ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 85851 | ISO/IEC DIS 29128-3 | Information security, cybersecurity and privacy protection — Verification of cryptographic protocols — Part 3: Evaluation methods and activities for protocol implementation verification | Aptauja |
| 87639 | ISO/IEC DIS 28033-2 | Information security — Fully homomorphic encryption — Part 2: Mechanisms for exact arithmetic on modular integers | Aptauja |
| 87640 | ISO/IEC DIS 28033-3 | Information security — Fully homomorphic encryption — Part 3: Mechanisms for arithmetic on approximate numbers | Aptauja |
| 72437 | ISO/IEC TR 27103:2018 | Information technology — Security techniques — Cybersecurity and ISO and IEC Standards | Atcelts |
| 76559 | ISO/IEC 27018:2019 | Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors | Atcelts |
| 44884 | ISO/IEC 10118-2:2000/Cor 1:2006 | Information technology — Security techniques — Hash-functions — Part 2: Hash-functions using an n-bit block cipher — Technical Corrigendum 1 | Atcelts |
| 39066 | ISO/IEC 13335-1:2004 | Information technology — Security techniques — Management of information and communications technology security — Part 1: Concepts and models for information and communications technology security management | Atcelts |
| 30830 | ISO/IEC 18045:2005 | Information technology — Security techniques — Methodology for IT security evaluation | Atcelts |
| 39612 | ISO/IEC 17799:2005 | Information technology — Security techniques — Code of practice for information security management | Atcelts |
| 29062 | ISO/IEC 9798-3:1998 | Information technology — Security techniques — Entity authentication — Part 3: Mechanisms using digital signature techniques | Atcelts |
Displaying 251-260 of 793 results.
