Registration number (WIID)Project No.TitleStatus
85851ISO/IEC DIS 29128-3Information security, cybersecurity and privacy protection — Verification of cryptographic protocols — Part 3: Evaluation methods and activities for protocol implementation verificationAptauja
87639ISO/IEC DIS 28033-2Information security — Fully homomorphic encryption — Part 2: Mechanisms for exact arithmetic on modular integersAptauja
87640ISO/IEC DIS 28033-3Information security — Fully homomorphic encryption — Part 3: Mechanisms for arithmetic on approximate numbersAptauja
72437ISO/IEC TR 27103:2018Information technology — Security techniques — Cybersecurity and ISO and IEC StandardsAtcelts
76559ISO/IEC 27018:2019Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processorsAtcelts
44884ISO/IEC 10118-2:2000/Cor 1:2006Information technology — Security techniques — Hash-functions — Part 2: Hash-functions using an n-bit block cipher — Technical Corrigendum 1Atcelts
39066ISO/IEC 13335-1:2004Information technology — Security techniques — Management of information and communications technology security — Part 1: Concepts and models for information and communications technology security managementAtcelts
30830ISO/IEC 18045:2005Information technology — Security techniques — Methodology for IT security evaluationAtcelts
39612ISO/IEC 17799:2005Information technology — Security techniques — Code of practice for information security managementAtcelts
29062ISO/IEC 9798-3:1998Information technology — Security techniques — Entity authentication — Part 3: Mechanisms using digital signature techniquesAtcelts
Displaying 251-260 of 793 results.