ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
84999 | ISO/IEC PWI 29128-2 | Information security, cybersecurity and privacy protection — Verification of Cryptographic Protocols — Part 2: Evaluation Methods and Activities for Cryptographic Protocols | Izstrādē |
91840 | ISO/IEC WD 25888 | Information Security — Algorithmic Mechanisms to Protect Symmetric Algorithms in Hardware Against Side-Channel Attacks | Izstrādē |
85008 | ISO/IEC PWI 6109 | Guidelines for data security monitoring based on logging | Izstrādē |
90708 | ISO/IEC 29192-8:2022/CD Amd 1 | Information security — Lightweight cryptography — Part 8: Authenticated encryption — Amendment 1 | Izstrādē |
90717 | ISO/IEC NP 27574 | Information security, cybersecurity and privacy protection — Privacy in brain computer interface (BCI) applications | Izstrādē |
90707 | ISO/IEC 18033-7:2022/CD Amd 1 | Information security — Encryption algorithms — Part 7: Tweakable block ciphers — Amendment 1 | Izstrādē |
90716 | ISO/IEC PWI 25548 | Cybersecurity framework for smart cities | Izstrādē |
80400 | ISO/IEC AWI TS 27568 | Security and privacy of digital twins | Izstrādē |
39006 | ISO/IEC 10118-3:2003/NP Amd 1 | Information technology — Security techniques — Hash-functions — Part 3: Dedicated hash-functions — Amendment 1 | Izstrādē |
84246 | ISO/IEC PWI 13042 | Consideration of the Security Model for Mechanism 7a in ISO/IEC 9798-6 | Izstrādē |
Displaying 191-200 of 774 results.