ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
90709 | ISO/IEC PWI 18367 | Information technology — Security techniques — Cryptographic algorithms and security mechanisms conformance testing | Izstrādē |
84991 | ISO/IEC PWI 17618 | Management of digital evidence using verifiable and trustable technology | Izstrādē |
84990 | ISO/IEC PWI 17603 | Confidential computing | Izstrādē |
92017 | ISO/IEC PWI 14888-5 | Information technology — Security techniques — Digital signatures with appendix — Part 5: Part-5: lattice-based mechanisms | Izstrādē |
84246 | ISO/IEC PWI 13042 | Consideration of the Security Model for Mechanism 7a in ISO/IEC 9798-6 | Izstrādē |
84245 | ISO/IEC PWI 13035 | Amendment of Identity-Based Authenticated Key Exchange | Izstrādē |
84244 | ISO/IEC PWI 13025 | Inclusion of arithmetization-friendly cryptographic algorithms in ISO/IEC standards | Izstrādē |
62072 | ISO/IEC PDTS 27035-3 | Information technology — Security techniques — Information security incident management — Part 3: Guidelines for incident response operations | Standarts spēkā |
45272 | ISO/IEC PDTR 29193 | Secure system design principles and techniques | Izstrādē |
80397 | ISO/IEC NP TS 27564 | Privacy — Guidance on the use of models for engineering | Izstrādē |
Displaying 191-200 of 774 results.