ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 88126 | ISO/IEC PWI 24842 | Inclusion of NTRU in ISO/IEC JTC 1/SC 27/WG 2 standards | Izstrādē |
| 88128 | ISO/IEC PWI 24844 | Inclusion of scheme switching mechanisms for fully homomorphic encryption in ISO/IEC JTC1 SC 27/WG 2 standards | Izstrādē |
| 83197 | ISO/IEC PWI 29128-3 | Information security — Verification of cryptographic protocols — Part 3: Part 3: Evaluation Methods and Activities for Protocol Implementation Verification | Izstrādē |
| 88140 | ISO/IEC FDIS 15408-5 | Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 5: Pre-defined packages of security requirements | Izstrādē |
| 84986 | ISO/IEC PWI 4922-3 | Secure multiparty computation — Part 3: Mechanisms based on garbled circuit | Izstrādē |
| 52909 | ISO/IEC NP TR 15443-3 | Information technology — Security techniques — A framework for IT security assurance — Part 3: Analysis of assurance methods | Izstrādē |
| 84999 | ISO/IEC PWI 29128-2 | Information security, cybersecurity and privacy protection — Verification of Cryptographic Protocols — Part 2: Evaluation Methods and Activities for Cryptographic Protocols | Izstrādē |
| 88125 | ISO/IEC PWI 24841 | Inclusion of NTRU in ISO/IEC JTC 1/SC 27/WG 2 standards | Izstrādē |
| 85008 | ISO/IEC PWI 6109 | Guidelines for data security monitoring based on logging | Izstrādē |
| 88141 | ISO/IEC FDIS 18045 | Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Requirements and methodology for IT security evaluation | Izstrādē |
Displaying 11-20 of 791 results.
