Registration number (WIID)Project No.TitleStatus
83197ISO/IEC PWI 29128-3Information security — Verification of cryptographic protocols — Part 3: Part 3: Evaluation Methods and Activities for Protocol Implementation VerificationIzstrādē
88971ISO/IEC WD 25093-1Cybersecurity — Confidential computing — Part 1: Overview and conceptsIzstrādē
60103ISO/IEC NP 17598Investigation principles and processesIzstrādē
84242ISO/IEC CD TS 27008.3Information technology — Security techniques — Guidelines for the assessment of information security controlsIzstrādē
86885ISO/IEC PWI 21867Modes of operations for tweakable ciphersIzstrādē
86886ISO/IEC PWI 20009Inclusion of the ZYHW anonymous entity authentication mechanism in ISO/IEC 20009-4Izstrādē
88135ISO/IEC DIS 15408-2Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 2: Security functional componentsIzstrādē
69403ISO/IEC NP 20897Information technology — Security techniques — Security requirements, test and evaluation methods for physically unclonable functions for generating nonstored security parametersIzstrādē
86930ISO/IEC PWI 8887Authority on identity information quality and related architecture descriptionIzstrādē
86928ISO/IEC PWI 27046Information technology — Big data security and privacy — Implementation guidelinesIzstrādē
Displaying 201-210 of 774 results.