ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
35455 | ISO/IEC 9796-2:2002 | Information technology — Security techniques — Digital signature schemes giving message recovery — Part 2: Integer factorization based mechanisms | Atcelts |
15530 | ISO 8372:1987 | Information processing — Modes of operation for a 64-bit block cipher algorithm | Atcelts |
46541 | ISO/IEC 15946-5:2009 | Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 5: Elliptic curve generation | Atcelts |
39876 | ISO/IEC 10118-3:2004 | Information technology — Security techniques — Hash-functions — Part 3: Dedicated hash-functions | Atcelts |
57914 | ISO/IEC 24760-1:2011 | Information technology — Security techniques — A framework for identity management — Part 1: Terminology and concepts | Atcelts |
76153 | ISO/IEC 13888-1:2020 | Information security — Non-repudiation — Part 1: General | Atcelts |
27634 | ISO/IEC 15408-3:1999 | Information technology Security techniques Evaluation criteria for IT security | Atcelts |
46414 | ISO/IEC 15408-2:2008 | Information technology Security techniques Evaluation criteria for IT security | Atcelts |
62404 | ISO/IEC 24761:2009/Cor 1:2013 | Information technology — Security techniques — Authentication context for biometrics — Technical Corrigendum 1 | Atcelts |
21733 | ISO/IEC TR 13335-1:1996 | Information technology — Guidelines for the management of IT Security — Part 1: Concepts and models for IT Security | Atcelts |
Displaying 241-250 of 774 results.