ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 35396 | ISO/IEC TR 18044:2004 | Information technology — Security techniques — Information security incident management | Atcelts |
| 17663 | ISO/IEC 9798-3:1993 | Information technology — Security techniques — Entity authentication mechanisms — Part 3: Entity authentication using a public key algorithm | Atcelts |
| 53473 | ISO/IEC 11770-2:2008/Cor 1:2009 | Information technology — Security techniques — Key management — Part 2: Mechanisms using symmetric techniques — Technical Corrigendum 1 | Atcelts |
| 23230 | ISO/IEC 13888-2:1998 | Information technology — Security techniques — Non-repudiation — Part 2: Mechanisms using symmetric techniques | Atcelts |
| 66558 | ISO/IEC 18031:2011/Cor 1:2014 | Information technology — Security techniques — Random bit generation — Technical Corrigendum 1 | Atcelts |
| 25898 | ISO/IEC 9798-5:1999 | Information technology — Security techniques — Entity authentication — Part 5: Mechanisms using zero knowledge techniques | Atcelts |
| 61498 | ISO/IEC 27018:2014 | Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors | Atcelts |
| 34388 | ISO/IEC 18014-3:2004 | Information technology — Security techniques — Time-stamping services — Part 3: Mechanisms producing linked tokens | Atcelts |
| 62313 | ISO/IEC 27006:2015 | Information technology — Security techniques — Requirements for bodies providing audit and certification of information security management systems | Atcelts |
| 33929 | ISO/IEC TR 19791:2006 | Information technology — Security techniques — Security assessment of operational systems | Atcelts |
Displaying 241-250 of 791 results.
