ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 91719 | ISO/IEC 14888-2:2008/AWI Amd 2 | Information technology — Security techniques — Digital signatures with appendix — Part 2: Integer factorization based mechanisms — Amendment 2 | Izstrādē |
| 91715 | ISO/IEC DIS 25330-1 | Information security — Oblivious transfer — Part 1: General | Izstrādē |
| 91720 | ISO/WD TR 25844 | Information security, cybersecurity and privacy protection – Transition information for ISO/IEC 19790 and ISO/IEC 24759 | Izstrādē |
| 91718 | ISO/IEC 14888-2:2008/CD Amd 1 | Information technology — Security techniques — Digital signatures with appendix — Part 2: Integer factorization based mechanisms — Amendment 1 | Izstrādē |
| 91717 | ISO/IEC WD 25330-3.2 | Information security — Oblivious transfer — Part 3: Oblivious transfer extension protocols | Izstrādē |
| 91721 | ISO/IEC CD TR 22216 | Information security, cybersecurity and privacy protection — Technical developments in ISO/IEC 15408 (multipart) and ISO/IEC 18045 | Izstrādē |
| 91764 | ISO/IEC PWI 25857 | Cybersecurity — Guidance for addressing social engineering threats within the digital environment | Izstrādē |
| 91773 | ISO/IEC PWI 25863 | Exploration of Security and privacy characteristics for digital identity wallets managing digital credentials | Izstrādē |
| 91772 | ISO/IEC PWI 25860 | Authenticator exploration | Izstrādē |
| 88134 | ISO/IEC 15408-1 | Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 1: Introduction and general model | Izstrādē |
Displaying 111-120 of 807 results.
