HOME   Cart(0)   Quotation   About-Us Policy PDFs Standard-List
www.ChineseStandard.net Database: 189760 (17 Jan 2026)
Path: Home > GB/T > Page 208                                      Home > Standard_List > GB/T > Page 208
   

Chinese National Standard: GB/T

Previous << 208 >> Next
Std ID Description (Standard Title) Detail
GB/T 38626-2020 Information security technology - Guide to password protection for intelligent connected device GB/T 38626-2020
GB/T 38628-2020 Information security technology - Cybersecurity guide for automotive electronics system GB/T 38628-2020
GB/T 38629-2020 Information security technology - Technical specifications for signature verification server GB/T 38629-2020
GB/T 38631-2020 Information technology - Security techniques - Sector-specific application of GB/T 22080 - Requirements GB/T 38631-2020
GB/T 38632-2020 Information security technology - Security requirements for application of intelligent audio-video recording device GB/T 38632-2020
GB/T 38635.1-2020 Information security technology - Identity-based cryptographic algorithms SM9 - Part 1: General GB/T 38635.1-2020
GB/T 38635.2-2020 Information security technology - Identity-based cryptographic algorithms SM9 - Part 2: Algorithms GB/T 38635.2-2020
GB/T 38636-2020 Information security technology - Transport layer cryptography protocol (TLCP) GB/T 38636-2020
GB/T 38638-2020 Information security technology - Trusted computing - Architecture of trusted computing GB/T 38638-2020
GB/T 38644-2020 Information security technology - Trusted computing - Testing method of trusted connect GB/T 38644-2020
GB/T 38645-2020 Information security techniques - Guide for cybersecurity incident emergency exercises GB/T 38645-2020
GB/T 38646-2020 Information security technology - Technical requirements of mobile signature service GB/T 38646-2020
GB/T 38647.1-2020 Information technology - Security techniques - Anonymous digital signatures - Part 1: General GB/T 38647.1-2020
GB/T 38647.2-2020 Information technology - Security techniques - Anonymous digital signatures - Part 2: Mechanisms using a group public key GB/T 38647.2-2020
GB/T 38648-2020 Information security techniques - Guideline to bluetooth security GB/T 38648-2020
GB/T 38671-2020 Information Security Technology - Technical Requirements for Remote Face Recognition System GB/T 38671-2020
GB/T 38674-2020 Information security technology - Guideline on secure coding of application software GB/T 38674-2020
GB/T 20283-2020 Information security technology - Guide for the production of protection profiles and security targets GB/T 20283-2020
GB/T 39205-2020 Information security technology - Light-weight authentication and access control mechanism GB/T 39205-2020
GB/T 20261-2020 Information security technology. System security engineering. Capability maturity model GB/T 20261-2020
GB/T 25061-2020 Information security technology. XML digital signature syntax and processing specification GB/T 25061-2020
GB/T 25068.1-2020 Information technology. Security techniques. Network security - Part 1: Overview and concepts GB/T 25068.1-2020
GB/T 25068.2-2020 Information technology - Security techniques - Network security - Part 2: Guidelines for the design and implementation of network security GB/T 25068.2-2020
GB/T 28458-2020 Information security technology - Cybersecurity vulnerability identification and description specification GB/T 28458-2020
GB/T 30276-2020 Information security technology - Specification for cybersecurity vulnerability management GB/T 30276-2020
GB/T 30279-2020 Information security technology - Guidelines for categorization and classification of cybersecurity vulnerability GB/T 30279-2020
GB/T 39276-2020 Information security technology - General security requirements of network products and services GB/T 39276-2020
GB/T 39335-2020 Information security technology - Guidance for personal information security impact assessment GB/T 39335-2020
GB/T 39412-2020 Information security technology. Audit specification of code security GB/T 39412-2020
GB/T 15852.1-2020 Information technology. Security techniques-Message authentication codes - Part 1: Mechanisms using a block cipher GB/T 15852.1-2020
GB/T 20985.2-2020 Information technology - Security techniques - Information security incident management - Part 2: Guidelines to plan and prepare for incident response GB/T 20985.2-2020
GB/T 39680-2020 Information security technology - Technique requirements and evaluation criteria for server security GB/T 39680-2020
GB/T 39720-2020 Information security technology. Security technical requirements and test evaluation approaches for smart mobile terminal GB/T 39720-2020
GB/T 39725-2020 Information security technology - Guide for health data security GB/T 39725-2020
