item management - Application requirements profiles
- ISO/IEC-18004 - Information technology - Automatic identification and data capture techniques - QR code bar code symbology specification
- ISO/IEC-18014-1 - Information technology - Security techniques - Time-stamping services - Part 1: Framework
- ISO/IEC-18014-2 - Information security - Time-stamping services - Part 2: Mechanisms producing independent tokens
- ISO/IEC-18014-3 - Information technology - Security techniques - Time-stamping services - Part 3: Mechanisms producing linked tokens
- ISO/IEC-18014-4 - Information technology - Security techniques - Time-stamping services - Part 4: Traceability of time sources
- ISO/IEC-18028-1 - Part 1: Network Security Management, Information Technology - Security Techniques - I
- ISO/IEC-18028-2 - Part 2: Network Security Architecture, Information Technology - Security Techniques -
- ISO/IEC-18028-3 - Information technology -- Security techniques -- IT network security -- Part 3: Securing communications between networks using security gateways
- ISO/IEC-18028-4 - Information technology - Security techniques - IT network security - Part 4: Securing remote access
- ISO/IEC-18028-5 - Part 5: Securing Communications Across Networks Using Virtual Private Networks, Inform
- ISO/IEC-18031 - Information technology - Security techniques - Random bit generation
- ISO/IEC-18032 - Information security - Prime number generation
- ISO/IEC-18033-1 - Information security - Encryption algorithms - Part 1: General
- ISO/IEC-18033-1-AM1 - Amendment 1, Part 1: General - Information Technology - Security Techniques - Encrypti
- ISO/IEC-18033-2 - Information technology - Security techniques - Encryption algorithms - Part 2: Asymmetric ciphers
- ISO/IEC-18033-3 - Information technology - Security techniques - Encryption algorithms - Part 3: Block ciphers
- ISO/IEC-18033-4 - Information technology - Security techniques - Encryption algorithms - Part 4: Stream ciphers
- ISO/IEC-18033-4/A1 - Amendment 1: Rabbit & Decim, Part 4: Stream Ciphers, Information Technology - Security
- ISO/IEC-18033-5 - Information technology - Security techniques - Encryption algorithms - Part 5: Identity-based ciphers
- ISO/IEC-18043 - Information Technology - Security Techniques - Selection, Deployment and Operations of I
- ISO/IEC-18044 - Information Technology - Security Techniques - Information Security Incident Management
- ISO/IEC-18045 - Information security, cybersecurity and privacy protection - Evaluation criteria for IT security - Methodology for IT security evaluation
- ISO/IEC-18046 - Information Technology - Automatic Identification and Data Capture Techniques - Radio Fr
- ISO/IEC-18046-1 - Information technology - Radio frequency identification device performance test methods - Part 1: Test methods for system performance
- ISO/IEC-18046-2 - Information technology - Radio frequency identification device performance test methods - Part 2: Test methods for interrogator performance
- ISO/IEC-18046-3 - Information technology - Radio frequency identification device performance test methods - Part 3: Test methods for tag performance
- ISO/IEC-18046-4 - Information technology - Radio frequency identification device performance test methods - Part 4: Test methods for performance of RFID gates in libraries
- ISO/IEC-18047-2 - Information technology - Radio frequency identification device conformance test methods - Part 2: Test methods for air interface communications below 135 kHz
- ISO/IEC-18047-3 - Information technology - Radio frequency identification device conformance test methods - Part 3: Test methods for air interface communications at 13,56 MHz
- ISO/IEC-18047-4 - Information technology - Radio frequency identification device conformance test methods - Part 4: Test methods for air interface communications at 2,45 GHz
- ISO/IEC-18047-6 - Information technology - Radio frequency identification device conformance test methods - Part 6: Test methods for air interface communications at 860 MHz to 960 MHz
- ISO/IEC-18047-7 - Information technology - Radio frequency identification device conformance test methods - Part 7: Test methods for active air interface communications at 433 MHz
- ISO/IEC-18050 - Information technology - Office equipment - Print quality attributes for machine readable Digital Postage Marks
- ISO/IEC-18180 - Information technology - Specification for the Extensible Configuration Checklist Description Format (XCCDF) Version 1.2
- ISO/IEC-18305 - Information technology - Real time locating systems - Test and evaluation of localization and tracking systems
- ISO/IEC-18370-1 - Information technology - Security techniques - Blind digital signatures - Part 1: General
- ISO/IEC-18370-2 - Information technology - Security techniques - Blind digital signatures - Part 2: Discrete logarithm based mechanisms
- ISO/IEC-18477-1 - Information technology - Scalable compression and coding of continuous-tone still images - Part 1: Core coding system specification
- ISO/IEC-18477-2 - Information technology - Scalable compression and coding of continuous-tone still images - Part 2: Coding of high dynamic range images
- ISO/IEC-18477-3 - Information technology - Scalable compression and coding of continuous-tone still images - Part 3: Box file format
- ISO/IEC-18477-6 - Information technology - Scalable compression and coding of continuous-tone still images - Part 6: IDR Integer Coding
- ISO/IEC-18477-7 - Information technology - Scalable compression and coding of continuous-tone still images - Part 7: HDR Floating-Point Coding
- ISO/IEC-18477-8 - Information technology - Scalable compression and coding of continuous-tone still images - Part 8: Lossless and near-lossless coding
- ISO/IEC-18477-9 - Information technology - Scalable compression and coding of continuous-tone still images - Part 9: Alpha channel coding
- ISO/IEC-19395 - Information technology - Sustainability for and by information technology - Smart data centre resource monitoring and control
- ISO/IEC-19502 - Information technology - Meta Object Facility (MOF)
- ISO/IEC-19503 - Information technology - XML Metadata Interchange (XMI)
- ISO/IEC-19508 - Information technology - Object Management Group Meta Object Facility (MOF) Core
- ISO/IEC-19509 - Information technology - Object Management Group XML Metadata Interchange (XMI)
- ISO/IEC-19566-1 - Information technology - JPEG Systems - Part 1: Packaging of information using codestreams and file formats
- ISO/IEC-19566-2 - Information technologies - JPEG Systems - Part 2: Transport mechanisms and packaging
- ISO/IEC-19592-1 - Information technology - Security techniques - Secret sharing - Part 1: General
- ISO/IEC-19762-1 - Information technology - Automatic identification and data capture (AIDC) techniques - Harmonized vocabulary - Part 1: General terms relating to AIDC
- ISO/IEC-19762-2 - Information technology - Automatic identification and data capture (AIDC) techniques - Harmonized vocabulary - Part 2: Optically readable media (ORM)
- ISO/IEC-19762-3 - Information technology - Automatic identification and data capture (AIDC) techniques - Harmonized vocabulary - Part 3: Radio frequency identification (RFID)
- ISO/IEC-19762-4 - Information technology - Automatic identification and data capture (AIDC) techniques - Harmonized vocabulary - Part 4: General terms relating to radio communications
- ISO/IEC-19762-5 - Information technology - Automatic identification and data capture (AIDC) techniques - Harmonized vocabulary - Part 5: Locating systems
- ISO/IEC-19763-1 - Information technology - Metamodel framework for interoperability (MFI) - Part 1: Framework
- ISO/IEC-19763-10 - Information technology - Metamodel framework for interoperability (MFI) - Part 10: Core model and basic mapping
- ISO/IEC-19763-12 - Information technology - Metamodel framework for interoperability (MFI) - Part 12: Metamodel for information model registration
- ISO/IEC-19763-3 - Information technology - Metamodel framework for interoperability (MFI) - Part 3: Metamodel for ontology registration
- ISO/IEC-19763-5 - Information technology - Metamodel framework for interoperability (MFI) - Part 5: Metamodel for process model registration
- ISO/IEC-19763-6 - Information technology - Metamodel framework for interoperability (MFI) - Part 6: Registry Summary
- ISO/IEC-19763-7 - Information technology - Metamodel framework for interoperability (MFI) - Part 7: Metamodel for service model registration
- ISO/IEC-19763-8 - Information technology - Metamodel framework for interoperability (MFI) - Part 8: Metamodel for role and goal model registration
- ISO/IEC-19763-9 - Information technology - Metamodel framework for interoperability (MFI) - Part 9: On demand model selection
- ISO/IEC-19765 - Information technology - Survey of icons and symbols that provide access to functions and facilities to improve the use of information technology products by the elderly and persons with disabilities
- ISO/IEC-19766 - Information technology - Guidelines for the design of icons and symbols accessible to all users, including the elderly and persons with disabilities
- ISO/IEC-19772 - Information security - Authenticated encryption
- ISO/IEC-19773 - Information technology - Metadata Registries (MDR) modules
- ISO/IEC-19782 - Information technology - Automatic identification and data capture techniques - Effects of gloss and low substrate opacity on reading of bar code symbols
- ISO/IEC-19784-1 - Information technology - Biometric application programming interface - Part 1: BioAPI specification
- ISO/IEC-19784-1-1 - - Amendment 1: BioGUI specification
- ISO/IEC-19784-1-2 - - Amendment 2: Framework-free BioAPI
- ISO/IEC-19784-1-AM3 - - Amendment 3: Support for interchange of certificates and security assertions, and other security aspects
- ISO/IEC-19784-2 - Information technology - Biometric application programming interface - Part 2: Biometric archive function provider interface
- ISO/IEC-19784-4 - Information technology - Biometric application programming interface - Part 4: Biometric sensor function provider interface
- ISO/IEC-19785-1 - Information technology - Common Biometric Exchange Formats Framework - Part 1: Data element specification
- ISO/IEC-19785-1-A1 - - Amendment 1: Support for additional data elements
- ISO/IEC-19785-2 - Information technology - Common Biometric Exchange Formats Framework - Part 2: Biometric registration authority
- ISO/IEC-19785-2-A1 - - Amendment 1: Additional registrations
- ISO/IEC-19785-3 - Information technology - Common Biometric Exchange Formats Framework - Part 3: Patron format specifications
- ISO/IEC-19785-3-A1 - - Amendment 1: Support for Additional Data Elements
- ISO/IEC-19785-4 - Information technology - Common Biometric Exchange Formats Framework - Part 4: Security block format specifications
- ISO/IEC-19790 - Information technology - Security techniques - Security requirements for cryptographic modules
- ISO/IEC-19791 - Information technology - Security techniques - Security assessment of operational systems
- ISO/IEC-19792 - Information technology - Security techniques - Security evaluation of biometrics
- ISO/IEC-19794-1 - Information technology - Biometric data interchange formats - Part 1: Framework
- ISO/IEC-19794-10 - Information technology - Biometric data interchange formats - Part 10: Hand geometry silhouette data
- ISO/IEC-19794-11 - Information technology - Biometric data interchange formats - Part 11: Signature/sign processed dynamic data
- ISO/IEC-19794-11-AM1 - - Amendment 1: Conformance test assertions
- ISO/IEC-19794-14 - Information technology - Biometric data interchange formats - Part 14: DNA data
- ISO/IEC-19794-14-AM1 - - Amendment 1: Conformance testing and clarification of defects
- ISO/IEC-19794-1-AM1 - - Amendment 1: Conformance testing methodology
- ISO/IEC-19794-1-AM2 - - Amendment 2: Framework for XML encoding
- ISO/IEC-19794-2 - Information technology - Biometric data interchange formats - Part 2: Finger minutiae data
- ISO/IEC-19794-2-A1 - - Amendment 1: Conformance testing methodology and clarification of defects
- ISO/IEC-19794-3 - Information technology - Biometric data interchange formats - Part 3: Finger pattern spectral data
- ISO/IEC-19794-4 - Information technology - Biometric data interchange formats - Part 4: Finger image data
- ISO/IEC-19794-4-AM1 - - Amendment 1: Conformance testing methodology and clarification of defects
- ISO/IEC-19794-4-AM2 - - Amendment 2: XML encoding and clarification of defects
- ISO/IEC-19794-5 - Information technology - Biometric data interchange formats - Part 5: Face image data
- ISO/IEC-19794-5-1 - - Amendment 1: Conformance testing methodology and clarification of defects
