ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 29579 | ISO/IEC WD 15946 | Cryptographic techniques based on elliptic curves | Izstrādē |
| 38852 | ISO/IEC NP 24742 | Information technology — Information security management metrics and measurements | Izstrādē |
| 92945 | ISO/IEC AWI 29147 | Cybersecurity — Vulnerability disclosure processes | Izstrādē |
| 23706 | ISO/IEC WD 14516-1 | Guidelines for the use and management of Trusted Third Party (TTP) services — Part 1: General overview | Izstrādē |
| 88140 | ISO/IEC 15408-5 | Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 5: Pre-defined packages of security requirements | Izstrādē |
| 43752 | ISO/IEC WD 27012 | Information technology - Security techniques — ISM guidelines for e-government services | Izstrādē |
| 87557 | ISO/IEC DIS 4922-3 | Information security — Secure multiparty computation — Part 3: Mechanisms based on garbled circuits | Izstrādē |
| 82877 | ISO/IEC PWI 27009 | Information security, cybersecurity and privacy protection — Sector-specific application of ISO/IEC 27001 — Requirements | Izstrādē |
| 52908 | ISO/IEC NP TR 15443-2 | Information technology — Security techniques — A framework for IT security assurance — Part 2: Assurance methods | Izstrādē |
| 51624 | ISO/IEC WD 24745 | Information technology — Biometric template protection | Izstrādē |
Displaying 181-190 of 793 results.
