ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 91718 | ISO/IEC 14888-2:2008/AWI Amd 1 | Information technology — Security techniques — Digital signatures with appendix — Part 2: Integer factorization based mechanisms — Amendment 1 | Izstrādē |
| 52909 | ISO/IEC NP TR 15443-3 | Information technology — Security techniques — A framework for IT security assurance — Part 3: Analysis of assurance methods | Izstrādē |
| 88143 | ISO/IEC 27566-1 | Information security, cybersecurity and privacy protection — Age assurance systems — Part 1: Framework | Izstrādē |
| 80398 | ISO/IEC FDIS 27565 | Information security, cybersecurity and privacy protection — Guidelines on privacy preservation based on zero-knowledge proofs | Izstrādē |
| 91773 | ISO/IEC PWI 25863 | Exploration of Security and privacy characteristics for digital identity wallets managing digital credentials | Izstrādē |
| 88140 | ISO/IEC FDIS 15408-5 | Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 5: Pre-defined packages of security requirements | Izstrādē |
| 84988 | ISO/IEC FDIS 19896-2 | Information security, cybersecurity and privacy protection — Requirements for the competence of IT security conformance assessment body personnel — Part 2: Knowledge and skills requirements for testers and validators according to ISO/IEC 19790 and ISO/IEC 24759 | Izstrādē |
| 92164 | ISO/IEC AWI 25959 | Information security, cybersecurity and privacy protection — Application of attack potential to deep learning-based technology | Izstrādē |
| 21136 | ISO/IEC CD 11768-2 | Information technology security techniques — Evaluation criteria for information technology security — Part 2: Functionality of IT systems, products and components | Izstrādē |
| 64590 | ISO/IEC NP TR 19791 | Information technology — Security techniques — Security assessment of operational systems | Izstrādē |
Displaying 141-150 of 791 results.