GB/T 39477-2020 (Information security technology Government information sharing Data security technical requirements) GB/T 39477-2020
GB/T 22239-2019 Information security technology - Baseline for classified protection of cybersecurity GB/T 22239-2019
GB/T 25070-2019 Information security technology - Technical requirements of security design for classified protection of cybersecurity GB/T 25070-2019
GB/T 28448-2019 Information security technology - Evaluation requirement for classified protection of cybersecurity GB/T 28448-2019
GB/T 15852.3-2019 Information technology -- Security techniques -- Message authentication codes (MACs) -- Part 3: Mechanisms using a universal hash-function GB/T 15852.3-2019
GB/T 18018-2019 Information security technology - Technical requirement for router security GB/T 18018-2019
GB/T 20009-2019 Information security technology - Security evaluation criteria for database management system GB/T 20009-2019
GB/T 20272-2019 Information security technology - Security technical requirements for operating system GB/T 20272-2019
GB/T 20273-2019 Information Security Technology - Security Technical Requirements for Database Management System GB/T 20273-2019
GB/T 20979-2019 Information security technology - Technical requirements for iris recognition system GB/T 20979-2019
GB/T 21050-2019 Information security technology - Security requirements for network switch GB/T 21050-2019
GB/T 25058-2019 Information Security Technology - Implementation Guide for Classified Protection of Cybersecurity GB/T 25058-2019
GB/T 37931-2019 Information security technology - Security technology requirements and testing and evaluation approaches for Web application security detection system GB/T 37931-2019
GB/T 37932-2019 Information security technology - Security requirements for data transaction service GB/T 37932-2019
GB/T 37933-2019 Information security technology - Technical requirements of industrial control system dedicated firewall GB/T 37933-2019
GB/T 37934-2019 Information security technology - Security technical requirements of industrial control system security isolation and information ferry system GB/T 37934-2019
GB/T 37935-2019 Information security technology - Trusted computing specification - Trusted software base GB/T 37935-2019
GB/T 37939-2019 Information security technology - Security techniques requirement for network storage GB/T 37939-2019
GB/T 37941-2019 Information security technology - Security technical requirements of industrial control system network audit products GB/T 37941-2019
GB/T 37950-2019 Information security technology - Security technical requirements for desktop cloud GB/T 37950-2019
GB/T 37952-2019 Information security technology - Technical requirements of mobile terminal security management platform GB/T 37952-2019
GB/T 37953-2019 Information security technology - Security requirements and evaluation approaches for industrial control network monitor GB/T 37953-2019
GB/T 37954-2019 Information security technology - Technique requirements and testing and evaluation approaches for industrial control system vulnerability detection products GB/T 37954-2019
GB/T 37955-2019 Information security technology - Security technique requirements for numerical control network GB/T 37955-2019
GB/T 37956-2019 Information security technology - Technology requirement for website security cloud protection platform GB/T 37956-2019
GB/T 37962-2019 Information security technology - Common criteria for industrial control system products security GB/T 37962-2019
GB/T 37964-2019 Information security technology - Guide for de-identifying personal information GB/T 37964-2019
GB/T 37971-2019 Information security technology - Framework of smart city security system GB/T 37971-2019
GB/T 37972-2019 Information security technology - Operation supervision framework of cloud computing service GB/T 37972-2019
GB/T 37973-2019 Information security technology - Big data security management guide GB/T 37973-2019
GB/T 37980-2019 Information security technology - Guide for security inspection of industrial control systems GB/T 37980-2019
GB/T 37985-2019 Technical Requirements for Key Management System for the Electronic Identification of Motor Vehicles GB/T 37985-2019
GB/T 37988-2019 Information security technology - Data security capability maturity model GB/T 37988-2019
GB/T 38249-2019 Information security technology - Security guide of cloud computing services for government website GB/T 38249-2019
GB/T 27422-2019 Conformity assessment - Requirements for bodies providing audit and certification of business continuity management systems GB/T 27422-2019
GB/T 36322-2018 Information security technology -- Cryptographic device application interface specifications GB/T 36322-2018