- ISO/IEC-19794-5-2 - - Amendment 2: XML encoding and clarification of defects
- ISO/IEC-19794-6 - Information technology - Biometric data interchange formats - Part 6: Iris image data
- ISO/IEC-19794-6-AM1 - - Amendment 1: Conformance testing methodology and clarification of defects
- ISO/IEC-19794-6-AM2 - - Amendment 2: XML encoding and clarification of defects
- ISO/IEC-19794-7 - Information technology - Biometric data interchange formats - Part 7: Signature/sign time series data
- ISO/IEC-19794-7-AM1 - - Amendment 1: XML encoding
- ISO/IEC-19794-7-AM2 - - Amendment 2: XML Encoding and clarification of defects
- ISO/IEC-19794-8 - Information technology - Biometric data interchange formats - Part 8: Finger pattern skeletal data
- ISO/IEC-19794-8-AM1 - - Amendment 1: Conformance testing methodology
- ISO/IEC-19794-9 - Information technology - Biometric data interchange formats - Part 9: Vascular image data
- ISO/IEC-19794-9-AM1 - - Amendment 1: Conformance testing methodology
- ISO/IEC-19794-9-AM2 - - Amendment 2: XML Encoding and clarification of defects
- ISO/IEC-19795-1 - Information technology - Biometric performance testing and reporting - Part 1: Principles and framework
- ISO/IEC-19795-2 - Information technology - Biometric performance testing and reporting - Part 2: Testing methodologies for technology and scenario evaluation
- ISO/IEC-19795-2-AM1 - - Amendment 1: Testing of multimodal biometric implementations
- ISO/IEC-19795-3 - Information technology - Biometric performance testing and reporting - Part 3: Modality-specific testing
- ISO/IEC-19795-4 - Information technology - Biometric performance testing and reporting - Part 4: Interoperability performance testing
- ISO/IEC-19795-5 - Information technology - Biometric performance testing and reporting - Part 5: Access control scenario and grading scheme
- ISO/IEC-19795-6 - Information technology - Biometric performance testing and reporting - Part 6: Testing methodologies for operational evaluation
- ISO/IEC-19795-7 - Information technology - Biometric performance testing and reporting - Part 7: Testing of on-card biometric comparison algorithms
- ISO/IEC-20004 - Information technology - Security techniques - Refining software vulnerability analysis under ISO/IEC 15408 and ISO/IEC 18045
- ISO/IEC-20008-1 - Information technology - Security techniques - Anonymous digital signatures - Part 1: General
- ISO/IEC-20008-2 - Information technology - Security techniques - Anonymous digital signatures - Part 2: Mechanisms using a group public key
- ISO/IEC-20009-1 - Information technology - Security techniques - Anonymous entity authentication - Part 1: General
- ISO/IEC-20017 - Information technology - Radio frequency identification for item management - Electromagnetic interference impact of ISO/IEC 18000 interrogator emitters on implantable pacemakers and implantable cardioverter defibrillators
- ISO/IEC-20027 - Information technology - Guidelines for slap tenprint fingerprintture
- ISO/IEC-2022 - Information technology - Character code structure and extension techniques
- ISO/IEC-20243 - Information Technology - Open Trusted Technology ProviderTM Standard (O-TTPS) - Mitigating maliciously tainted and counterfeit products
- ISO/IEC-20648 - Information technology - TLS specification for storage systems
- ISO/IEC-20943-1 - Information technology - Procedures for achieving metadata registry (MDR) content consistency - Part 1: Data elements
- ISO/IEC-20943-3 - Information technology - Procedures for achieving metadata registry content consistency - Part 3: Value domains
- ISO/IEC-20944-1 - Information technology - Metadata Registries Interoperability and Bindings (MDR-IB) - Part 1: Framework, common vocabulary, and common provisions for conformance
- ISO/IEC-20944-2 - Information technology - Metadata Registries Interoperability and Bindings (MDR-IB) - Part 2: Coding bindings
- ISO/IEC-20944-3 - Information technology - Metadata Registries Interoperability and Bindings (MDR-IB) - Part 3: API bindings
- ISO/IEC-20944-4 - Information technology - Metadata Registries Interoperability and Bindings (MDR-IB) - Part 4: Protocol bindings
- ISO/IEC-20944-5 - Information technology - Metadata Registries Interoperability and Bindings (MDR-IB) - Part 5: Profiles
- ISO/IEC-21000-1 - Information technology - Multimedia framework (MPEG-21) - Part 1: Vision, Technologies and Strategy
- ISO/IEC-21000-10 - Information technology - Multimedia framework (MPEG-21) - Part 10: Digital Item Processing
- ISO/IEC-21000-10-1 - - Amendment 1: Additional C++ bindings
- ISO/IEC-21000-11 - Information technology - Multimedia framework (MPEG-21) - Part 11: Evaluation Tools for Persistent Association Technologies
- ISO/IEC-21000-12 - Information technology - Multimedia framework (MPEG-21) - Part 12: Test Bed for MPEG-21 Resource Delivery
- ISO/IEC-21000-14 - Information technology - Multimedia framework (MPEG-21) - Part 14: Conformance Testing
- ISO/IEC-21000-15 - Information technology - Multimedia framework (MPEG-21) - Part 15: Event Reporting
- ISO/IEC-21000-15-1 - - Amendment 1: Security in Event Reporting
- ISO/IEC-21000-16 - Information technology - Multimedia framework (MPEG-21) - Part 16: Binary Format
- ISO/IEC-21000-17 - Information technology - Multimedia framework (MPEG-21) - Part 17: Fragment Identification of MPEG Resources
- ISO/IEC-21000-18 - Information technology - Multimedia framework (MPEG-21) - Part 18: Digital Item Streaming
- ISO/IEC-21000-18-1 - - Amendment 1: Simple fragmentation rule
- ISO/IEC-21000-19 - Information technology - Multimedia framework (MPEG-21) - Part 19: Media Value Chain Ontology
- ISO/IEC-21000-2 - Information technology - Multimedia framework (MPEG-21) - Part 2: Digital Item Declaration
- ISO/IEC-21000-20 - Information technology - Multimedia framework (MPEG-21) - Part 20: Contract Expression Language
- ISO/IEC-21000-21 - Information technology - Multimedia framework (MPEG-21) - Part 21: Media contract ontology
- ISO/IEC-21000-22 - Information technology - Multimedia framework (MPEG-21) - Part 22: User description
- ISO/IEC-21000-2-AM1 - Information technology - Multimedia framework (MPEG-21) - Part 2: Digital Item Declaration - Amendment 1: Presentation of digital item
- ISO/IEC-21000-3 - Information technology - Multimedia framework (MPEG-21) - Part 3: Digital Item Identification
- ISO/IEC-21000-3-1 - - Amendment 1: Related identifier types
- ISO/IEC-21000-3-AM2 - - Amendment 2: Digital item semantic relationships
- ISO/IEC-21000-4 - Information technology - Multimedia framework (MPEG-21) - Part 4: Intellectual Property Management and Protection Components
- ISO/IEC-21000-4-1 - - Amendment 1: IPMP components base profile
- ISO/IEC-21000-4-AM2 - Information technology - Multimedia framework (MPEG-21) - Part 4: Intellectual Property Management and Protection Components - Amendment 2: Protection of presentation element
- ISO/IEC-21000-5 - Information technology - Multimedia framework (MPEG-21) - Part 5: Rights Expression Language
- ISO/IEC-21000-5-1 - - Amendment 1: MAM (Mobile And optical Media) profile
- ISO/IEC-21000-5-2 - - Amendment 2: DAC (Dissemination And Capture) profile
- ISO/IEC-21000-5-3 - - Amendment 3: Open access content (OAC) profile
- ISO/IEC-21000-6 - Information technology - Multimedia framework (MPEG-21) - Part 6: Rights Data Dictionary
- ISO/IEC-21000-6-1 - - Amendment 1: Digital Item Identifier relationship types
- ISO/IEC-21000-7 - Information technology - Multimedia framework (MPEG-21) - Part 7: Digital Item Adaptation
- ISO/IEC-21000-7-1 - - Amendment 1: Query format capabilities
- ISO/IEC-21000-7-2 - Amendment 2: Dynamic and Distributed Adaptation, Information Technology - Multimedia Fra
- ISO/IEC-21000-8 - Information technology - Multimedia framework (MPEG-21) - Part 8: Reference software
- ISO/IEC-21000-8-1 - - Amendment 1: Extra reference software
- ISO/IEC-21000-8-AM2 - Information technology - Multimedia framework (MPEG-21) - Part 8: Reference software - Amendment 2: Reference software for media value chain ontology (MVCO)
- ISO/IEC-21000-8-AM3 - - Amendment 3: Contract Expression Language (CEL) and Media Contract Ontology (MCO) Reference Software
- ISO/IEC-21000-9 - Information technology - Multimedia framework (MPEG-21) - Part 9: File Format
- ISO/IEC-21000-9-1 - - Amendment 1: MIME type registration
- ISO/IEC-21827 - Information technology - Security techniques - Systems Security Engineering - Capability Maturity Model® (SSE-CMM®)
- ISO/IEC-22534 - Information technology - Telecommunications and information exchange between systems - Application session services
- ISO/IEC-22537 - Information technology - ECMAScript for XML (E4X) specification
- ISO/IEC-23000-1 - Information technology - Multimedia application format (MPEG-A) - Part 1: Purpose for multimedia application formats
- ISO/IEC-23000-10 - Information technology - Multimedia application format (MPEG-A) - Part 10: Surveillance application format
- ISO/IEC-23000-10-AM1 - - Amendment 1: Conformance and reference software
- ISO/IEC-23000-11 - Information technology - Multimedia application format (MPEG-A) - Part 11: Stereoscopic video application format
- ISO/IEC-23000-11-AM1 - Information technology - Multimedia application format (MPEG-A) - Part 11: Stereoscopic video application format - Amendment 1: Stereoscopic video application format conformance and reference software
- ISO/IEC-23000-11-AM2 - Information technology - Multimedia application format (MPEG-A) - Part 11: Stereoscopic video application format - Amendment 2: Signalling of additional composition type and profiles
- ISO/IEC-23000-11-AM3 - - Amendment 3: Support movie fragment for Stereoscopic Video AF
- ISO/IEC-23000-12 - Information technology - Multimedia application format (MPEG-A) - Part 12: Interactive music application format
- ISO/IEC-23000-12-AM1 - Information technology - Multimedia application format (MPEG-A) - Part 12: Interactive music application format - Amendment 1: Conformance and reference software
- ISO/IEC-23000-12-AM2 - Information technology - Multimedia application format (MPEG-A) - Part 12: Interactive music application format - Amendment 2: Compact representation of dynamic volume change and audio equalization
- ISO/IEC-23000-12-AM3 - - Amendment 3: Conformance and reference software and conformance
- ISO/IEC-23000-13 - Information technology - Multimedia application format (MPEG-A) - Part 13: Augmented reality application format
- ISO/IEC-23000-15 - Information technology - Multimedia application format (MPEG-A) - Part 15: Multimedia preservation application format
- ISO/IEC-23000-2 - Information technology - Multimedia application format (MPEG-A) - Part 2: MPEG music player application format
- ISO/IEC-23000-3 - Information technology - Multimedia application format (MPEG-A) - Part 3: MPEG photo player application format
- ISO/IEC-23000-3-1 - - Amendment 1: Reference software for photo player MAF
- ISO/IEC-23000-3-AM2 - - Amendment 2: Conformance testing for photo player application format
- ISO/IEC-23000-4 - Information technology - Multimedia application format (MPEG-A) - Part 4: Musical slide show application format
- ISO/IEC-23000-4-1 - Information technology - Multimedia application format (MPEG-A) - Part 4: Musical slide show application format - Amendment 1: Conformance and reference software for musical slide show application format
- ISO/IEC-23000-4-2 - - Amendment 2: Conformance and reference software for protected musical slide show application format
- ISO/IEC-23000-5 - Information technology - Multimedia application format (MPEG-A) - Part 5: Media streaming application format
- ISO/IEC-23000-6 - Information technology - Multimedia application format (MPEG-A) - Part 6: Professional archival application format
- ISO/IEC-23000-6-AM1 - Amendment 1: Conformance & Reference Software for Professional Archival Application Fo
- ISO/IEC-23000-7 - Information technology - Multimedia application format (MPEG-A) - Part 7: Open access application format
- ISO/IEC-23000-7-AM1 - - Amendment 1: Conformance and reference software for open access application format
- ISO/IEC-23000-8 - Information technology - Multimedia application format (MPEG-A) - Part 8: Portable video application format
- ISO/IEC-23000-9 - Information technology - Multimedia application format (MPEG-A) - Part 9: Digital Multimedia Broadcasting application format
- ISO/IEC-23000-9-AM1 - Information technology - Multimedia application format (MPEG-A) - Part 9: Digital Multimedia Broadcasting application format - Amendment 1: Conformance and reference software
- ISO/IEC-23000-9-AM2 - Information technology - Multimedia application format (MPEG-A) - Part 9: Digital Multimedia Broadcasting application format - Amendment 2: Harmonization on MPEG-2 TS storage
