ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
90710 | ISO/IEC PWI 25543 | Consideration of the Target of Evaluation Concept for Emerging and Existing Technologies (WG3 N2754) | Izstrādē |
38740 | ISO/IEC 15408-3:1999/CD Cor 1 | Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance requirements — Technical Corrigendum 1 | Izstrādē |
64141 | ISO/IEC WD 27005 | Information technology — Security techniques — Information security risk management | Izstrādē |
88147 | ISO/IEC WD 27566-3.3 | Information security, cybersecurity and privacy protection – Age assurance systems — Part 3: Approaches to comparison or analysis | Izstrādē |
63151 | ISO/IEC 9796-3:2006/CD Cor 1 | Information technology — Security techniques — Digital signature schemes giving message recovery — Part 3: Discrete logarithm based mechanisms — Technical Corrigendum 1 | Izstrādē |
72401 | ISO/IEC CD 20009-3 | Information technology — Security techniques — Anonymous entity authentication — Part 3: Mechanisms based on blind signatures concepts | Izstrādē |
69403 | ISO/IEC NP 20897 | Information technology — Security techniques — Security requirements, test and evaluation methods for physically unclonable functions for generating nonstored security parameters | Izstrādē |
51625 | ISO/IEC CD 24760 | Information Technology — Security Techniques — A Framework for Identity Management | Izstrādē |
44380 | ISO/IEC NP 27036 | Information technology — Security techniques — Guidelines for security of outsourcing | Izstrādē |
44377 | ISO/IEC NP 27033 | Information technology — IT Network security | Izstrādē |
Displaying 111-120 of 770 results.