ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 88151 | ISO/IEC FDIS 29151 | Information security, cybersecurity and privacy protection — Controls, requirements, and guidance for personally identifiable information protection | Izstrādē |
| 83197 | ISO/IEC PWI 29128-3 | Information security — Verification of cryptographic protocols — Part 3: Part 3: Evaluation Methods and Activities for Protocol Implementation Verification | Izstrādē |
| 91772 | ISO/IEC PWI 25860 | Authenticator exploration | Izstrādē |
| 88125 | ISO/IEC PWI 24841 | Inclusion of NTRU in ISO/IEC JTC 1/SC 27/WG 2 standards | Izstrādē |
| 88127 | ISO/IEC PWI 24843 | Privacy-preserving attribute-based credentials | Izstrādē |
| 88126 | ISO/IEC PWI 24842 | Inclusion of NTRU in ISO/IEC JTC 1/SC 27/WG 2 standards | Izstrādē |
| 84287 | ISO/DIS 13133 | Financial services — Security reference model for digital currency hardware wallet (SRM-DCHW) | Izstrādē |
| 88123 | ISO/IEC PWI 24839 | Bulletproofing and clarifying inclusion and deletion criteria for cryptographic mechanisms | Izstrādē |
| 25538 | ISO/IEC WD 11770-4 | Information technology — Security techniques — Key management — Part 4: Cryptographic separation | Izstrādē |
| 82888 | ISO/IEC PWI 7699 | Guidance for addressing security threats and failures in artificial intelligence | Izstrādē |
Displaying 141-150 of 793 results.