- ISO/IEC-23001-1 - Information technology - MPEG systems technologies - Part 1: Binary MPEG format for XML
- ISO/IEC-23001-10 - Information technology - MPEG systems technologies - Part 10: Carriage of timed metadata metrics of media in ISO base media file format
- ISO/IEC-23001-11 - Information technology - MPEG systems technologies - Part 11: Energy-efficient media consumption (green metadata)
- ISO/IEC-23001-1-1 - - Amendment 1: Conformance and reference software
- ISO/IEC-23001-11-AM1 - - Amendment 1: Information technology - MPEG systems technologies - Part 11: Energy-efficient media consumption (green metadata) - Amendment 1: Energy-efficient media consumption (green metadata) for EVC
- ISO/IEC-23001-1-2 - - Amendment 2: Conservation of prefixes and extensions on encoding of wild cards
- ISO/IEC-23001-2 - Information technology - MPEG systems technologies - Part 2: Fragment request units
- ISO/IEC-23001-3 - Information technology - MPEG systems technologies - Part 3: XML IPMP messages
- ISO/IEC-23001-4 - Information technology - MPEG systems technologies - Part 4: Codec configuration representation
- ISO/IEC-23001-5 - Information technology - MPEG systems technologies - Part 5: Bitstream Syntax Description Language (BSDL)
- ISO/IEC-23001-7 - Information technology - MPEG systems technologies - Part 7: Common encryption in ISO base media file format files
- ISO/IEC-23001-7-AM1 - - Amendment 1: AES-CBC-128 and key rotation
- ISO/IEC-23001-8 - Information technology - MPEG systems technologies - Part 8: Coding-independent code points
- ISO/IEC-23001-8-AM1 - - Amendment 1: New audio code points
- ISO/IEC-23001-9 - Information technology - MPEG systems technologies - Part 9: Common encryption of MPEG-2 transport streams
- ISO/IEC-23002-1 - Information technology - MPEG video technologies - Part 1: Accuracy requirements for implementation of integer-output 8x8 inverse discrete cosine transform
- ISO/IEC-23002-1-1 - - Amendment 1: Software for integer IDCT accuracy testing
- ISO/IEC-23002-2 - Information technology - MPEG video technologies - Part 2: Fixed-point 8x8 inverse discrete cosine transform and discrete cosine transform
- ISO/IEC-23002-3 - Information technology - MPEG video technologies - Part 3: Representation of auxiliary video and supplemental information
- ISO/IEC-23002-4 - Information technology - MPEG video technologies - Part 4: Video tool library
- ISO/IEC-23002-4-AM1 - - Amendment 1: Graphics tool library (GTL) for the reconfigurable multimedia coding (RMC) framework
- ISO/IEC-23002-4-AM2 - - Amendment 2: FU and FN descriptions for HEVC
- ISO/IEC-23002-5 - Information technology - MPEG video technologies - Part 5: Reconfigurable media coding conformance and reference software
- ISO/IEC-23002-5-AM1 - - Amendment 1: Graphics tool library (GTL) reference software and conformance
- ISO/IEC-23003-1 - Information technology - MPEG audio technologies - Part 1: MPEG Surround
- ISO/IEC-23003-1-1 - Information technology - MPEG audio technologies - Part 1: MPEG Surround - Amendment 1: Conformance testing
- ISO/IEC-23003-1-2 - Information technology - MPEG audio technologies - Part 1: MPEG Surround - Amendment 2: Reference software
- ISO/IEC-23003-2 - Information technology - MPEG audio technologies - Part 2: Spatial Audio Object Coding (SAOC)
- ISO/IEC-23003-2-AM1 - - Amendment 1: SAOC conformance
- ISO/IEC-23003-2-AM2 - - Amendment 2: SAOC reference software
- ISO/IEC-23003-2-AM3 - - Amendment 3: Dialogue enhancement
- ISO/IEC-23003-2-AM4 - - Amendment 4: SAOC Conformance
- ISO/IEC-23003-2-AM5 - - Amendment 5: SAOC Reference Software
- ISO/IEC-23003-3 - Information technology - MPEG audio technologies - Part 3: Unified speech and audio coding
- ISO/IEC-23003-3-AM2 - - Amendment 2: Reference software
- ISO/IEC-23003-3-AM3 - Information technology - MPEG audio technologies - Part 3: Unified speech and audio coding - Amendment 3: Support of MPEG-D DRC, audio pre-roll and immediate play-out frame
- ISO/IEC-23003-4 - Information technology - MPEG audio technologies - Part 4: Dynamic range control
- ISO/IEC-23004-1 - Information technology - Multimedia Middleware - Part 1: Architecture
- ISO/IEC-23004-2 - Information technology - Multimedia Middleware - Part 2: Multimedia application programming interface (API)
- ISO/IEC-23004-3 - Information technology - Multimedia Middleware - Part 3: Component model
- ISO/IEC-23004-4 - Information technology - Multimedia Middleware - Part 4: Resource and quality management
- ISO/IEC-23004-5 - Information technology - Multimedia Middleware - Part 5: Component download
- ISO/IEC-23004-6 - Information technology - Multimedia Middleware - Part 6: Fault management
- ISO/IEC-23004-7 - Information technology - Multimedia Middleware - Part 7: System integrity management
- ISO/IEC-23004-8 - Information technology - Multimedia Middleware - Part 8: Reference software
- ISO/IEC-23005-1 - Information technology - Media context and control - Part 1: Architecture
- ISO/IEC-23005-2 - Information technology - Media context and control - Part 2: Control information
- ISO/IEC-23005-3 - Information technology - Media context and control - Part 3: Sensory information
- ISO/IEC-23005-4 - Information technology - Media context and control - Part 4: Virtual world object characteristics
- ISO/IEC-23005-5 - Information technology - Media context and control - Part 5: Data formats for interaction devices
- ISO/IEC-23005-6 - Information technology - Media context and control - Part 6: Common types and tools
- ISO/IEC-23005-7 - Information technology - Media context and control - Part 7: Conformance and reference software
- ISO/IEC-23006-1 - Information technology - Multimedia service platform technologies - Part 1: Architecture
- ISO/IEC-23006-2 - Information technology - Multimedia service platform technologies - Part 2: MPEG extensible middleware (MXM) API
- ISO/IEC-23006-3 - Information technology - Multimedia service platform technologies - Part 3: Conformance and reference software
- ISO/IEC-23006-4 - Information technology - Multimedia service platform technologies - Part 4: Elementary services
- ISO/IEC-23006-5 - Information technology - Multimedia service platform technologies - Part 5: Service aggregation
- ISO/IEC-23007-1 - Information technology - Rich media user interfaces - Part 1: Widgets
- ISO/IEC-23007-1-AM1 - - Amendment 1: Widget extensions
- ISO/IEC-23007-2 - Information technology - Rich media user interfaces - Part 2: Advanced user interaction (AUI) interfaces
- ISO/IEC-23007-3 - Information technology - Rich media user interfaces - Part 3: Conformance and reference software
- ISO/IEC-23007-3-AM1 - - Amendment 1: Conformance and reference software for widget extension and AUI
- ISO/IEC-23008-1 - Information technology - High efficiency coding and media delivery in heterogeneous environments - Part 1: MPEG media transport (MMT)
- ISO/IEC-23008-10 - Information technology - High efficiency coding and media delivery in heterogeneous environments - Part 10: MPEG Media Transport Forward Error Correction (FEC) codes
- ISO/IEC-23008-11 - Information technology - High efficiency coding and media delivery in heterogeneous environments - Part 11: MPEG Media Transport Composition Information
- ISO/IEC-23008-13 - Information technology - High efficiency coding and media delivery in heterogeneous environments - Part 13: MMT implementation guidance
- ISO/IEC-23008-1-AM1 - - Amendment 1: Use of MMT Data in MPEG-H 3D Audio
- ISO/IEC-23008-2 - Information technology - High efficiency coding and media delivery in heterogeneous environments - Part 2: High efficiency video coding
- ISO/IEC-23008-2-AM1 - - Amendment 1: Shutter interval information SEI message
- ISO/IEC-23008-3 - Information technology - High efficiency coding and media delivery in heterogeneous environments - Part 3: 3D audio
- ISO/IEC-23008-5 - Information technology - High efficiency coding and media delivery in heterogeneous environments - Part 5: Reference software for high efficiency video coding
- ISO/IEC-23008-5-AM1 - - Amendment 1: Reference software for screen content coding extensions
- ISO/IEC-23008-5-AM2 - - Amendment 2: Reference Software for the Multiview Main Profile of HEVC
- ISO/IEC-23008-8 - Information technology - High efficiency coding and media delivery in heterogeneous environments - Part 8: Conformance specification for HEVC
- ISO/IEC-23009-1 - Information technology - Dynamic adaptive streaming over HTTP (DASH) - Part 1: Media presentation description and segment formats
- ISO/IEC-23009-1-AM1 - - Amendment 1: High Profile and Availability Time Synchronization
- ISO/IEC-23009-1-AM2 - - Amendment 2: Spatial relationship description, generalized URL parameters and other extensions
- ISO/IEC-23009-1-AM3 - - Amendment 3: Authentication, MPD linking, Callback Event, Period Continuity and other Extensions
- ISO/IEC-23009-2 - Information technology - Dynamic adaptive streaming over HTTP (DASH) - Part 2: Conformance and reference software
- ISO/IEC-23009-3 - Information technology - Dynamic adaptive streaming over HTTP (DASH) - Part 3: Implementation Guidelines
- ISO/IEC-23009-4 - Information technology - Dynamic adaptive streaming over HTTP (DASH) - Part 4: Segment encryption and authentication
- ISO/IEC-2375 - Information technology . Registered escape sequences and coded character sets
- ISO/IEC-24708 - Information technology - Biometrics - BioAPI Interworking Protocol
- ISO/IEC-24709-1 - Information technology - Conformance testing for the biometric application programming interface (BioAPI) - Part 1: Methods and procedures
- ISO/IEC-24709-2 - Information technology - Conformance testing for the biometric application programming interface (BioAPI) - Part 2: Test assertions for biometric service providers
- ISO/IEC-24709-3 - Information technology - Conformance testing for the biometric application programming interface (BioAPI) - Part 3: Test assertions for BioAPI frameworks
- ISO/IEC-24710 - Information technology - Radio frequency identification for item management - Elementary tag licence plate functionality for ISO/IEC 18000 air interface definitions
- ISO/IEC-24713-1 - Information technology - Biometric profiles for interoperability and data interchange - Part 1: Overview of biometric systems and biometric profiles
- ISO/IEC-24713-2 - Information technology - Biometric profiles for interoperability and data interchange - Part 2: Physical access control for employees at airports
- ISO/IEC-24713-3 - Information technology - Biometric profiles for interoperability and data interchange - Part 3: Biometrics-based verification and identification of seafarers
- ISO/IEC-24720 - Information technology - Automatic identification and data capture techniques - Guidelines for direct part marking (DPM)
- ISO/IEC-24722 - Information technology - Biometrics - Multimodal and other multibiometric fusion
- ISO/IEC-24723 - Information technology - Automatic identification and data capture techniques - GS1 Composite bar code symbology specification
- ISO/IEC-24724 - Information technology - Automatic identification and data capture techniques - GS1 DataBar bar code symbology specification
- ISO/IEC-24728 - Information technology - Automatic identification and data capture techniques - MicroPDF417 bar code symbology specification
- ISO/IEC-24729-1 - Information technology - Radio frequency identification for item management - Implementation guidelines - Part 1: RFID-enabled labels and packaging supporting ISO/IEC 18000-6C
- ISO/IEC-24729-2 - Information technology - Radio frequency identification for item management - Implementation guidelines - Part 2: Recycling and RFID tags
- ISO/IEC-24729-3 - Information technology - Radio frequency identification for item management - Implementation guidelines - Part 3: Implementation and operation of UHF RFID Interrogator systems in logistics applications
- ISO/IEC-24729-4 - Information technology - Radio frequency identification for item management - Implementation guidelines - Part 4: Tag data security
- ISO/IEC-24730-1 - Information technology - Real-time locating systems (RTLS) - Part 1: Application programming interface (API)
- ISO/IEC-24730-2 - Information technology - Real time locating systems (RTLS) - Part 2: Direct Sequence Spread Spectrum (DSSS) 2,4 GHz air interface protocol
- ISO/IEC-24730-21 - Information technology - Real time locating systems (RTLS) - Part 21: Direct Sequence Spread Spectrum (DSSS) 2,4 GHz air interface protocol: Transmitters operating with a single spread code and employing a DBPSK data encoding and BPSK spreading scheme
- ISO/IEC-24730-22 - Information technology - Real time locating systems (RTLS) - Part 22: Direct Sequence Spread Spectrum (DSSS) 2,4 GHz air interface protocol: Transmitters operating with multiple spread codes and employing a QPSK data encoding and Walsh offset QPSK (WOQPSK) spreading scheme
