Use the form below to find the searched projects. Enter your criteria for searching (single or in combination) in the fields below and press the button “Search”.
European Digital Identity Wallets standards Gap Analysis
60.60 Standard published
Framework for standardization of signatures - Extended structure including electronic identification and authentication
60.60 Standard published
Rationalized structure for electronic signature standardization - Best practices for SMEs
60.60 Standard published
Rationalized structure for electronic signature standardization - Guidelines for citizens
60.60 Standard published
Guidance for signature creation and other related devices
60.60 Standard published
Protection profiles for secure signature creation device - Part 1: Overview
60.60 Standard published
Protection profiles for secure signature creation device - Part 2: Device with key generation
60.60 Standard published
Protection profiles for secure signature creation device - Part 3: Device with key import
60.60 Standard published
Protection profiles for secure signature creation device - Part 4: Extension for device with key generation and trusted channel to certificate generation application
60.60 Standard published
Protection profiles for secure signature creation device - Part 5: Extension for device with key generation and trusted channel to signature creation application
60.60 Standard published
Protection profiles for secure signature creation device - Part 6: Extension for device with key import and trusted channel to signature creation application
60.60 Standard published
Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services - Part 1: Introduction and common definitions
60.60 Standard published
Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services - Part 2: Signature and Seal Services
60.60 Standard published
Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services - Part 3: Device authentication protocols
60.60 Standard published
Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services - Part 4: Privacy specific Protocols
60.60 Standard published
Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services - Part 5: Trusted eService
60.60 Standard published
Protection Profiles for TSP cryptographic modules - Part 1: Overview
60.60 Standard published
Protection Profiles for TSP cryptographic modules - Part 2: Cryptographic module for CSP signing operations with backup
60.60 Standard published