Registration number (WIID)Project No.TitleStatus
35455ISO/IEC 9796-2:2002Information technology — Security techniques — Digital signature schemes giving message recovery — Part 2: Integer factorization based mechanismsAtcelts
15530ISO 8372:1987Information processing — Modes of operation for a 64-bit block cipher algorithmAtcelts
46541ISO/IEC 15946-5:2009Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 5: Elliptic curve generationAtcelts
39876ISO/IEC 10118-3:2004Information technology — Security techniques — Hash-functions — Part 3: Dedicated hash-functionsAtcelts
57914ISO/IEC 24760-1:2011Information technology — Security techniques — A framework for identity management — Part 1: Terminology and conceptsAtcelts
76153ISO/IEC 13888-1:2020Information security — Non-repudiation — Part 1: GeneralAtcelts
27634ISO/IEC 15408-3:1999Information technology Security techniques Evaluation criteria for IT securityAtcelts
46414ISO/IEC 15408-2:2008Information technology Security techniques Evaluation criteria for IT securityAtcelts
62404ISO/IEC 24761:2009/Cor 1:2013Information technology — Security techniques — Authentication context for biometrics — Technical Corrigendum 1Atcelts
21733ISO/IEC TR 13335-1:1996Information technology — Guidelines for the management of IT Security — Part 1: Concepts and models for IT SecurityAtcelts
Displaying 241-250 of 774 results.