- ISO/IEC-24730-5 - Information technology - Real-time locating systems (RTLS) - Part 5: Chirp spread spectrum (CSS) at 2,4 GHz air interface
- ISO/IEC-24730-61 - Information technology - Real time locating systems (RTLS) - Part 61: Low rate pulse repetition frequency Ultra Wide Band (UWB) air interface
- ISO/IEC-24730-62 - Information technology - Real time locating systems (RTLS) - Part 62: High rate pulse repetition frequency Ultra Wide Band (UWB) air interface
- ISO/IEC-24741 - Information technology - Biometrics - Overview and application
- ISO/IEC-24745 - Information security, cybersecurity and privacy protection - Biometric information protection
- ISO/IEC-24753 - Information technology - Radio frequency identification (RFID) for item management - Application protocol: encoding and processing rules for sensors and batteries
- ISO/IEC-24759 - Information technology - Security techniques - Test requirements for cryptographic modules
- ISO/IEC-24760-1 - IT Security and Privacy - A framework for identity management - Part 1: Terminology and concepts
- ISO/IEC-24760-2 - Information technology - Security techniques - A framework for identity management - Part 2: Reference architecture and requirements
- ISO/IEC-24760-3 - Information technology - Security techniques - A framework for identity management - Part 3: Practice
- ISO/IEC-24761 - Information technology - Security techniques - Authentication context for biometrics
- ISO/IEC-24762 - Information technology -- Security techniques -- Guidelines for information and communications technology disaster recovery services
- ISO/IEC-24769 - Information technology - Real-time locating system (RTLS) device conformance test methods - Test methods for air interface communication at 2,4 GHz
- ISO/IEC-24769-2 - Information technology - Real-time locating systems (RTLS) device conformance test methods - Part 2: Test methods for air interface communication at 2,4 GHz
- ISO/IEC-24770 - Information technology - Real-time locating system (RTLS) device performance test methods - Test methods for air interface communication at 2,4 GHz
- ISO/IEC-24770-62 - Information technology - Real-time locating system (RTLS) device performance test methods - Part 62: High rate pulse repetition frequency Ultra Wide Band (UWB) air interface
- ISO/IEC-24778 - Information technology - Automatic identification and data capture techniques - Aztec Code bar code symbology specification
- ISO/IEC-24779-1 - Information technology - Cross-jurisdictional and societal aspects of implementation of biometric technologies - Pictograms, icons and symbols for use with biometric systems - Part 1: General principles
- ISO/IEC-24779-9 - Information technology - Cross-jurisdictional and societal aspects of implementation of biometric technologies - Pictograms, icons and symbols for use with biometric systems - Part 9: Vascular applications
- ISO/IEC-24791-1 - Information technology - Radio frequency identification (RFID) for item management - Software system infrastructure - Part 1: Architecture
- ISO/IEC-24791-2 - Information technology - Radio frequency identification (RFID) for item management - Software system infrastructure - Part 2: Data management
- ISO/IEC-24791-3 - Information technology - Radio frequency identification (RFID) for item management - Software system infrastructure - Part 3: Device management
- ISO/IEC-24791-5 - Information technology - Radio frequency identification (RFID) for item management - Software system infrastructure - Part 5: Device interface
- ISO/IEC-24800-1 - Information technology - JPSearch - Part 1: System framework and components
- ISO/IEC-24800-2 - Information technology - JPSearch - Part 2: Registration, identification and management of schema and ontology
- ISO/IEC-24800-2-AM1 - - Amendment 1: JPEG Ontology for Image Description
- ISO/IEC-24800-3 - Information technology - JPSearch - Part 3: Query format
- ISO/IEC-24800-3-AM1 - - Amendment 1: JPSearch API
- ISO/IEC-24800-4 - Information technology - JPSearch - Part 4: File format for metadata embedded in image data (JPEG and JPEG 2000)
- ISO/IEC-24800-5 - Information technology - JPSearch - Part 5: Data interchange format between image repositories
- ISO/IEC-24800-6 - Information technology - JPSearch - Part 6: Reference software
- ISO/IEC-27000 - Information technology - Security techniques - Information security management systems - Overview and vocabulary
- ISO/IEC-27001 - Information security, cybersecurity and privacy protection - Information security management systems - Requirements
- ISO/IEC-27001-RL - Information security, cybersecurity and privacy protection - Information security management systems - Requirements (includes Redline Version)
- ISO/IEC-27002 - Information security, cybersecurity and privacy protection - Information security controls
- ISO/IEC-27003 - Information technology - Security techniques - Information security management systems - Guidance
- ISO/IEC-27004 - Information technology - Security techniques - Information security management - Monitoring, measurement, analysis and evaluation
- ISO/IEC-27005 - Information security, cybersecurity and privacy protection -- Guidance on managing information security risks
- ISO/IEC-27006 - Information technology - Security techniques - Requirements for bodies providing audit and certification of information security management systems
- ISO/IEC-27007 - Information security, cybersecurity and privacy protection - Guidelines for information security management systems auditing
- ISO/IEC-27008 - Information technology - Security techniques - Guidelines for the assessment of information security controls
- ISO/IEC-27009 - Information security, cybersecurity and privacy protection - Sector-specific application of ISO/IEC 27001 - Requirements
- ISO/IEC-27010 - Information technology - Security techniques - Information security management for inter-sector and inter-organizational communications
- ISO/IEC-27011 - Information security, cybersecurity and privacy protection - Information security controls based on ISO/IEC 27002 for telecommunications organizations
- ISO/IEC-27013 - Information security, cybersecurity and privacy protection - Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1
- ISO/IEC-27014 - Information security, cybersecurity and privacy protection - Governance of information security
- ISO/IEC-27015 - Information technology - Security techniques - Information security management guidelines for financial services
- ISO/IEC-27016 - Information technology - Security techniques - Information security management - Organizational economics
- ISO/IEC-27017 - Information technology - Security techniques - Code of practice for information security controls based on ISO/IEC 27002 for cloud services
- ISO/IEC-27018 - Information technology - Security techniques - Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors
- ISO/IEC-27019 - Information technology - Security techniques - Information security management guidelines based on ISO/IEC 27002 for process control systems specific to the energy utility industry
- ISO/IEC-27023 - Information technology - Security techniques - Mapping the revised editions of ISO/IEC 27001 and ISO/IEC 27002
- ISO/IEC-27031 - Information technology - Security techniques - Guidelines for information and communication technology readiness for business continuity
- ISO/IEC-27032 - Cybersecurity - Guidelines for Internet security
- ISO/IEC-27033-1 - Information technology - Security techniques - Network security - Part 1: Overview and concepts
- ISO/IEC-27033-2 - Information technology - Security techniques - Network security - Part 2: Guidelines for the design and implementation of network security
- ISO/IEC-27033-3 - Information technology - Security techniques - Network security - Part 3: Reference networking scenarios - Threats, design techniques and control issues
- ISO/IEC-27033-4 - Information technology - Security techniques - Network security - Part 4: Securing communications between networks using security gateways
- ISO/IEC-27033-5 - Information technology - Security techniques - Network security - Part 5: Securing communications across networks using Virtual Private Networks (VPNs)
- ISO/IEC-27033-6 - Information technology - Security techniques - Network security - Part 6: Securing wireless IP network access
- ISO/IEC-27034-1 - Information technology - Security techniques - Application security - Part 1: Overview and concepts
- ISO/IEC-27034-2 - Information technology - Security techniques - Application security - Part 2: Organization normative framework
- ISO/IEC-27034-6 - Information technology - Security techniques - Application security - Part 6: Case studies
- ISO/IEC-27035 - Information technology - Security techniques - Information security incident management
- ISO/IEC-27035-1 - Information technology - Information security incident management - Part 1: Principles and process
- ISO/IEC-27035-2 - Information technology - Information security incident management - Part 2: Guidelines to plan and prepare for incident response
- ISO/IEC-27036-1 - Cybersecurity - Supplier relationships - Part 1: Overview and concepts
- ISO/IEC-27036-2 - Cybersecurity - Supplier relationships - Part 2: Requirements
- ISO/IEC-27036-4 - Information technology - Security techniques - Information security for supplier relationships - Part 4: Guidelines for security of cloud services
- ISO/IEC-27037 - Information technology - Security techniques - Guidelines for identification, collection, acquisition and preservation of digital evidence
- ISO/IEC-27038 - Information technology - Security techniques - Specification for digital redaction
- ISO/IEC-27039 - Information technology - Security techniques - Selection, deployment and operations of intrusion detection systems (IDPS)
- ISO/IEC-27040 - Information technology - Security techniques - Storage security
- ISO/IEC-27041 - Information technology - Security techniques - Guidance on assuring suitability and adequacy of incident investigative method
- ISO/IEC-27042 - Information technology - Security techniques - Guidelines for the analysis and interpretation of digital evidence
- ISO/IEC-27043 - Information technology - Security techniques - Incident investigation principles and processes
- ISO/IEC-27050-1 - Information technology - Electronic discovery - Part 1: Overview and concepts
- ISO/IEC-29101 - Information technology - Security techniques - Privacy architecture framework
- ISO/IEC-29109-1 - Information technology - Conformance testing methodology for biometric data interchange formats defined in ISO/IEC 19794 - Part 1: Generalized conformance testing methodology
- ISO/IEC-29109-10 - Information technology - Conformance testing methodology for biometric data interchange formats defined in ISO/IEC 19794 - Part 10: Hand geometry silhouette data
- ISO/IEC-29109-2 - Information technology - Conformance testing methodology for biometric data interchange formats defined in ISO/IEC 19794 - Part 2: Finger minutiae data
- ISO/IEC-29109-4 - Information technology - Conformance testing methodology for biometric data interchange formats defined in ISO/IEC 19794 - Part 4: Finger image data
- ISO/IEC-29109-5 - Information technology - Conformance testing methodology for biometric data interchange formats defined in ISO/IEC 19794 - Part 5: Face image data
- ISO/IEC-29109-6 - Information technology - Conformance testing methodology for biometric data interchange formats defined in ISO/IEC 19794 - Part 6: Iris image data
- ISO/IEC-29109-7 - Information technology - Conformance testing methodology for biometric data interchange formats defined in ISO/IEC 19794 - Part 7: Signature/sign time series data
- ISO/IEC-29109-8 - Information technology - Conformance testing methodology for biometric data interchange formats defined in ISO/IEC 19794 - Part 8: Finger pattern skeletal data
- ISO/IEC-29109-9 - Information technology - Conformance testing methodology for biometric data interchange formats defined in ISO/IEC 19794 - Part 9: Vascular image data
- ISO/IEC-29115 - Information technology - Security techniques - Entity authentication assurance framework
- ISO/IEC-29116-1 - Part 1: Media Streaming Application Format Protocols, Information Technology - Supplem
- ISO/IEC-29120-1 - Information technology - Machine-readable test data for biometric testing and reporting - Part 1: Test reports
- ISO/IEC-29128 - Information technology - Security techniques - Verification of cryptographic protocols
- ISO/IEC-29133 - Information technology - Automatic identification and data capture techniques - Quality test specification for rewritable hybrid media data carriers
