ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
18105 | ISO/IEC 10118-2:1994 | Information technology — Security techniques — Hash-functions — Part 2: Hash-functions using an n-bit block cipher algorithm | Atcelts |
19682 | ISO/IEC WD 11765 | Security information objects | Izstrādē |
19684 | ISO/IEC WD 11767 | Information technology security techniques — Collection and analysis of requirements for information technology security evaluation criteria | Izstrādē |
19685 | ISO/IEC WD 11768-3 | Information technology security techniques — Evaluation criteria for information technology security — Part 3: Assurance of IT systems | Izstrādē |
19687 | ISO/IEC 11770-1:1996 | Information technology — Security techniques — Key management — Part 1: Framework | Atcelts |
21136 | ISO/IEC CD 11768-2 | Information technology security techniques — Evaluation criteria for information technology security — Part 2: Functionality of IT systems, products and components | Izstrādē |
21733 | ISO/IEC TR 13335-1:1996 | Information technology — Guidelines for the management of IT Security — Part 1: Concepts and models for IT Security | Atcelts |
21755 | ISO/IEC TR 13335-2:1997 | Information technology — Guidelines for the management of IT Security — Part 2: Managing and planning IT Security | Atcelts |
21756 | ISO/IEC TR 13335-3:1998 | Information technology — Guidelines for the management of IT Security — Part 3: Techniques for the management of IT Security | Atcelts |
22053 | ISO/IEC 9797:1994 | Information technology — Security techniques — Data integrity mechanism using a cryptographic check function employing a block cipher algorithm | Atcelts |
Displaying 11-20 of 770 results.