ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
86887 | ISO/IEC 9797-2:2021/Cor 1:2024 | Information security — Message authentication codes (MACs) — Part 2: Mechanisms using a dedicated hash-function — Technical Corrigendum 1 | Standarts spēkā |
86886 | ISO/IEC PWI 20009 | Inclusion of the ZYHW anonymous entity authentication mechanism in ISO/IEC 20009-4 | Izstrādē |
86885 | ISO/IEC PWI 21867 | Modes of operations for tweakable ciphers | Izstrādē |
86501 | ISO/IEC 18014-2:2021/Cor 1:2024 | Information security — Time-stamping services — Part 2: Mechanisms producing independent tokens — Technical Corrigendum 1 | Standarts spēkā |
86013 | ISO/IEC 29146:2024 | Information technology — Security techniques — A framework for access management | Standarts spēkā |
86012 | ISO/IEC 29134:2023 | Information technology — Security techniques — Guidelines for privacy impact assessment | Standarts spēkā |
85938 | ISO/IEC 29100:2024 | Information technology — Security techniques — Privacy framework | Standarts spēkā |
85936 | ISO/IEC PWI 19562 | Investigation of the feasibility and implementation of changes to ISO/IEC 15408 and ISO/IEC 18045 | Izstrādē |
85935 | ISO/IEC 18014-1:2008/PRF Amd 1 | Information technology — Security techniques — Time-stamping services — Part 1: Framework — Amendment 1 | Izstrādē |
85929 | ISO/IEC 11770-3:2021/Amd 1:2025 | Information security — Key management — Part 3: Mechanisms using asymmetric techniques — Amendment 1: TFNS identity-based key agreement | Standarts spēkā |
Displaying 121-130 of 770 results.