- ISO/IEC-29141 - Information technology - Biometrics - Tenprint capture using biometric application programming interface (BioAPI)
- ISO/IEC-29143 - Information technology - Automatic identification and data capture techniques - Air interface specification for Mobile RFID interrogators
- ISO/IEC-29144 - Information technology - Biometrics - The use of biometric technology in commercial Identity Management applications and processes
- ISO/IEC-29146 - Information technology - Security techniques - A framework for access management
- ISO/IEC-29147 - Information technology - Security techniques - Vulnerability disclosure
- ISO/IEC-29149 - Information technology - Security techniques - Best practices for the provision and use of time-stamping services
- ISO/IEC-29150 - Information technology - Security techniques - Signcryption
- ISO/IEC-29156 - Information technology - Guidance for specifying performance requirements to meet security and usability needs in applications using biometrics
- ISO/IEC-29158 - Information technology - Automatic identification and data capture techniques - Direct Part Mark (DPM) Quality Guideline
- ISO/IEC-29159-1 - Information technology - Biometric calibration, augmentation and fusion data - Part 1: Fusion information format
- ISO/IEC-29160 - Information technology - Radio frequency identification for item management - RFID Emblem
- ISO/IEC-29161 - Information technology - Data structure - Unique identification for the Internet of Things
- ISO/IEC-29162 - Information technology - Guidelines for using data structures in AIDC media
- ISO/IEC-29164 - Information technology - Biometrics - Embedded BioAPI
- ISO/IEC-29167-1 - Information technology - Automatic identification and data capture techniques - Part 1: Security services for RFID air interfaces
- ISO/IEC-29167-10 - Information technology - Automatic identification and data capture techniques - Part 10: Crypto suite AES-128 security services for air interface communications
- ISO/IEC-29167-11 - Information technology - Automatic identification and data capture techniques - Part 11: Crypto suite PRESENT-80 security services for air interface communications
- ISO/IEC-29167-12 - Information technology - Automatic identification and data capture techniques - Part 12: Crypto suite ECC-DH security services for air interface communications
- ISO/IEC-29167-13 - Information technology - Automatic identification and data capture techniques - Part 13: Crypto suite Grain-128A security services for air interface communications
- ISO/IEC-29167-14 - Information technology - Automatic identification and data capture techniques - Part 14: Crypto suite AES OFB security services for air interface communications
- ISO/IEC-29167-16 - Information technology - Automatic identification and data capture techniques - Part 16: Crypto suite ECDSA-ECDH security services for air interface communications
- ISO/IEC-29167-17 - Information technology - Automatic identification and data capture techniques - Part 17: Crypto suite cryptoGPS security services for air interface communications
- ISO/IEC-29167-19 - Information technology - Automatic identification and data capture techniques - Part 19: Crypto suite RAMON security services for air interface communications
- ISO/IEC-29170-2 - Information technology - Advanced image coding and evaluation - Part 2: Evaluation procedure for nearly lossless coding
- ISO/IEC-29172 - Information technology - Mobile item identification and management - Reference architecture for Mobile AIDC services
- ISO/IEC-29173-1 - Information technology - Mobile item identification and management - Part 1: Mobile RFID interrogator device protocol for ISO/IEC 18000-63 Type C
- ISO/IEC-29175 - Information technology - Mobile item identification and management - User data for Mobile AIDC services
- ISO/IEC-29176 - Information technology - Mobile item identification and management - Consumer privacy-protection protocol for Mobile RFID services
- ISO/IEC-29177 - Information technology - Automatic identification and data capture technique - Identifier resolution protocol for multimedia information access triggered by tag-based identification
- ISO/IEC-29178 - Information technology - Mobile item identification and management - Service broker for Mobile AIDC services
- ISO/IEC-29179 - Information technology - Mobile item identification and management - Mobile AIDC application programming interface
- ISO/IEC-29189 - Information technology - Biometrics - Evaluation of examiner assisted biometric applications
- ISO/IEC-29190 - Information technology - Security techniques - Privacy capability assessment model
- ISO/IEC-29191 - Information technology - Security techniques - Requirements for partially anonymous, partially unlinkable authentication.
- ISO/IEC-29192-1 - Information technology - Security techniques - Lightweight cryptography - Part 1: General
- ISO/IEC-29192-2 - Information security - Lightweight cryptography - Part 2: Block ciphers
- ISO/IEC-29192-3 - Information technology - Security techniques - Lightweight cryptography - Part 3: Stream ciphers
- ISO/IEC-29192-4 - Information technology - Security techniques - Lightweight cryptography - Part 4: Mechanisms using asymmetric techniques
- ISO/IEC-29192-4-AM1 - - Amendment 1
- ISO/IEC-29192-5 - Information technology - Security techniques - Lightweight cryptography - Part 5: Hash-functions
- ISO/IEC-29195 - Traveller processes for biometric recognition in automated border
- ISO/IEC-29196 - Information technology - Guidance for biometric enrolment
- ISO/IEC-29198 - Information technology - Biometrics - Characterization and measurement of difficulty for fingerprint databases for technology evaluation
- ISO/IEC-29199-1 - Information technology - JPEG XR image coding system - Part 1: System architecture
- ISO/IEC-29199-2 - Information technology - JPEG XR image coding system - Part 2: Image coding specification
- ISO/IEC-29199-3 - Information technology - JPEG XR image coding system - Part 3: Motion JPEG XR
- ISO/IEC-29199-4 - Information technology - JPEG XR image coding system - Part 4: Conformance testing
- ISO/IEC-29199-4-AM1 - - Amendment 1: Additional JPEG XR conformance test streams
- ISO/IEC-29199-5 - Information technology - JPEG XR image coding system - Part 5: Reference software
- ISO/IEC-29199-5-AM1 - - Amendment 1: Extension of the Reference Software: Support for the Boxed Based File Format
- ISO/IEC-29794-1 - Information technology - Biometric sample quality - Part 1: Framework
- ISO/IEC-29794-4 - Information technology - Biometric sample quality - Part 4: Finger image data
- ISO/IEC-29794-5 - Information technology - Biometric sample quality - Part 5: Face image data
- ISO/IEC-29794-6 - Information technology - Biometric sample quality - Part 6: Iris image data
- ISO/IEC-30104 - Information Technology - Security Techniques - Physical Security Attacks, Mitigation Techniques and Security Requirements
- ISO/IEC-30106-1 - Information technology - Object oriented BioAPI - Part 1: Architecture
- ISO/IEC-30106-2 - Information technology - Object oriented BioAPI - Part 2: Java implementation
- ISO/IEC-30106-3 - Information technology - Object oriented BioAPI - Part 3: C# implementation
- ISO/IEC-30107-1 - Information technology - Biometric presentation attack detection - Part 1: Framework
- ISO/IEC-30108-1 - Information technology - Biometric Identity Assurance Services - Part 1: BIAS services
- ISO/IEC-30110 - Information technology - Cross jurisdictional and societal aspects of implementation of biometric technologies - Biometrics and children
- ISO/IEC-30111 - Information technology - Security techniques - Vulnerability handling processes
- ISO/IEC-30116 - Information technology - Automatic identification and data capture techniques - Optical Character Recognition (OCR) quality testing
- ISO/IEC-30125 - Information technology - Biometrics used with mobile devices
- ISO/IEC-30132-1 - Information technology - Information technology sustainability - Energy efficient computing models - Part 1: Guidelines for energy effectiveness evaluation
- ISO/IEC-4873 - Information technology - ISO 8-bit code for information interchange - Structure and rules for implementation
- ISO/IEC-5218 - Information technology - Codes for the representation of human sexes
- ISO/IEC-6429 - Information technology - Control functions for coded character sets
- ISO/IEC-646 - Information technology - ISO 7-bit coded character set for information interchange
- ISO/IEC-6523-1 - Information technology - Structure for the identification of organizations and organization parts - Part 1: Identification of organization identification schemes
- ISO/IEC-6523-2 - Information technology - Structure for the identification of organizations and organization parts - Part 2: Registration of organization identification schemes
- ISO/IEC-6937 - Information technology - Coded graphic character set for text communication - Latin alphabet
- ISO/IEC-7064 - Information technology - Security techniques - Check character systems
- ISO/IEC-7350 - Information technology - Registration of repertoires of graphic characters from ISO/IEC 10367
- ISO/IEC-8859-1 - Information technology - 8-bit single-byte coded graphic character sets - Part 1: Latin alphabet No. 1 (publiÇ en anglais seulement)
- ISO/IEC-8859-10 - Information technology - 8-bit single-byte coded graphic character sets - Part 10: Latin alphabet No. 6
- ISO/IEC-8859-11 - Information technology - 8-bit single-byte coded graphic character sets - Part 11: Latin/Thai alphabet
- ISO/IEC-8859-13 - Information technology - 8-bit single-byte coded graphic character sets - Part 13: Latin alphabet No. 7
- ISO/IEC-8859-14 - Information technology - 8-bit single-byte coded graphic character sets - Part 14: Latin alphabet No. 8 (Celtic)
- ISO/IEC-8859-15 - Information technology -- 8-bit single-byte coded graphic character sets -- Part 15: Latin alphabet No. 9
- ISO/IEC-8859-16 - Information technology -- 8-bit single-byte coded graphic character sets -- Part 16: Latin alphabet No. 10
- ISO/IEC-8859-2 - Information technology -- 8-bit single-byte coded graphic character sets -- Part 2: Latin alphabet No. 2
- ISO/IEC-8859-3 - Information technology - 8-bit single-byte coded graphic character sets - Part 3: Latin alphabet No. 3
- ISO/IEC-8859-4 - Information technology - 8-bit single-byte coded graphic character sets - Part 4: Latin alphabet No. 4
- ISO/IEC-8859-5 - Information technology - 8-bit single-byte coded graphic character sets - Part 5: Ltin/Cyrillic alphabet
- ISO/IEC-8859-6 - Information technology - 8-bit single-byte coded graphic character sets - Part 6: Latin/Arabic alphabet
- ISO/IEC-8859-7 - Information technology - 8-bit single-byte coded graphic character sets - Part 7: Latin/Greek alphabet
- ISO/IEC-8859-8 - Information technology - 8-bit single-byte coded graphic character sets - Part 8: Latin/Hebrew alphabet
- ISO/IEC-8859-9 - Information technology - 8-bit single-byte coded graphic character sets - Part 9: Latin alphabet No. 5
- ISO/IEC-9282-1 - Information processing - Coded representation of pictures - Part 1: Encoding principles for picture representation in a 7-bit or 8-bit environment
- ISO/IEC-9789 - Information technology - Guidelines for the organization and representation of data elements for data interchange - Coding methods and principles
- ISO/IEC-9796-2 - Information technology - Security techniques - Digital signature schemes giving message recovery - Part 2: Integer factorization based mechanisms
- ISO/IEC-9796-2-1 - Amendment 1: Information Technology - Security Techniques - Digital Signature Schemes
- ISO/IEC-9796-3 - Information technology - Security techniques - Digital signature schemes giving message recovery - Part 3: Discrete logarithm based mechanisms
- ISO/IEC-9797-1 - Information technology - Security techniques - Message Authentication Codes (MACs) - Part 1: Mechanisms using a block cipher
- ISO/IEC-9797-2 - Information security - Message authentication codes (MACs) - Part 2: Mechanisms using a dedicated hash-function
- ISO/IEC-9797-3 - Information technology - Security techniques - Message Authentication Codes (MACs) - Part 3: Mechanisms using a universal hash-function
- ISO/IEC-9798-1 - Information technology - Security techniques - Entity authentication - Part 1: General
- ISO/IEC-9798-2 - IT Security techniques - Entity authentication - Part 2: Mechanisms using authenticated encryption
- ISO/IEC-9798-3 - IT Security techniques - Entity authentication - Part 3: Mechanisms using digital signature techniques
- ISO/IEC-9798-3-AM1 - Information technology - Security techniques - Entity authentication mechanisms - Part 3: Entity authentication using a public key algorithm - Amendment 1: .
