Registration number (WIID)Project No.TitleStatus
56581ISO/IEC DIS 27090Cybersecurity — Artificial Intelligence — Guidance for addressing security threats to artificial intelligence systemsAptauja
86890ISO/IEC 18033-2:2006/DAmd 2Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers — Amendment 2Aptauja
86889ISO/IEC 29192-1:2012/DAmd 1Information technology — Security techniques — Lightweight cryptography — Part 1: General — Amendment 1Aptauja
25898ISO/IEC 9798-5:1999Information technology — Security techniques — Entity authentication — Part 5: Mechanisms using zero knowledge techniquesAtcelts
44715ISO/IEC TR 15446:2009Information technology — Security techniques — Guide for the production of Protection Profiles and Security TargetsAtcelts
33929ISO/IEC TR 19791:2006Information technology — Security techniques — Security assessment of operational systemsAtcelts
44884ISO/IEC 10118-2:2000/Cor 1:2006Information technology — Security techniques — Hash-functions — Part 2: Hash-functions using an n-bit block cipher — Technical Corrigendum 1Atcelts
30830ISO/IEC 18045:2005Information technology — Security techniques — Methodology for IT security evaluationAtcelts
29580ISO/IEC TR 15947:2002Information technology — Security techniques — IT intrusion detection frameworkAtcelts
39612ISO/IEC 17799:2005Information technology — Security techniques — Code of practice for information security managementAtcelts
Displaying 251-260 of 770 results.