Registration number (WIID)Project No.TitleStatus
82878ISO/IEC DIS 27017Information security, cybersecurity and privacy protection — Information security controls based on ISO/IEC 27002 for cloud servicesAptauja slēgta
87641ISO/IEC DIS 28033-4Information Security — Fully homomorphic encryption — Part 4: Mechanisms for arithmetic based on look-up table evaluationAptauja slēgta
84257ISO/IEC DIS 27000Information security, cybersecurity and privacy protection — Information security management systems — OverviewAptauja slēgta
61007ISO/IEC DIS 27028Information security, cybersecurity and privacy protection — Guidance on using information security control attributesAptauja slēgta
56581ISO/IEC DIS 27090Cybersecurity — Artificial Intelligence — Guidance for addressing security threats and compromises to artificial intelligence systemsAptauja slēgta
86890ISO/IEC 18033-2:2006/DAmd 2Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers — Amendment 2Aptauja slēgta
88131ISO/IEC 20009-4:2017/DAmd 1Information technology — Security techniques — Anonymous entity authentication — Part 4: Mechanisms based on weak secrets — Amendment 1Aptauja
87638ISO/IEC DIS 28033-1Information security — Fully homomorphic encryption — Part 1: GeneralAptauja
87940ISO/IEC DIS 11770-8Information security — Key management — Part 8: Password-based key derivationAptauja
85850ISO/IEC DIS 29128-2Information security, cybersecurity and privacy protection — Verification of Cryptographic Protocols — Part 2: Evaluation Methods and Activities for Cryptographic ProtocolsAptauja
Displaying 231-240 of 791 results.