- ISO/IEC-9798-4 - Information technology -- Security techniques -- Entity authentication -- Part 4: Mechanisms using a cryptographic check function
- ISO/IEC-9798-5 - Information technology - Security techniques - Entity authentication - Part 5: Mechanisms using zero-knowledge techniques
- ISO/IEC-9798-6 - Information technology - Security techniques - Entity authentication - Part 6: Mechanisms using manual data transfer
- ISO/IEC-9979 - Security Techniques - Procedures for the Registration of Cryptographic Algorithms, Informa
- ISO/IEC-DIS-27050-1 - Information technology - Security techniques - Electronic discovery - Part 1: Overview and concepts
- ISO/IEC/IEEE-21450 - Information technology - Smart transducer interface for sensors and actuators - Common functions, communication protocols, and Transducer Electronic Data Sheet (TEDS) formats
- ISO/IEC/IEEE-21451-1 - Information technology - Smart transducer interface for sensors and actuators - Part 1: Network Capable Application Processor (NCAP) information model
- ISO/IEC/IEEE-21451-2 - Information technology - Smart transducer interface for sensors and actuators - Part 2: Transducer to microprocessor communication protocols and Transducer Electronic Data Sheet (TEDS) formats
- ISO/IEC/IEEE-21451-4 - Information technology - Smart transducer interface for sensors and actuators - Part 4: Mixed-mode communication protocols and Transducer Electronic Data Sheet (TEDS) formats
- ISO/IEC/IEEE-21451-7 - Information technology - Smart transducer interface for sensors and actuators - Part 7: Transducer to radio frequency identification (RFID) systems communication protocols and Transducer Electronic Data Sheet (TEDS) formats
Other SDOs:
- AS/NZS-6906 - Electronic Fee Transaction Using Dedicated Short-Range Communication (Dsrc)
- AS/NZS-ISO/IEC-27005 - Information technology - Security techniques - Information security risk management
- DIN-EN-12323 - Aidc Technologies, Symboloty Specifications - Code 16K
- DIN-EN-1649 - Aidc Technologies, Operational Aspects Affecting the Reading of Bar Code Symbols
- DIN-EN-16495 - Air Traffic Management - Information security for organizations supporting civil aviation operations
- DIN-EN-606 - Bar Coding, Transport & Handling Labels for Steel Products
- DIN-EN-ISO-21007-1 - Part 1: Reference Architecture & Terminology, Gas Cylinders - Identification & Markin
- DIN-EN-ISO-21007-2 - Gas cylinders - Identification and marking using radio frequency identification technology - Part 2: Numbering schemes for radio frequency identification
- DIN-EN-ISO/IEC-15419 - Information Technology - Automatic Identification & Data Capture Techniques - Bar Code
- DIN-EN-ISO/IEC-15421 - Information technology - Automatic identification and data capture techniques - Bar code master test specifications (ISO/IEC 15421:2000)
- DIN-EN-ISO/IEC-15438 - Information Technology - Automatic Identification & Data Capture Techniques - Pdf417 B
- DIN-ISO-8601 - Data Elements & Interchange Formats - Information Interchange - Representation of Date
- DS-ISO-IEC-24730-5 - Information technology - Real time locating systems (RTLS) - Part 2: Direct Sequence Spread Spectrum (DSSS) 2,4 GHz air interface protocol
- EN-12323 - Aidc Technologies, Symbology Specifications - Code 16K
- EN-1332-4 - Part 4: Coding of User Requirements for People With Special Needs, Identification Car
- EN-13710 - European Ordering Rules - Ordering of characters from Latin, Greek, Cyrillic, Georgian and Armenian scripts
- EN-14603 - Information Technology, Alphanumeric Glyph Image Set for Optical Character Recognition
- EN-1573 - Bar code - Multi industry transport label
- EN-1649 - Aidc Technologies, Operational Aspects Affecting the Reading of Bar Code Symbols
- EN-16495 - Air Traffic Management - Information security for organizations supporting civil aviation operations
- EN-419211-2 - Protection profiles for secure signature creation device - Part 2: Device with key generation
- EN-419211-3 - Protection profiles for secure signature creation device - Part 3: Device with key import
- EN-419211-4 - Protection profiles for secure signature creation device - Part 4: Extension for device with key generation and trusted channel to certificate generation application
- EN-419211-5 - Protection profiles for secure signature creation device - Part 4: Extension for device with key generation and trusted channel to certificate generation application
- EN-419211-6 - Protection profiles for secure signature creation device - Part 6: Extension for device with key import and trusted channel to signature creation application
- EN-606 - Bar Coding, Transport & Handling Labels for Steel Products
- EN-61937-5 - Digital Audio, Interface for Non-Linear Pcm Encoded Audio Bitstreams Applying IEC-6095
- EN-61937-6 - Digital audio - Interface for non-linear PCM encoded audio bitstreams applying IEC 60958 - Part 6: Non-linear PCM bitstreams according to the MPEG-2 AAC and MPEG-4 AAC formats
- EN-61937-8 - Digital Audio, Interface for Non-Linear Pcm Encoded Audio Bitstreams Applying IEC 6095
- EN-61937-9 - Digital Audio, Interface for Non-Linear Pcm Encoded Audio Bitstreams Applying IEC-6095
- EN-62090 - Product package labels for electronic components using bar code and two- dimensional symbologies
- EN-62261-1 - Television Metadata, Metadata Dictionary Structure
- EN-62261-2 - Television Metadata, Data Encoding Protocol Using Key-Length-Value
- EN-62439 - High Availability Automation Networks
- EN-62439-1 - Part 1: General Concepts & Calculation Methods, Industrial Communication Networks - Hi
- EN-62439-2 - Part 2: Media Redundancy Protocol (Mrp), Industrial Communication Networks - High Avai
- EN-62439-3 - Industrial communication networks - High availability automation networks - Part 3: Parallel Redundancy Protocol (PRP) and High-availability Seamless Redundancy (HSR)
- EN-62439-4 - Part 4: Cross-Network Redundancy Protocol (Crp), Industrial Communication Networks -
- EN-62439-5 - Part 5: Beacon Redundancy Protocol (Brp), Industrial Communication Networks - High Ava
- EN-62439-6 - Part 6: Distributed Redundancy Protocol (Drp), Industrial Communication Networks - Hig
- EN-62439-7 - Industrial communication networks - High availability automation networks - Part 7: Ring-based Redundancy Protocol (RRP)
- EN-62537 - Interface for Loud Speakers With Digital Input Signals Based on IEC-60958
- EN-ISO-11172-3 - Information Technology, Coding of Moving Pictures & Associated Audio for Digital Stora
- EN-ISO-13230 - Ophthalmic Optics, Bar Code Specifications (ISO 13230: 1999)
- EN-ISO-6709 - Standard Representation of Geographic Point Location by Coordinates
- EN-ISO/IEC-11172-1 - Information Technology, Coding of Moving Pictures & Associated Audio for Digital Stora
- EN-ISO/IEC-11172-2 - Information Technology, Coding of Moving Pictures & Associated Audio for Digital Stora
- EN-ISO/IEC-11172-4 - Information Technology, Coding of Moving Pictures & Associated Audio for Digital Stora
- EN-ISO/IEC-15415 - Information technology - Automatic identification and data capture techniques - Bar code print quality test specification - Two-dimensional symbols
- EN-ISO/IEC-15419 - Information Technology - Automatic Identification & Data Capture Techniques - Bar Code
- EN-ISO/IEC-15421 - Information Technology, Automatic Identification & Data Capture Techniques, Bar Code M
- EN-ISO/IEC-15426-2 - Information technology - Automatic identification and data capture techniques - Bar code verifier conformance specification - Part 2: Two-dimensional symbols
- EN-ISO/IEC-15438 - Information Technology - Automatic Identification & Data Capture Techniques - Pdf417 B
- EN-ISO/IEC-27037 - Information technology - Security techniques - Guidelines for identification, collection, acquisition and preservation of digital evidence
- EN-ISO/IEC-27038 - Information technology - Security techniques - Specification for digital redaction
- EN-ISO/IEC-27040 - Information technology - Security techniques - Storage security
- EN-ISO/IEC-27041 - Information technology - Security techniques - Guidance on assuring suitability and adequacy of incident investigative method
- EN-ISO/IEC-27042 - Information technology - Security techniques - Guidelines for the analysis and interpretation of digital evidence
- EN-ISO/IEC-27043 - Information technology - Security techniques - Incident investigation principles and processes
- IWA-17 - Information and operations security and integrity requirements for lottery and gaming organizations
- JIS-X-5055-1 - Information technology -- Security techniques -- Message Authentication Codes (MACs) -- Part 1: Mechanisms using a block cipher
- JIS-X-5055-2 - Information technology -- Security techniques -- Message Authentication Codes (MACs) -- Part 2: Mechanisms using a dedicated hash-function
- SIS-CEN/TR-14381 - Information technology - Character repertoire and coding transformations - European fallback rules
- SIS-CEN/TS-14826 - Postal services - Automatic identification of items - Two dimensional bar code symbol print quality specification for machine readable Digital Postage Marks
- SIS-CEN/TS-1923 - European character repertoires and their coding - 8-bite single-byte coding
- SIS-CWA-13873 - Information Technology - Multilingual European Subsets in ISO/IEC 10646-1
- SIS-ISO/IEC-TR-27008 - Information technology - Security techniques - Guidelines for auditors on information security controls (ISO/IEC TR 27008:2011, IDT)
- SIS-ISO/IEC-TS-17021-14 - Conformity assessment - Requirements for bodies providing audit and certification of management systems - Part 14: Competence requirements for auditing and certification of management systems for records (ISO/IEC TS 17021-14:2022, IDT)
- SIS-ISO/IEC-TS-17021-9 - Conformity assessment - Requirements for bodies providing audit and certification of management systems - Part 9: Competence requirements for auditing and certification of anti-bribery management systems (ISO/IEC TS 17021-9:2016, IDT)
- SIS-ISO/IEC-TS-27008 - Information technology - Security techniques - Guidance for auditors on information security management systems control (ISO/IEC TS 27008:2019, IDT)
- SS-14500 - Data security - Check Digits
- SS-30805 - Data representation - Character Set OCR-B - Shapes and dimensions of the printed image
- SS-30806 - Printing specifications for optical character recognition
- SS-636127 - Data representation - Swedish 7-bit coded character set for data interchange
- SS-636128 - Information processing - Graphical representations for the control characters of the 7-bit coded character set
- SS-636130 - Information processing - Character structure for start/stop and synchronous character oriented transmission
- SS-636131 - Information processing - Use of longitudinal parity to detect errors in information messages
- SS-636138 - Information processing - Implementation of the 7-bit coded character set and its 7-bit and 8-bit extensions on 9 track 12,7 mm magnetic tape
- SS-636147 - Documentation - Extension of the Latin alphabet coded character set for bibliographic information interchange
- SS-636148 - Extension of the Cyrillic alphabet coded character set for bibliographic information interchange
- SS-636149 - Documentation - Greek alphabet coded character set for bibliographic information interchange
- SS-636160 - Information processing - Implementation of the 7-bit coded character and its 7-bit and 8-bit extensions on 3,81 mm magnetic tape cassette data interchange
- SS-636180 - Documentation - African coded character set for bibliographic information interchange
