ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
88130 | ISO/IEC WD 11770-4 | Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets | Izstrādē |
41312 | ISO/IEC NP 13335-5 | Information technology — Guidelines for the management of IT Security — Part 5: Management guidance on network security | Izstrādē |
26157 | ISO/IEC DIS 14980 | Information technology — Code of practice for information security management | Izstrādē |
66672 | ISO/IEC NP TS 14516-3 | Information technology — Security techniques — Guidelines for the use and management of electronic trust service providers — Part 3: Guidelines on information security for PKI trust service providers | Izstrādē |
50956 | ISO/IEC NP 20009 | Anonymous entity authentication | Izstrādē |
90704 | ISO/IEC PWI 25541 | Algorithmic Mechanisms to Protect Symmetric Algorithms in Hardware Against Side-Channel Attacks | Izstrādē |
39813 | ISO/IEC DIS 20886 | Information technology — International Security, Trust, and Privacy Alliance — Privacy Framework | Izstrādē |
90708 | ISO/IEC 29192-8:2022/WD Amd 1 | Information security — Lightweight cryptography — Part 8: Authenticated encryption — Amendment 1 | Izstrādē |
85851 | ISO/IEC CD 29128-3 | Information security, cybersecurity and privacy protection — Verification of cryptographic protocols — Part 3: Evaluation Methods and Activities for Protocol Implementation Verification | Izstrādē |
39006 | ISO/IEC 10118-3:2003/NP Amd 1 | Information technology — Security techniques — Hash-functions — Part 3: Dedicated hash-functions — Amendment 1 | Izstrādē |
Displaying 171-180 of 770 results.