{"id":55,"date":"2024-10-30T16:32:24","date_gmt":"2024-10-30T07:32:24","guid":{"rendered":"https:\/\/www.icss-rt.org\/en\/?page_id=55"},"modified":"2024-10-30T16:32:25","modified_gmt":"2024-10-30T07:32:25","slug":"sitemap","status":"publish","type":"page","link":"https:\/\/www.icss-rt.org\/en\/sitemap\/","title":{"rendered":"Sitemap"},"content":{"rendered":"<div class=\"row veu_sitemap\">\n<div class=\"col-md-6 sitemap-col\">\n<ul class=\"link-list\">\n<li class=\"page_item page-item-16 page_item_has_children\"><a href=\"https:\/\/www.icss-rt.org\/en\/about-us\/\">About<\/a>\n<ul class='children'>\n<li class=\"page_item page-item-18\"><a href=\"https:\/\/www.icss-rt.org\/en\/about-us\/association\/\">Association<\/a><\/li>\n<li class=\"page_item page-item-26\"><a href=\"https:\/\/www.icss-rt.org\/en\/about-us\/history\/\">Purpose \/ History(since 2009)<\/a><\/li>\n<li class=\"page_item page-item-20\"><a href=\"https:\/\/www.icss-rt.org\/en\/about-us\/message\/\">Message<\/a><\/li>\n<li class=\"page_item page-item-22\"><a href=\"https:\/\/www.icss-rt.org\/en\/about-us\/board-member\/\">Board Member(9)<\/a><\/li>\n<\/ul>\n<\/li>\n<li class=\"page_item page-item-45 page_item_has_children\"><a href=\"https:\/\/www.icss-rt.org\/en\/achievements\/\">Achievements<\/a>\n<ul class='children'>\n<li class=\"page_item page-item-127\"><a href=\"https:\/\/www.icss-rt.org\/en\/achievements\/list-of-achievements\/\">List of Achievements<\/a><\/li>\n<li class=\"page_item page-item-129\"><a href=\"https:\/\/www.icss-rt.org\/en\/achievements\/harware-security-databasesupervision\/\">Harware-Security DataBase(Supervision)<\/a><\/li>\n<li class=\"page_item page-item-133\"><a href=\"https:\/\/www.icss-rt.org\/en\/achievements\/secure-ic-chip-protection-profile-for-embedded-devices\/\">Secure IC Chip Protection Profile for Embedded Devices<\/a><\/li>\n<li class=\"page_item page-item-131\"><a href=\"https:\/\/www.icss-rt.org\/en\/achievements\/public-transportation-ic-card-protection-profileptpp\/\">Public Transportation IC Card Protection Profile(PTPP)<\/a><\/li>\n<\/ul>\n<\/li>\n<li class=\"page_item page-item-43 page_item_has_children\"><a href=\"https:\/\/www.icss-rt.org\/en\/activity\/\">Activity<\/a>\n<ul class='children'>\n<li class=\"page_item page-item-124\"><a href=\"https:\/\/www.icss-rt.org\/en\/activity\/scope\/\">Scope<\/a><\/li>\n<li class=\"page_item page-item-86\"><a href=\"https:\/\/www.icss-rt.org\/en\/activity\/security_conference\/\">Security Conference (of ICSS-RT)<\/a><\/li>\n<li class=\"page_item page-item-112 page_item_has_children\"><a href=\"https:\/\/www.icss-rt.org\/en\/activity\/icss-jc\/\">IC System Security - Japan Consortium(ICSS-JC)<\/a>\n<ul class='children'>\n<li class=\"page_item page-item-114\"><a href=\"https:\/\/www.icss-rt.org\/en\/activity\/icss-jc\/icss-jc-swg8\/\">ICSS-JC SWG8<\/a><\/li>\n<li class=\"page_item page-item-116\"><a href=\"https:\/\/www.icss-rt.org\/en\/activity\/icss-jc\/icss-jc-swg9\/\">ICSS-JC SWG9<\/a><\/li>\n<li class=\"page_item page-item-118\"><a href=\"https:\/\/www.icss-rt.org\/en\/activity\/icss-jc\/swg_for_lrc\/\">ICSS-JC SWG11(Low Resource Chips SWG\uff09<\/a><\/li>\n<li class=\"page_item page-item-362\"><a href=\"https:\/\/www.icss-rt.org\/en\/activity\/icss-jc\/icss-jc-swg12\/\">ICSS-JC SWG12<\/a><\/li>\n<\/ul>\n<\/li>\n<li class=\"page_item page-item-333\"><a href=\"https:\/\/www.icss-rt.org\/en\/activity\/ic-system-security-user-fourmicss-uf\/\">IC System Security - User Fourm(ICSS-UF)<\/a><\/li>\n<\/ul>\n<\/li>\n<li class=\"page_item page-item-47\"><a href=\"https:\/\/www.icss-rt.org\/en\/contact\/\">Contact<\/a><\/li>\n<li class=\"page_item page-item-24\"><a href=\"https:\/\/www.icss-rt.org\/en\/member\/\">Member<\/a><\/li>\n<li class=\"page_item page-item-59\"><a href=\"https:\/\/www.icss-rt.org\/en\/site-policy\/\">Site Policy<\/a><\/li>\n<li class=\"page_item page-item-55\"><a href=\"https:\/\/www.icss-rt.org\/en\/sitemap\/\">Sitemap<\/a><\/li>\n<\/ul>\n<\/div>\n<div class=\"col-md-6 sitemap-col\">\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>About Association Purpose \/ History(since 2009) Message Board Member(9) Achievements List of Achievements Harware-Security DataBase(Supervision) Secure IC Chip Protection Profile for Embedded Devices Public Transportation IC Card Protection Profile(PTPP) Activity Scope Security Conference (of ICSS-RT) IC System Security - Japan Consortium(ICSS-JC) ICSS-JC SWG8 ICSS-JC SWG9 ICSS-JC SWG11(Low Resource Chips SWG\uff09 ICSS-JC SWG12 IC System Security [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"vkexunit_cta_each_option":"","footnotes":""},"class_list":["post-55","page","type-page","status-publish","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.icss-rt.org\/en\/wp-json\/wp\/v2\/pages\/55","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.icss-rt.org\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.icss-rt.org\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.icss-rt.org\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.icss-rt.org\/en\/wp-json\/wp\/v2\/comments?post=55"}],"version-history":[{"count":2,"href":"https:\/\/www.icss-rt.org\/en\/wp-json\/wp\/v2\/pages\/55\/revisions"}],"predecessor-version":[{"id":57,"href":"https:\/\/www.icss-rt.org\/en\/wp-json\/wp\/v2\/pages\/55\/revisions\/57"}],"wp:attachment":[{"href":"https:\/\/www.icss-rt.org\/en\/wp-json\/wp\/v2\/media?parent=55"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}