ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 60030 | ISO/IEC NP 17548 | Information technology — Security techniques — Guidance on assuring suitability and adequacy of investigation methods | Izstrādē |
| 60029 | ISO/IEC NP 17547 | Information technology — Security techniques — Guidelines for analysis & interpretation of digital evidence | Izstrādē |
| 55579 | ISO/IEC NP 15443-3 | Information technology — Security techniques — A framework for IT security assurance — Part 3: Analysis of assurance methods | Izstrādē |
| 55578 | ISO/IEC NP 15443-2 | Information technology — Security techniques — A framework for IT security assurance — Part 2: Assurance methods | Izstrādē |
| 55577 | ISO/IEC NP 15443-1 | Information technology — Security techniques — A framework for IT security assurance — Part 1: Overview and framework | Izstrādē |
| 41312 | ISO/IEC NP 13335-5 | Information technology — Guidelines for the management of IT Security — Part 5: Management guidance on network security | Izstrādē |
| 44738 | ISO/IEC NP 10118-1 | Information technology — Security techniques — Hash-functions — Part 1: General | Izstrādē |
| 85850 | ISO/IEC FDIS 29128-2 | Information security, cybersecurity and privacy protection — Verification of Cryptographic Protocols — Part 2: Evaluation Methods and Activities for Cryptographic Protocols | Izstrādē |
| 87641 | ISO/IEC FDIS 28033-4 | Information Security — Fully homomorphic encryption — Part 4: Mechanisms for arithmetic based on look-up table evaluation | Izstrādē |
| 56581 | ISO/IEC FDIS 27090 | Cybersecurity — Artificial Intelligence — Guidance for addressing security threats and compromises to artificial intelligence systems | Izstrādē |
Displaying 251-260 of 807 results.
