Information Technology - Security Techniques - Non-Repudiation - Part 1: General (Adopted ISO/IEC 13888-1:1997, first edition, 1997-12-01)
Document status: Active
IT Security Techniques - Non-Repudiation - Part 1: General (Adopted ISO/IEC 13888-1:2004, second edition, 2004-06-01)
Document status: Active
Information technology - Security techniques - Non-repudiation - Part 1: General (Adopted ISO/IEC 13888-1:2009, third edition, 2009-07-15)
Document status: Active
Information security - Non-repudiation - Part 1: General (Adopted ISO/IEC 13888-1:2020, fourth edition, 2020-09)
Document status: Active
Information Technology - Security Techniques - Non-Repudiation - Part 3: Mechanisms Using Asymmetric Techniques (Adopted ISO/IEC 13888-3:1997, first edition, 1997-12-01)
Document status: Active
Information technology - Security techniques - Non-repudiation - Part 3: Mechanisms using asymmetric techniques(Adopted ISO/IEC 13888-3:2009, second edition, 2009-12-15)
Document status: Active
Information security - Non-repudiation - Part 3: Mechanisms using asymmetric techniques (Adopted ISO/IEC 13888-3:2020, third edition, 2020-09)
Document status: Active
Information Technology - Scalable Coherent Interface (SCI) (Adopted ISO/IEC 13961:2000/IEEE 1596, 1998, first edition, 2000-07)
Document status: Active
Information technology - Guideline for the evaluation and selection of CASE tools (Adopted ISO/IEC 14102:2008, second edition, 2008-11-01)
Document status: Active
Information Technology - Guideline for the Evaluation and Selection of CASE Tools (Adopted ISO/IEC 14102:1995)
Document status: Active