07/30163724 DC : 0
Superseded
Superseded
A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.
View Superseded by
BS ISO/IEC 24727-4 - IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARDS PROGRAMMING INTERFACE - PART 4: API ADMINISTRATION
Available format(s)
Hardcopy , PDF
Superseded date
02-28-2009
Superseded by
Language(s)
English
Publisher
Committee |
IST/17
|
DocumentType |
Draft
|
Pages |
90
|
PublisherName |
British Standards Institution
|
Status |
Superseded
|
SupersededBy |
ISO/IEC 9945-1:2003 | Information technology Portable Operating System Interface (POSIX) Part 1: Base Definitions |
ISO/IEC 14443-1:2016 | Identification cards Contactless integrated circuit cards Proximity cards Part 1: Physical characteristics |
ISO/IEC 9945-2:2003 | Information technology Portable Operating System Interface (POSIX) Part 2: System Interfaces |
ISO/IEC TR 9577:1999 | Information technology — Protocol identification in the network layer |
ISO/IEC 18033-1:2015 | Information technology Security techniques Encryption algorithms Part 1: General |
ISO/IEC 16262:2011 | Information technology Programming languages, their environments and system software interfaces ECMAScript language specification |
ISO/IEC 15693-2:2006 | Identification cards Contactless integrated circuit cards Vicinity cards Part 2: Air interface and initialization |
ISO/IEC 9798-3:1998 | Information technology Security techniques Entity authentication Part 3: Mechanisms using digital signature techniques |
ISO/IEC 24727-1:2014 | Identification cards Integrated circuit card programming interfaces Part 1: Architecture |
ISO/IEC 14888-3:2016 | Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms |
ISO/IEC 8825-1:2015 | Information technology ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER) Part 1: |
ISO/IEC 11770-2:2008 | Information technology Security techniques Key management Part 2: Mechanisms using symmetric techniques |
ISO/IEC 10118-4:1998 | Information technology Security techniques Hash-functions Part 4: Hash-functions using modular arithmetic |
ISO/IEC 24727-2:2008 | Identification cards Integrated circuit card programming interfaces Part 2: Generic card interface |
ISO/IEC 7816-8:2016 | Identification cards Integrated circuit cards Part 8: Commands and mechanisms for security operations |
ISO/IEC 7816-9:2004 | Identification cards Integrated circuit cards Part 9: Commands for card management |
ISO/IEC 18033-2:2006 | Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers |
ISO/IEC 8825-4:2015 | Information technology ASN.1 encoding rules: XML Encoding Rules (XER) Part 4: |
ISO/IEC 18033-3:2010 | Information technology Security techniques Encryption algorithms Part 3: Block ciphers |
ISO/IEC 11770-4:2006 | Information technology Security techniques Key management Part 4: Mechanisms based on weak secrets |
ISO/IEC 8824-2:2015 | Information technology Abstract Syntax Notation One (ASN.1): Information object specification Part 2: |
ISO/IEC 15693-3:2009 | Identification cards Contactless integrated circuit cards Vicinity cards Part 3: Anticollision and transmission protocol |
ISO/IEC 9798-4:1999 | Information technology Security techniques Entity authentication Part 4: Mechanisms using a cryptographic check function |
ISO/IEC 9979:1999 | Information technology Security techniques Procedures for the registration of cryptographic algorithms |
ISO/IEC 14443-4:2016 | Identification cards Contactless integrated circuit cards Proximity cards Part 4: Transmission protocol |
ISO/IEC 9798-2:2008 | Information technology Security techniques Entity authentication Part 2: Mechanisms using symmetric encipherment algorithms |
ISO/IEC 9945-4:2003 | Information technology Portable Operating System Interface (POSIX) Part 4: Rationale |
ISO/IEC 9798-5:2009 | Information technology — Security techniques — Entity authentication — Part 5: Mechanisms using zero-knowledge techniques |
ISO/IEC 7816-4:2013 | Identification cards Integrated circuit cards Part 4: Organization, security and commands for interchange |
ISO/IEC 14888-1:2008 | Information technology — Security techniques — Digital signatures with appendix — Part 1: General |
ISO/IEC 10118-1:2016 | Information technology Security techniques Hash-functions Part 1: General |
ISO/IEC 7816-3:2006 | Identification cards — Integrated circuit cards — Part 3: Cards with contacts — Electrical interface and transmission protocols |
ISO/IEC 9798-6:2010 | Information technology Security techniques Entity authentication Part 6: Mechanisms using manual data transfer |
ISO/IEC 9797-1:2011 | Information technology Security techniques Message Authentication Codes (MACs) Part 1: Mechanisms using a block cipher |
ISO/IEC 10118-3:2004 | Information technology Security techniques Hash-functions Part 3: Dedicated hash-functions |
ISO/IEC 7812-1:2017 | Identification cards — Identification of issuers — Part 1: Numbering system |
ISO/IEC 10536-1:2000 | Identification cards Contactless integrated circuit(s) cards Close-coupled cards Part 1: Physical characteristics |
ISO 3166-1:2013 | Codes for the representation of names of countries and their subdivisions Part 1: Country codes |
ISO/IEC 10118-2:2010 | Information technology Security techniques Hash-functions Part 2: Hash-functions using an n-bit block cipher |
ISO/IEC 14443-2:2016 | Identification cards Contactless integrated circuit cards Proximity cards Part 2: Radio frequency power and signal interface |
ISO/IEC 10536-3:1996 | Identification cards Contactless integrated circuit(s) cards Part 3: Electronic signals and reset procedures |
ISO/IEC 10536-2:1995 | Identification cards Contactless integrated circuit(s) cards Part 2: Dimensions and location of coupling areas |
ISO/IEC 10116:2017 | Information technology — Security techniques — Modes of operation for an n-bit block cipher |
ISO/IEC 9796:1991 | Information technology Security techniques Digital signature scheme giving message recovery |
ISO/IEC 14888-2:2008 | Information technology Security techniques Digital signatures with appendix Part 2: Integer factorization based mechanisms |
ISO/IEC 11770-1:2010 | Information technology Security techniques Key management Part 1: Framework |
ISO/IEC 14443-3:2016 | Identification cards Contactless integrated circuit cards Proximity cards Part 3: Initialization and anticollision |
ISO/IEC 9945-3:2003 | Information technology Portable Operating System Interface (POSIX) Part 3: Shell and Utilities |
ISO/IEC 24727-3:2008 | Identification cards Integrated circuit card programming interfaces Part 3: Application interface |
ISO/IEC 18033-4:2011 | Information technology — Security techniques — Encryption algorithms — Part 4: Stream ciphers |
ISO/IEC 15693-1:2010 | Identification cards Contactless integrated circuit cards Vicinity cards Part 1: Physical characteristics |
ISO/IEC 11770-3:2015 | Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques |
ISO/IEC 9798-1:2010 | Information technology Security techniques Entity authentication Part 1: General |
ISO/IEC 9797:1994 | Information technology — Security techniques — Data integrity mechanism using a cryptographic check function employing a block cipher algorithm |
ISO/IEC 13673:2000 | Information technology — Document processing and related communication — Conformance testing for Standard Generalized Markup Language (SGML) systems |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.