ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
83197 | ISO/IEC PWI 29128-3 | Information security — Verification of cryptographic protocols — Part 3: Part 3: Evaluation Methods and Activities for Protocol Implementation Verification | Izstrādē |
88971 | ISO/IEC WD 25093-1 | Cybersecurity — Confidential computing — Part 1: Overview and concepts | Izstrādē |
60103 | ISO/IEC NP 17598 | Investigation principles and processes | Izstrādē |
84242 | ISO/IEC CD TS 27008.3 | Information technology — Security techniques — Guidelines for the assessment of information security controls | Izstrādē |
86885 | ISO/IEC PWI 21867 | Modes of operations for tweakable ciphers | Izstrādē |
86886 | ISO/IEC PWI 20009 | Inclusion of the ZYHW anonymous entity authentication mechanism in ISO/IEC 20009-4 | Izstrādē |
88135 | ISO/IEC DIS 15408-2 | Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 2: Security functional components | Izstrādē |
69403 | ISO/IEC NP 20897 | Information technology — Security techniques — Security requirements, test and evaluation methods for physically unclonable functions for generating nonstored security parameters | Izstrādē |
86930 | ISO/IEC PWI 8887 | Authority on identity information quality and related architecture description | Izstrādē |
86928 | ISO/IEC PWI 27046 | Information technology — Big data security and privacy — Implementation guidelines | Izstrādē |
Displaying 201-210 of 774 results.