ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
56581 | ISO/IEC DIS 27090 | Cybersecurity — Artificial Intelligence — Guidance for addressing security threats to artificial intelligence systems | Aptauja |
86890 | ISO/IEC 18033-2:2006/DAmd 2 | Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers — Amendment 2 | Aptauja |
86889 | ISO/IEC 29192-1:2012/DAmd 1 | Information technology — Security techniques — Lightweight cryptography — Part 1: General — Amendment 1 | Aptauja |
25898 | ISO/IEC 9798-5:1999 | Information technology — Security techniques — Entity authentication — Part 5: Mechanisms using zero knowledge techniques | Atcelts |
44715 | ISO/IEC TR 15446:2009 | Information technology — Security techniques — Guide for the production of Protection Profiles and Security Targets | Atcelts |
33929 | ISO/IEC TR 19791:2006 | Information technology — Security techniques — Security assessment of operational systems | Atcelts |
44884 | ISO/IEC 10118-2:2000/Cor 1:2006 | Information technology — Security techniques — Hash-functions — Part 2: Hash-functions using an n-bit block cipher — Technical Corrigendum 1 | Atcelts |
30830 | ISO/IEC 18045:2005 | Information technology — Security techniques — Methodology for IT security evaluation | Atcelts |
29580 | ISO/IEC TR 15947:2002 | Information technology — Security techniques — IT intrusion detection framework | Atcelts |
39612 | ISO/IEC 17799:2005 | Information technology — Security techniques — Code of practice for information security management | Atcelts |
Displaying 251-260 of 770 results.