ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
25429 | ISO/IEC 10118-4:1998 | Information technology — Security techniques — Hash-functions — Part 4: Hash-functions using modular arithmetic | Standarts spēkā |
77097 | ISO/IEC 23837-1:2023 | Information security — Security requirements, test and evaluation methods for quantum key distribution — Part 1: Requirements | Standarts spēkā |
51582 | ISO/IEC 27033-3:2010 | Information technology — Security techniques — Network security — Part 3: Reference networking scenarios — Threats, design techniques and control issues | Standarts spēkā |
61003 | ISO/IEC 27021:2017 | Information technology — Security techniques — Competence requirements for information security management systems professionals | Standarts spēkā |
64575 | ISO/IEC 10116:2017 | Information technology — Security techniques — Modes of operation for an n-bit block cipher | Standarts spēkā |
69373 | ISO/IEC 20889:2018 | Privacy enhancing data de-identification terminology and classification of techniques | Standarts spēkā |
44226 | ISO/IEC 14888-1:2008 | Information technology — Security techniques — Digital signatures with appendix — Part 1: General | Standarts spēkā |
78813 | ISO/IEC CD 20009-3 | Information security — Anonymous entity authentication — Part 3: Mechanisms based on blind signatures | Standarts spēkā |
78771 | ISO/IEC WD 27031 | Information technology — Guidelines for ICT readiness for business continuity | Standarts spēkā |
44405 | ISO/IEC 27041:2015 | Information technology — Security techniques — Guidance on assuring suitability and adequacy of incident investigative method | Standarts spēkā |
Displaying 111-120 of 770 results.