ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 92017 | ISO/IEC AWI 14888-5 | Information security — Digital signatures with appendix — Part 5: Lattice-based mechanisms | Izstrādē |
| 92016 | ISO/IEC WD 14888-6 | Information security — Digital signatures with appendix — Part 6: Stateless hash-based mechanisms | Izstrādē |
| 84999 | ISO/IEC PWI 29128-2 | Information security, cybersecurity and privacy protection — Verification of Cryptographic Protocols — Part 2: Evaluation Methods and Activities for Cryptographic Protocols | Izstrādē |
| 55579 | ISO/IEC NP 15443-3 | Information technology — Security techniques — A framework for IT security assurance — Part 3: Analysis of assurance methods | Izstrādē |
| 88143 | ISO/IEC 27566-1 | Information security, cybersecurity and privacy protection — Age assurance systems — Part 1: Framework | Izstrādē |
| 92164 | ISO/IEC AWI 25959 | Information security, cybersecurity and privacy protection — Application of attack potential to deep learning-based technology | Izstrādē |
| 39813 | ISO/IEC DIS 20886 | Information technology — International Security, Trust, and Privacy Alliance — Privacy Framework | Izstrādē |
| 41309 | ISO/IEC WD 13335-2 | IT security techniques — Management of information and communications technology security — Part 2: Information security risk management | Izstrādē |
| 92948 | ISO/IEC PWI 27033 | Information technology —Security techniques — Network security | Izstrādē |
| 92949 | ISO/IEC PWI 27034 | Application security | Izstrādē |
Displaying 241-250 of 791 results.
