ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 21136 | ISO/IEC CD 11768-2 | Information technology security techniques — Evaluation criteria for information technology security — Part 2: Functionality of IT systems, products and components | Izstrādē |
| 86889 | ISO/IEC 29192-1:2012/Amd 1 | Information technology — Security techniques — Lightweight cryptography — Part 1: General — Amendment 1 | Izstrādē |
| 36359 | ISO/IEC WD 17799 | Information technology — Code of practice for information security management | Izstrādē |
| 28283 | ISO/IEC WD 14516-2 | Guidelines for the use and management of Trusted Third Party (TTP) services — Part 2: Technical aspects | Izstrādē |
| 43752 | ISO/IEC WD 27012 | Information technology - Security techniques — ISM guidelines for e-government services | Izstrādē |
| 50955 | ISO/IEC NP 20008 | Anonymous digital signatures | Izstrādē |
| 26955 | ISO/IEC WD 11768-1 | Information technology security techniques — Security mechanisms using zero knowledge techniques — Part 1: General model of security evaluation | Izstrādē |
| 29579 | ISO/IEC WD 15946 | Cryptographic techniques based on elliptic curves | Izstrādē |
| 88122 | ISO/IEC PWI 24838 | Inclusion of new tweakable cipher mechanisms in 18033-7 | Izstrādē |
| 88121 | ISO/IEC PWI 24836 | Inclusion of oblivious transfer in ISO/IEC JTC 1/SC 27/WG 2 standards | Izstrādē |
Displaying 221-230 of 791 results.
