ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
92164 | ISO/IEC NP 25959 | Information security, cybersecurity and privacy protection — Application of attack potential to deep learning-based technology | Izstrādē |
88142 | ISO/IEC PWI 6087 | Digital authentication: Risks and mitigations | Izstrādē |
88140 | ISO/IEC FDIS 15408-5 | Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 5: Pre-defined packages of security requirements | Izstrādē |
91717 | ISO/IEC WD 25330-3 | Information Security — Oblivious Transfer — Part 3: Oblivious transfer extensions | Izstrādē |
88130 | ISO/IEC CD 11770-4 | Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets | Izstrādē |
88141 | ISO/IEC DIS 18045 | Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Requirements and methodology for IT security evaluation | Izstrādē |
88136 | ISO/IEC DIS 15408-3 | Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 3: Security assurance components | Izstrādē |
91719 | ISO/IEC 14888-2:2008/AWI Amd 2 | Information technology — Security techniques — Digital signatures with appendix — Part 2: Integer factorization based mechanisms — Amendment 2 | Izstrādē |
82873 | ISO/IEC 27001:2013/DAmd 1 | Information technology — Security techniques — Information security management systems — Requirements — Amendment 1 | Izstrādē |
30814 | ISO/IEC WD 18029 | Information technology — Specification for the management and interoperation of public key infrastructure components | Izstrādē |
Displaying 161-170 of 774 results.