- SS-EN-12323 - AIDC technologies - Symbology specifications - Code 16K
- SS-EN-12403 - Bar coding - Structured data files
- SS-EN-1332-4 - Identification card systems - Man-machine interface - Part 4: Coding of user requirements for people with special needs
- SS-EN-13710 - European Ordering Rules - Ordering of characters from Latin, Greek, Cyrillic, Georgian and Armenian scripts
- SS-EN-1571 - Bar coding - Data Identifiers
- SS-EN-1572 - Bar coding - License plate
- SS-EN-1573 - Bar code - Multi industry transport label
- SS-EN-1635 - Bar coding - Test specifications - Bar code symbols
- SS-EN-16495 - Air Traffic Management - Information security for organisations supporting civil aviation operations
- SS-EN-17071 - Information technology - Automatic identification and data capture techniques - Electronic identification plate
- SS-EN-1923 - European character repertoires and their coding - 8 bit single byte coding
- SS-EN-343 - Protective clothing - Protection against rain
- SS-EN-419211-2 - Protection profiles for secure signature creation device - Part 2: Device with key generation
- SS-EN-419211-3 - Protection profiles for secure signature creation device - Part 3: Device with key import
- SS-EN-419211-4 - Protection profiles for secure signature creation device - Part 4: Extension for device with key generation and trusted channel to certificate generation application
- SS-EN-419211-5 - Protection profiles for secure signature creation device - Part 5: Extension for device with key generation and trusted channel to signature creation application
- SS-EN-419211-6 - Protection profiles for secure signature creation device - Part 6: Extension for device with key import and trusted channel to signature creation application
- SS-EN-606 - Bar coding - Transport and handling labels for steel products
- SS-EN-796 - Bar coding - Symbology identifiers
- SS-EN-798 - Bar coding - Symbology specifications - "Codabar"
- SS-EN-799 - Bar coding - Symbology specifications - "Code 128"
- SS-EN-800 - Bar coding - Symbology specifications - "Code 39"
- SS-EN-801 - Bar coding - Symbology specifications - "Interleaved 2 of 5"
- SS-EN-ISO-11172-1 - Information technology - Coding of moving pictures and associated audio for digital storage media at up to about 1,5 Mbit/s - Part 1: Systems
- SS-EN-ISO-11172-2 - Information technology - Coding of moving pictures and associated audio for digital storage media at up to about 1,5 Mbits/s - Part 2: Video
- SS-EN-ISO-11172-3 - Information technology - Coding of moving pictures and associated audio for digital storage media at up to about 1.5 Mbits/s - Part 3: Audio
- SS-EN-ISO-11544 - Information technology - Coded representation of picture and audio information - Progressive bi-level image compression
- SS-EN-ISO-19113 - Geographic information - Quality principles (ISO 19113:2002)
- SS-EN-ISO-19125-1 - Geographic information - Simple feature access - Part 1: Common architecture (ISO 19125-1:2004)
- SS-EN-ISO-19125-2 - Geographic information - Simple feature access - Part 2: SQL option (ISO 19125-2:2004)
- SS-EN-ISO-19157 - Geographic information - Data quality (ISO 19157:2013)
- SS-EN-ISO-19157-AM1 - Geographic information - Data quality - Amendment 1: Describing data quality using coverages (ISO 19157:2013/Amd 1:2018)
- SS-EN-ISO-3098-5 - Technical product documentation - Lettering - Part 5: CAD lettering of the Latin alphabet, numeralsand marks (ISO 3098-5:1997)
- SS-EN-ISO-6709 - Standard representation of geographic point location by coordinates (ISO 6709:2022)
- SS-EN-ISO-8289-1 - Vitreous and porcelain enamels - Low-voltage test for detecting and locating defects - Part 1: Swab test for non-profiled surfaces (ISO 8289-1:2020)
- SS-EN-ISO/IEC-11172-4 - Information technology - Coding of moving pictures and associated audio for digital storage media at up to about 1,5 Mbit/s - Part 4: Compliance testing
- SS-EN-ISO/IEC-13818-1 - Information technology - Generic coding of moving pictures and associated audio information - Part 1: Systems
- SS-EN-ISO/IEC-13818-3 - Information technology - Generic coding of moving pictures and associated audio information - Part 3: Audio
- SS-EN-ISO/IEC-13818-9 - Information technology - Generic coding of moving pictures and associated audio information - Part 9: Extension for real time interface for systems decoders
- SS-EN-ISO/IEC-15415 - Information Technology - Automatic identification and data capture techniques - Bar code symbol print quality test specification - Two dimensional symbols (ISO/IEC 15415:2004)
- SS-EN-ISO/IEC-15419 - Information technology - Automatic identification and data capture techniques - Bar code digital imaging and printing performance testing (ISO/IEC 15419:2009)
- SS-EN-ISO/IEC-15423 - Information technology - Automatic identification and data capture techniques - Bar code scanner and decoder performance testing (ISO/IEC 15423:2009)
- SS-EN-ISO/IEC-15438 - Information technology - Automatic identification and data capture techniques - PDF417 bar code symbology specification (ISO/IEC 15438:2006)
- SS-EN-ISO/IEC-18045 - Information security, cybersecurity and privacy protection - Evaluation criteria for IT security - Methodology for IT security evaluation (ISO/IEC 18045:2023)
- SS-EN-ISO/IEC-19762-1 - Information technology - Automatic identification and data capture (AIDC) techniques - Harmonized vocabulary - Part 1: General terms relating to AIDC (ISO/IEC 19762-1:2008)
- SS-EN-ISO/IEC-19762-3 - Information technology - Automatic identification and data capture (AIDC) techniques - Harmonized vocabulary - Part 3: Radio frequency identification (RFID) (ISO/IEC 19762-3:2008)
- SS-EN-ISO/IEC-19790 - Information technology - Security techniques - Security requirements for cryptographic modules (ISO/IEC 19790:2012)
- SS-EN-ISO/IEC-19896-2 - IT security techniques - Competence requirements for information security testers and evaluators - Part 2: Knowledge, skills and effectiveness requirements for ISO/IEC 19790 testers (ISO/IEC 19896-2:2018)
- SS-EN-ISO/IEC-19896-3 - IT security techniques - Competence requirements for information security testers and evaluators - Part 3: Knowledge, skills and effectiveness requirements for ISO/IEC 15408 evaluators (ISO/IEC 19896-3:2018)
- SS-EN-ISO/IEC-24760-3 - Information technology - Security techniques - A framework for identity management - Part 3: Practice (ISO/IEC 24760-3:2016)
- SS-EN-ISO/IEC-27001 - Information security, cybersecurity and privacy protection - Information security management systems - Requirements (ISO/IEC 27001:2022)
- SS-EN-ISO/IEC-27006 - Information technology - Security techniques - Requirements for bodies providing audit and certification of information security management systems (ISO/IEC 27006:2015, including Amd 1:2020)
- SS-EN-ISO/IEC-27017 - Information technology - Security techniques - Code of practice for information security controls based on ISO/IEC 27002 for cloud services (ISO/IEC 27017:2015)
- SS-EN-ISO/IEC-27018 - Information technology - Security techniques - Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors (ISO/IEC 27018:2019)
- SS-EN-ISO/IEC-27019 - Information technology - Security techniques - Information security controls for the energy utility industry (ISO/IEC 27019:2017, Corrected version 2019-08)
- SS-EN-ISO/IEC-27037 - Information technology - Security techniques - Guidelines for identification, collection, acquisition and preservation of digital evidence (ISO/IEC 27037:2012, IDT)
- SS-EN-ISO/IEC-27040 - Information technology - Security techniques - Storage security (ISO/IEC 27040:2015, IDT)
- SS-EN-ISO/IEC-27041 - Information technology - Security techniques - Guidance on assuring suitability and adequacy of incident investigative method (ISO/IEC 27041:2015, IDT)
- SS-EN-ISO/IEC-27042 - Information technology - Security techniques - Guidelines for the analysis and interpretation of digital evidence (ISO/IEC 27042:2015, IDT)
- SS-EN-ISO/IEC-27043 - Information technology - Security techniques - Incident investigation principles and processes (ISO/IEC 27043:2015, IDT)
- SS-EN-ISO/IEC-30111 - Information technology - Security techniques - Vulnerability handling processes (ISO/IEC 30111:2019)
- SS-ENV-12005 - Information technology - Procedures for European registration of cultural elements
- SS-ENV-13065 - Bar coding - Test Specifications for Bar Code Masters
- SS-ENV-13066 - Bar coding - Test Specifications for Bar Code Production Software
- SS-ENV-13608-1 - Health informatics - Security for healthcare communication - Part 1: Concepts and terminology
- SS-ENV-13608-2 - Health informatics - Security for healthcare communication - Part 2: Secure data objects
- SS-ENV-13608-3 - Health informatics - Security for healthcare communication - Part 3: Secure data channels
- SS-ENV-1649 - Bar coding - Operational aspects affecting the reading of bar code symbols
- SS-ENV-41504 - Information systems interconnection - Character repertoire and coding for interworking with Telex services
- SS-ENV-41505 - Information systems interconnection - Graphic character repertoire and coding for line drawing
- SS-ENV-41506 - Information systems interconnection - Data streamformats for information received from or transmitted to the Teletex service or private information processing systems using Teletex technology
- SS-ENV-41508 - Information systems interconnection - East European graphic character repertoires and their coding
- SS-ISO-10118-1 - Information technology - Security techniques - Hash functions - Part 1: General
- SS-ISO-10118-2 - Information technology - Security techniques - Hash-functions - Part 2: Hash-functions using an n-bit block
- SS-ISO-10646-1 - Information technology - Universal Multiple-OctetCoded Character Set (UCS) - Part 1: Architecture and Basic Multilingual Plane
- SS-ISO-10754 - Information and documentation - Extension of the Cyrillic alphabet coded character set for non-Slavic languages for bibliographic information interchange
- SS-ISO-10918-1 - Information technology - Digital compression and coding of continuous-tone still images: Requirements and guidelines
- SS-ISO-11172-1 - Information technology - Koding of moving pictures and associated audio for digital storage media at up to about 1,5 Mbit/s - Part 1: Systems
- SS-ISO-11172-2 - Information technology - Coding of moving pictures and associated audio for digital storage media at up to about 1,5 Mbit/s - Part 2: Video
- SS-ISO-11172-3 - Information technology - Coding of moving pictures and associated audio for digital storage media at up to about 1,5 Mbit/s - Part 3: Audio
- SS-ISO-11179-3 - Information technology - Specification and standardization of data elements - Part 3: Basic attributes of data elements
- SS-ISO-15394 - Packaging - Bar code and two-dimensional symbols for shipping, transport and receiving labels (ISO 15394:2009, IDT)
- SS-ISO-19115 - Geographic information - Metadata
- SS-ISO-19125-1 - Geographic information - Simple feature access - Part 1: Common architecture (ISO 19125-1:2004, IDT)
- SS-ISO-19125-2 - Geographic information - Simple feature access - Part 2: SQL option (ISO 19125-2:2004, IDT)
- SS-ISO-28219 - Packaging - Labelling and direct product marking with linear bar code and two-dimensional symbols (ISO 28219:2009, IDT)
- SS-ISO-6523-AM1 - Data interchange - Structure for the identification of organizations in data interchange. Amendment1: Guideance on the use of ISO 6523
- SS-ISO-6709 - Standard representation of geographic point location by coordinates (ISO 6709:2008, IDT)
