Registration number (WIID)Project No.TitleStatus
18105ISO/IEC 10118-2:1994Information technology — Security techniques — Hash-functions — Part 2: Hash-functions using an n-bit block cipher algorithmAtcelts
19682ISO/IEC WD 11765Security information objectsIzstrādē
19684ISO/IEC WD 11767Information technology security techniques — Collection and analysis of requirements for information technology security evaluation criteriaIzstrādē
19685ISO/IEC WD 11768-3Information technology security techniques — Evaluation criteria for information technology security — Part 3: Assurance of IT systemsIzstrādē
19687ISO/IEC 11770-1:1996Information technology — Security techniques — Key management — Part 1: FrameworkAtcelts
21136ISO/IEC CD 11768-2Information technology security techniques — Evaluation criteria for information technology security — Part 2: Functionality of IT systems, products and componentsIzstrādē
21733ISO/IEC TR 13335-1:1996Information technology — Guidelines for the management of IT Security — Part 1: Concepts and models for IT SecurityAtcelts
21755ISO/IEC TR 13335-2:1997Information technology — Guidelines for the management of IT Security — Part 2: Managing and planning IT SecurityAtcelts
21756ISO/IEC TR 13335-3:1998Information technology — Guidelines for the management of IT Security — Part 3: Techniques for the management of IT SecurityAtcelts
22053ISO/IEC 9797:1994Information technology — Security techniques — Data integrity mechanism using a cryptographic check function employing a block cipher algorithmAtcelts
Displaying 11-20 of 770 results.