ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 86886 | ISO/IEC PWI 20009 | Inclusion of the ZYHW anonymous entity authentication mechanism in ISO/IEC 20009-4 | Izstrādē |
| 82883 | ISO/IEC PWI 19792 | Information technology — Security techniques — Security evaluation of biometrics | Izstrādē |
| 85936 | ISO/IEC PWI 19562 | Investigation of the feasibility and implementation of changes to ISO/IEC 15408 and ISO/IEC 18045 | Izstrādē |
| 85923 | ISO/IEC PWI 19541 | Inclusion of key encapsulation mechanisms for Post-Quantum Cryptography in ISO/IEC standards | Izstrādē |
| 84991 | ISO/IEC PWI 17618 | Management of digital evidence using verifiable and trustable technology | Izstrādē |
| 84990 | ISO/IEC PWI 17603 | Confidential computing | Izstrādē |
| 84246 | ISO/IEC PWI 13042 | Consideration of the Security Model for Mechanism 7a in ISO/IEC 9798-6 | Izstrādē |
| 84245 | ISO/IEC PWI 13035 | Amendment of Identity-Based Authenticated Key Exchange | Izstrādē |
| 84244 | ISO/IEC PWI 13025 | Inclusion of arithmetization-friendly cryptographic algorithms in ISO/IEC standards | Izstrādē |
| 62072 | ISO/IEC PDTS 27035-3 | Information technology — Security techniques — Information security incident management — Part 3: Guidelines for incident response operations | Standarts spēkā |
Displaying 201-210 of 807 results.