- SS-ISO-7826-1 - Information technology - General structure for the interchange of code values - Part 1: Identification of coding schemes
- SS-ISO-7826-2 - Information technology - General structure for the interchange of code values - Part 2: Registration of coding schemes
- SS-ISO-8859-1 - Information processing - 8-bits single-byte codedgraphic character sets - Part 1: Latin alphabet No. 1
- SS-ISO-8859-10 - Information technology - 8-bit single-byte coded graphic character sets - Part 10: Latin alphabet No. 6
- SS-ISO-8859-2 - Information processing - 8-bits single-byte codedgraphic character sets - Part 2: Latin alphabet No. 2
- SS-ISO-8859-5 - Information processing - 8-bits single-byte codedgraphic character sets - Part 5: Latin/Cyrillic alphabet
- SS-ISO-8859-7 - Information processing - 8-bits single-byte codedgraphic character sets - Part 7: Latin/greek alphabet
- SS-ISO-9281-1 - Information technology - Picture coding methods -Part 1: Identification
- SS-ISO-9281-2 - Information technology - Picture coding methods -Part 2: Procedure for registration
- SS-ISO-9282-1 - Information processing - Coded representation of pictures - Part 1: Encoding principles for picturerepresentation in a 7-bit or 8-bit environment
- SS-ISO-9282-2 - Information processing - Coded representation of pictures - Part 2: Incremental encoding of point lists in a 7-bit or 8-bit environment
- SS-ISO-9506-1 - Industrial automation systems - Manufacturing Message Specification - Part 1: Service definition
- SS-ISO-9797 - Information technology - Security techniques - Data integrity mechanism using a cryptographic checkfunction employing a block cipher algorithm
- SS-ISO-9798-2 - Information technology - Security techniques - Entity authentication - Part 2: Mechanisms using symmetric encipherment algoritms
- SS-ISO-9798-3 - Information technology - Security techniques - Entity authentication mechanisms - Part 3: Entity authentication using a public key algorithm
- SS-ISO-9798-4 - Information technology - Security techniques - Entity authentication - Part 4: Mechanisms using a cryptographic check function
- SS-ISO/IEC-11581-1 - Information technology - Usersystem interfaces and symbols - Icon symbols and functions - Part 1: Icons - General (ISO/IEC 11581-1:2000, IDT)
- SS-ISO/IEC-11581-2 - Information technology - Usersystem interfaces and symbols - Icon symbols and functions - Part 2: Object icons (ISO/IEC 11581-2:2000, IDT)
- SS-ISO/IEC-11581-3 - Information technology - User system interfaces and symbols - Icon symbols and functions - Part 3: Pointer icons (ISO/IEC 11581-3:2000, IDT)
- SS-ISO/IEC-11581-6 - Information technology - Usersystem interfaces and symbols - Icon symbols and functions - Part 6: Action icons (ISO/IEC 11581-6:1999, IDT)
- SS-ISO/IEC-14651 - Information technology - International string ordering and comparison - Method for comparing character strings and description of the common template tailorable ordering (ISO/IEC 14651:2007 incl Amd 1:2009, IDT)
- SS-ISO/IEC-14754 - Information Technology - Pen-Based Interfaces - Common gestures for Text Editing with Pen-Based Systems (ISO/IEC 14754:1999, IDT)
- SS-ISO/IEC-14755 - Information technology - Input methods to enter characters from the repertoire of ISO/IEC 10646 with a keyboard or other input device (ISO/IEC 14755:1997, IDT)
- SS-ISO/IEC-14888-3 - Information technology - Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms (ISO/IEC 14888-3:2006, IDT)
- SS-ISO/IEC-15411 - Information technology - Segmented keyboard layouts (ISO/IEC 15411:1999, IDT)
- SS-ISO/IEC-15412 - Information technology - Portable computer keyboard layouts (ISO/IEC 15412:1999, IDT)
- SS-ISO/IEC-15897 - Information technology - Procedures for registration of cultural elements (ISO/IEC 15897:1999, IDT)
- SS-ISO/IEC-16388 - Information technology - Automatic identification and data capture techniques - Code 39 bar code symbology specification (ISO/IEC 16388:2007, IDT)
- SS-ISO/IEC-18035 - Information technology - Icon symbols and functions for controlling multimedia software applications (ISO/IEC 18035:2003, IDT)
- SS-ISO/IEC-18036 - Information technology - Icon symbols and functions for World Wide Web browser toolbars (ISO/IEC 18036:2003, IDT)
- SS-ISO/IEC-19757-8 - Information technology - Document Schema Definition Language (DSDL) Part 8 - Document Semantics Renaming Language (DSRL) (ISO/IEC 19757-8:2009, IDT)
- SS-ISO/IEC-19757-9 - Information technology - Document Schema Definition Languages (DSDL) - Part 9: Namespace and datatype declaration in Document Type Definitions (DTDs) (ISO/IEC 19757-9:2008, IDT)
- SS-ISO/IEC-19790 - Information Technology - Security Techniques - Security requirements for cryptographic modules (ISO/IEC 19790:2006, IDT)
- SS-ISO/IEC-19795-1 - Information technology - Biometric performance testing and reporting - Part 1: Principles and framework (ISO/IEC 19795-1:2021, IDT)
- SS-ISO/IEC-27000 - Information technology - Security techniques - Information security management systems - Overview and vocabulary (ISO/IEC 27000:2018)
- SS-ISO/IEC-27001 - Information technology - Cybersecurity and privacy protection - Information security management systems - Requirements (ISO/IEC 27001:2022, IDT)
- SS-ISO/IEC-27002 - Information security - cybersecurity and privacy protection - Information security controls (ISO/IEC 27002:2022, IDT)
- SS-ISO/IEC-27003 - Information technology - Security techniques - Information security management system - Guidance (ISO/IEC 27003:2017, IDT)
- SS-ISO/IEC-27004 - Information technology - Security techniques - Information security management - Monitoring, measurement, analysis and evaluation (ISO/IEC 27004:2016, IDT)
- SS-ISO/IEC-27005 - Information security, cybersecurity and privacy protection Guidance on managing information security risks (ISO/IEC 27005:2022, IDT)
- SS-ISO/IEC-27006 - Information technology - Security techniques - Requirements for bodies providing audit and certification of information security management systems (ISO/IEC 27006:2015, IDT)
- SS-ISO/IEC-27006-AM1 - Information technology - Security techniques - Requirements for bodies providing audit and certification of information security management systems - Amendment 1 (ISO/IEC 27006:2015/Amd 1:2020, IDT)
- SS-ISO/IEC-27010 - Information technology - Security techniques - Information security management for inter-sector and inter-organizational communications (ISO/IEC 27010:2015, IDT)
- SS-ISO/IEC-27013 - Information technology - Security techniques - Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1
- SS-ISO/IEC-27014 - Information security, cybersecurity and privacy protection Governance of information security (ISO/IEC 27014:2020, IDT)
- SS-ISO/IEC-27017 - Information technology - Security techniques - Code of practice for information security controls based on ISO/IEC 27002 for cloud services (ISO/IEC 27017:2015, IDT)
- SS-ISO/IEC-27018 - Information technology - Security techniques - Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors (ISO/IEC 27018:2019, IDT)
- SS-ISO/IEC-27035 - Information technology - Security techniques - Information security incident management (ISO/IEC 27035:2011, IDT)
- SS-ISO/IEC-27036-1 - Information technology - Security techniques - Information security for supplier relationships - Part 1: Overview and concepts (ISO 27036-1:2014, IDT)
- SS-ISO/IEC-27036-2 - Information technology - Security techniques - Information security for supplier relationships - Part 2: Requirements (ISO 27036-2:2014, IDT)
- SS-ISO/IEC-27036-3 - Information technology - Security techniques - Information security for supplier relationships - Part 3: Guidelines for information and communication technology supply chain security (ISO 27036-3:2013, IDT)
- SS-ISO/IEC-27036-4 - Information technology - Security techniques Information security for supplier relationships - Part 4: Guidelines for security of cloud services
- SS-ISO/IEC-27041 - Information technology - Security techniques - Guidance on assuring suitability and adequacy of incident investigative method (ISO/IEC 27041:2015, IDT)
- SS-ISO/IEC-27042 - Information technology - Security techniques - Guidelines for the analysis and interpretation of digital evidence (ISO/IEC 27042:2015, IDT)
- SS-ISO/IEC-27043 - Information technology - Security techniques - Incident investigation principles and processes (ISO/IEC 27043:2015, IDT)
- SS-ISO/IEC-29500-1 - Information technology - Document description and processing languages - Office Open XML File Formats - Part 1: Fundamentals and Markup Language Reference (ISO/IEC 29500-1:2011, IDT)
- SS-ISO/IEC-29500-2 - Information technology - Document description and processing languages - Office Open XML File Formats - Part 2: Open Packaging Conventions (ISO/IEC 29500-2:2011, IDT)
- SS-ISO/IEC-29500-3 - Information technology - Document description and processing languages - Office Open XML File Formats - Part 3: Markup Compatibility and Extensibility (ISO/IEC 29500-3:2011, IDT)
- SS-ISO/IEC-29500-4 - Information technology - Document description and processing languages - Office Open XML File Formats - Part 4: Transitional Migration Features (ISO/IEC 29500-4:2011, IDT)
- SS-ISO/IEC-8824-2-AM1 - Information technology - Abstract Syntax Notation One (ASN.1): Informationobject specification - Amendment 1: Rules of extensibility
- SS-ISO/IEC-8825-2 - Information technology - ASN.1 encoding rules: Specification of Packed Encoding Rules (PER)
- SS-ISO/IEC-8859-1 - Information technology - 8-bit single-byte coded graphic character sets - Part 1: Latin alphabet No. 1 (ISO/IEC 8859-1:1998, IDT)
- SS-ISO/IEC-8859-11 - Information technology - 8-bit single-byte coded graphic character sets - Part 11: Latin/Thai alphabet (ISO/IEC 8859-11:2001, IDT)
- SS-ISO/IEC-8859-2 - Information technology - 8-bit single-byte coded graphic character sets - Part 2: Latin alphabet No. 2 (ISO/IEC 8859-2:1999, IDT)
- SS-ISO/IEC-8859-4 - Information technology - 8-bit single-byte coded graphic character sets - Part 4: Latin alphabet No. 4 (ISO/IEC 8859-4:1998, IDT)
- SS-ISO/IEC-8859-7 - Information technology - 8-bit single-byte coded graphic character sets - Part 7: Latin/Greek alphabet (ISO/IEC 8859-7:2003, IDT)
- SS-ISO/IEC-9995-1 - Information technology - Keyboard layouts for text and office systems - Part 1: General principles governing keyboard layouts (ISO/IEC 9995-1:2009, IDT)
- SS-ISO/IEC-9995-4 - Information technology - Keyboard layouts for text and office systems - Part 4: Numeric section (ISO/IEC 9995-4:2009, IDT)
- SS-ISO/IEC-9995-5 - Information technology - Keyboard layouts for text and office systems - Part 5: Editing and function section (ISO/IEC 9995-5:2009, IDT)
- SS-ISO/IEC-9995-6 - Information technology - Keyboard layouts for text and office systems - Part 6: Function section (ISO/IEC 9995-6:1994, IDT)
- SS-ISO/IEC-9995-7 - Information technology - Keyboard layouts for text and office systems - Part 7: Symbols used to represent functions (ISO/IEC 9995-7:2009, IDT)
- SS-ISO/IEC-9995-8 - Information technology - Keyboard layouts for text and office systems - Part 8: Allocation of letters to the keys of a numeric keypad (ISO/IEC 9995-8:2009, IDT)
- UNE-EN-419211-2 - Protection profiles for secure signature creation device - Part 2: Device with key generation
- UNE-EN-419211-3 - Protection profiles for secure signature creation device - Part 3: Device with key import
- UNE-ISO/IEC-27001 - Information technology - Security techniques - Information security management systems - Requirements
- UNE-ISO/IEC-27001/1M - Information technology. Security techniques. Information security management systems. Requirements