ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 85000 | ISO/IEC PWI 29128-3 | Information security, cybersecurity and privacy protection — Verification of cryptographic protocols — Part 3: Part 3: Evaluation Methods and Activities for Protocol Implementation Verification | Izstrādē |
| 66670 | ISO/IEC NP TS 14516-1 | Information technology — Security techniques — Guidelines for the use and management of electronic trust service providers — Part 1: Overview and concepts | Izstrādē |
| 45272 | ISO/IEC PDTR 29193 | Secure system design principles and techniques | Izstrādē |
| 41309 | ISO/IEC WD 13335-2 | IT security techniques — Management of information and communications technology security — Part 2: Information security risk management | Izstrādē |
| 84244 | ISO/IEC PWI 13025 | Inclusion of arithmetization-friendly cryptographic algorithms in ISO/IEC standards | Izstrādē |
| 39006 | ISO/IEC 10118-3:2003/NP Amd 1 | Information technology — Security techniques — Hash-functions — Part 3: Dedicated hash-functions — Amendment 1 | Izstrādē |
| 86924 | ISO/IEC PWI 27033 | Review of 27033 | Izstrādē |
| 84249 | ISO/IEC 29134:2017/DAmd 1 | Information technology — Security techniques — Guidelines for privacy impact assessment — Amendment 1 | Izstrādē |
| 86919 | ISO/IEC PWI 22054 | Modes of operations for tweakable ciphers | Izstrādē |
| 86925 | ISO/IEC PWI 27034 | Review of 27034 | Izstrādē |
Displaying 111-120 of 793 results.
