C 13.10:800-55
|
Security metrics guide for information technology systems / |
1 |
C 13.10:800-55/2/REV.1
|
Performance measurement guide for information security |
1 |
C 13.10:800-55/2/REV./DRAFT
|
Performance measurement guide for information security |
1 |
C 13.10:800-56 A
|
Recommendation for pair-wise key establishment schemes using discrete logarithm cryptography |
1 |
C 13.10:800-56 A/REV
|
Recommendation for pair-wise key establishment schemes using discrete logarithm cryptography (revised) / |
1 |
C 13.10:800-56 B
|
Recommendation for pair-wise key establishment schemes using integer factorization cryptography |
1 |
C 13.10:800-56 B/DRAFT
|
Recommendation for pair-wise key establishment schemes using integer factorization cryptography / |
1 |
C 13.10:800-56 C
|
Recommendation for key derivation through extraction-then-expansion |
1 |
C 13.10:800-56 C/DRAFT
|
Recommendation for key derivation through extraction-then-expansion |
1 |
C 13.10:800-56C
|
Recommendation for key derivation through extraction-then-expansion / |
1 |
C 13.10:800-57/PT.1/REV
|
Recommendation for key management. General / |
1 |
C 13.10:800-57/PT.1/REV.3
|
Recommendation for key management. |
1 |
C 13.10:800-57/PT.1/REV./2007
|
Recommendation for key management. |
1 |
C 13.10:800-57/PT.2
|
Recommendation for key management. best practices for key management organization / |
1 |
C 13.10:800-57/PT.3
|
Recommendation for key management. application-specific key management guidance / |
1 |
C 13.10:800-57/PT.3/DRAFT
|
Recommendation for key management. application-specific key management guidance / |
1 |
C 13.10:800-58
|
Security considerations for voice over IP systems recommendations of the National Institute of Standards and Technology / |
1 |
C 13.10:800-59
|
Guideline for identifying an information system as a national security system |
1 |
C 13.10:800-60
|
Guide for mapping types of information and information systems to security categories |
1 |
C 13.10:800-60/REV.1
|
Guide for mapping types of information and information systems to security categories |
1 |