En este corrigéndum técnico de UIT-T Rec. X.696 | ISO/CEI 8825-7 se corrigen las codificaciones Real IEEE de 32 bits.  | 
                             
                         
                     | 
                 
                
                    
                        
 
                            
                                | Citation: | 
                                https://handle.itu.int/11.1002/1000/13602 | 
                             
                            
                                | Series title: | 
                                X series: Data networks, open system communications and security   X.600-X.699: OSI networking and system aspects   X.680-X.699: Abstract Syntax Notation One (ASN.1) | 
                             
                            
                                | Approval date: | 
                                2018-05-14 | 
                             
                            | Identical standard: | ISO/IEC  8825-7/Cor3 (Common) |  
                            | Provisional name: | X.oer |  
                            | Approval process: | AAP |  
                            
                                | 
                                    Status: | 
                                
                                    Superseded | 
                             
                            
                            
                                | 
                                    Maintenance responsibility: | 
                                
                                    ITU-T Study Group 17 | 
                             
                            
                            
                                | 
                                    Further details: | 
                                
                                    Patent statement(s) 
                                    Development history 
                                    
                                    
                                 | 
                             
                         
                     | 
                 
             
        
    
 
    
    
    
 
                     | 
		
		
			
                        
				
					
						
                                    
    
    
        
            | Title | 
            Approved on | 
            Download | 
         
        
                
                    | 
                        Guidelines for identity-based cryptosystems used for cross-domain secure communications
                     | 
                    
                        2023
                     | 
                    
                        here
                     | 
                 
            
                
                    | 
                        Overview of hybrid approaches for key exchange with quantum key distribution
                     | 
                    
                        2022
                     | 
                    
                        here
                     | 
                 
            
                
                    | 
                        Guidelines for security management of using artificial intelligence technology
                     | 
                    
                        2022
                     | 
                    
                        here
                     | 
                 
            
                
                    | 
                        Successful use of security standards (2nd edition)
                     | 
                    
                        2020
                     | 
                    
                        here
                     | 
                 
            
                
                    | 
                        Description of the incubation mechanism and ways to improve it
                     | 
                    
                        2020
                     | 
                    
                        here
                     | 
                 
            
                
                    | 
                        Strategic approaches to the transformation of security studies
                     | 
                    
                        2020
                     | 
                    
                        here
                     | 
                 
            
     
    
 
    
    
 
                                
					 
				 
			 
                     |