Registration number (WIID)Project No.TitleStatus
36013ISO/IEC 14888-3:1998/Cor 1:2001Information technology — Security techniques — Digital signatures with appendix — Part 3: Certificate-based mechanisms — Technical Corrigendum 1Atcelts
36359ISO/IEC WD 17799Information technology — Code of practice for information security managementIzstrādē
37416ISO/IEC 10118-3:2003Information technology — Security techniques — Hash-functions — Part 3: Dedicated hash-functionsAtcelts
37970ISO/IEC 18033-1:2005Information technology Security techniques Encryption algorithmsAtcelts
37970ISO/IEC 18033-1:2005Information technology — Security techniques — Encryption algorithms — Part 1: GeneralAtcelts
37971ISO/IEC 18033-2:2006Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphersStandarts spēkā
37972ISO/IEC 18033-3:2005Information technology — Security techniques — Encryption algorithms — Part 3: Block ciphersAtcelts
38192ISO/IEC 13888-1:2004IT security techniques — Non-repudiation — Part 1: GeneralAtcelts
38192ISO/IEC 13888-1:2004IT security techniques Non-repudiationAtcelts
38738ISO/IEC 15408-1:1999/CD Cor 1Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model — Technical Corrigendum 1Izstrādē
Displaying 101-110 of 770 results.