ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 92016 | ISO/IEC WD 14888-6 | Information security — Digital signatures with appendix — Part 6: Stateless hash-based mechanisms | Izstrādē |
| 64576 | ISO/IEC NP 18032 | Information technology — Security techniques — Prime number generation | Izstrādē |
| 91716 | ISO/IEC WD 25330-2 | Information Security — Oblivious Transfer — Part 2: Base oblivious transfer | Izstrādē |
| 89517 | ISO/IEC 14888-3:2018/DAmd 1 | IT Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms — Amendment 1 | Izstrādē |
| 71517 | ISO/IEC 11770-3:2015/NP Amd 2 | Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques — Amendment 2 | Izstrādē |
| 85920 | ISO/IEC CD 27004 | Information technology — Security techniques — Information security management — Monitoring, measurement, analysis and evaluation | Izstrādē |
| 88143 | ISO/IEC 27566-1 | Information security, cybersecurity and privacy protection — Age assurance systems — Part 1: Framework | Izstrādē |
| 92164 | ISO/IEC AWI 25959 | Information security, cybersecurity and privacy protection — Application of attack potential to deep learning-based technology | Izstrādē |
| 60029 | ISO/IEC NP 17547 | Information technology — Security techniques — Guidelines for analysis & interpretation of digital evidence | Izstrādē |
| 27686 | ISO/IEC WD 15443 | Information technology - Security techniques - A framework for IT security assurance | Izstrādē |
Displaying 231-240 of 791 results.