GB/T 36324-2018 Information security technology -- Information security classification specifications of industrial control systems GB/T 36324-2018
GB/T 20518-2018 Information security technology -- Public key infrastructure -- Digital certificate format GB/T 20518-2018
GB/T 36323-2018 Information security technology -- Security management fundamental requirements for industrial control systems GB/T 36323-2018
GB/T 36466-2018 Information security technology -- Implementation guide to risk assessment of industrial control systems GB/T 36466-2018
GB/T 25056-2018 Information security technology -- Specifications of cryptograph and related security technology for certificate authentication system GB/T 25056-2018
GB/T 36470-2018 Information security technology -- Common security functional requirements for data acquisition and control field devices of industrial control systems GB/T 36470-2018
GB/T 15843.6-2018 Information technology -- Security techniques -- Entity authentication -- Part 6: Mechanisms using manual data transfer GB/T 15843.6-2018
GB/T 34953.2-2018 Information technology -- Security techniques -- Anonymous entity authentication -- Part 2: Mechanisms based on signatures using a group public key GB/T 34953.2-2018
GB/T 36618-2018 Information security technology -- Specification for financial information service security GB/T 36618-2018
GB/T 36619-2018 Information security technology -- Naming specification on domain names of Chinese government organs and public institutions GB/T 36619-2018
GB/T 36624-2018 Information technology -- Security techniques -- Authenticated encryption GB/T 36624-2018
GB/T 36626-2018 Information security technology -- Management guide for secure operation and maintenance of information systems GB/T 36626-2018
GB/T 36627-2018 Information security technology - Testing and evaluation technical guide for classified cybersecurity protection GB/T 36627-2018
GB/T 36629.1-2018 Information security technology -- Security technique requirements for citizen cyber electronic identity -- Part 1: Security technique requirements for reader GB/T 36629.1-2018
GB/T 36629.2-2018 Information security technology -- Security technique requirements for citizen cyber electronic identity -- Part 2: Security technique requirements of carrier GB/T 36629.2-2018
GB/T 36630.1-2018 Information Security Technology - Controllability Evaluation Index for Security of Information Technology Products - Part 1: General Principles GB/T 36630.1-2018
GB/T 36630.2-2018 Information security technology -- Controllability evaluation index for security of information technology products -- Part 2: Central processing unit GB/T 36630.2-2018
GB/T 36630.3-2018 Information security technology -- Controllability evaluation index for security of information technology products -- Part 3: Operating system GB/T 36630.3-2018
GB/T 36630.4-2018 Information security technology -- Controllability evaluation index for security of information technology products -- Part 4: Office suite GB/T 36630.4-2018
GB/T 36630.5-2018 Information security technology -- Controllability evaluation index for security of information technology products -- Part 5: General purpose computer GB/T 36630.5-2018
GB/T 36631-2018 Information security technology -- Time stamp policy and time stamp practice rules GB/T 36631-2018
GB/T 36632-2018 Information security technology -- Format specifications for citizen cyber electronic identity GB/T 36632-2018
GB/T 36633-2018 Information security technology -- Technical guide for identity authentication over network GB/T 36633-2018
GB/T 36635-2018 Information security technology - Basic requirements and implementation guide of network security monitoring GB/T 36635-2018
GB/T 36637-2018 Information security technology -- Guidelines for the information and communication technology supply chain risk management GB/T 36637-2018
GB/T 36639-2018 Information security technology -- Trusted computing specification -- Trusted support platform for server GB/T 36639-2018
GB/T 36643-2018 Information security technology -- Cyber security threat information format GB/T 36643-2018
GB/T 36644-2018 Information security technology - Methods for obtaining security attestations for digital signature applications GB/T 36644-2018
GB/T 36651-2018 Information security techniques - Biometric authentication protocol framework based on trusted environment GB/T 36651-2018
GB/T 15851.3-2018 Information technology -- Security techniques -- Digital signature schemes giving message recovery -- Part 3: Discrete logarithm based mechanisms GB/T 15851.3-2018
Previous << 208 >> Next

Refund Policy     Privacy Policy     Terms of Service     Shipping Policy     Contact Information