ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
30818 | ISO/IEC WD 18033 | Information technology — Encryption algorithms | Izstrādē |
91764 | ISO/IEC PWI 25857 | Cybersecurity — Guidance for addressing social engineering threats within the digital environment | Izstrādē |
91773 | ISO/IEC PWI 25863 | Exploration of digital wallets storing digital credentials | Izstrādē |
91774 | ISO/IEC PWI 27575 | Privacy for metaverse frameworks | Izstrādē |
91772 | ISO/IEC PWI 25860 | Authenticator exploration | Izstrādē |
91840 | ISO/IEC WD 25888 | Information Security — Algorithmic Mechanisms to Protect Symmetric Algorithms in Hardware Against Side-Channel Attacks | Izstrādē |
44380 | ISO/IEC NP 27036 | Information technology — Security techniques — Guidelines for security of outsourcing | Izstrādē |
88131 | ISO/IEC 20009-4:2017/CD Amd 1.2 | Information technology — Security techniques — Anonymous entity authentication — Part 4: Mechanisms based on weak secrets — Amendment 1 | Izstrādē |
90713 | ISO/IEC PWI 25546 | Confidential computing | Izstrādē |
90716 | ISO/IEC PWI 25548 | Cybersecurity framework for smart cities | Izstrādē |
Displaying 211-220 of 774 results.