ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 41309 | ISO/IEC WD 13335-2 | IT security techniques — Management of information and communications technology security — Part 2: Information security risk management | Izstrādē |
| 80400 | ISO/IEC WD TS 27568 | Security and privacy of digital twins | Izstrādē |
| 30032 | ISO/IEC WD 10118-4 | Information technology — Security techniques — Hash-functions — Part 4: Hash-functions using modular arithmetic | Izstrādē |
| 84249 | ISO/IEC 29134:2017/DAmd 1 | Information technology — Security techniques — Guidelines for privacy impact assessment — Amendment 1 | Izstrādē |
| 84244 | ISO/IEC PWI 13025 | Inclusion of arithmetization-friendly cryptographic algorithms in ISO/IEC standards | Izstrādē |
| 64216 | ISO/IEC 18045:2008/CD Cor 1 | Information technology — Security techniques — Methodology for IT security evaluation — Technical Corrigendum 1 | Izstrādē |
| 66525 | ISO/IEC NP 19896 | Information technology — Security techniques — Competence requirements for information security testers and evaluators | Izstrādē |
| 86885 | ISO/IEC PWI 21867 | Modes of operations for tweakable ciphers | Izstrādē |
| 86926 | ISO/IEC PWI 7709 | Information technology — Big data security and privacy – Security and privacy-preserving guidelines for multi- sourced data processing | Izstrādē |
| 86920 | ISO/IEC PWI 22061 | Inclusion of the ZYHW anonymous entity authentication mechanism in ISO/IEC 20009-4 | Izstrādē |
Displaying 91-100 of 791 results.
