ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 87557 | ISO/IEC DIS 4922-3 | Information security — Secure multiparty computation — Part 3: Mechanisms based on garbled circuits | Izstrādē |
| 85851 | ISO/IEC DIS 29128-3 | Information security, cybersecurity and privacy protection — Verification of cryptographic protocols — Part 3: Evaluation methods and activities for protocol implementation verification | Aptauja |
| 85850 | ISO/IEC DIS 29128-2 | Information security, cybersecurity and privacy protection — Verification of Cryptographic Protocols — Part 2: Evaluation Methods and Activities for Cryptographic Protocols | Aptauja slēgta |
| 87641 | ISO/IEC DIS 28033-4.2 | Information Security — Fully homomorphic encryption — Part 4: Mechanisms for arithmetic based on look-up table evaluation | Aptauja slēgta |
| 87640 | ISO/IEC DIS 28033-3 | Information security — Fully homomorphic encryption — Part 3: Mechanisms for arithmetic on approximate numbers | Aptauja |
| 87639 | ISO/IEC DIS 28033-2 | Information security — Fully homomorphic encryption — Part 2: Mechanisms for exact arithmetic on modular integers | Aptauja |
| 87638 | ISO/IEC DIS 28033-1 | Information security — Fully homomorphic encryption — Part 1: General | Aptauja slēgta |
| 56582 | ISO/IEC DIS 27091 | Cybersecurity and Privacy — Artificial Intelligence — Privacy protection | Aptauja slēgta |
| 56581 | ISO/IEC DIS 27090 | Cybersecurity — Artificial Intelligence — Guidance for addressing security threats and compromises to artificial intelligence systems | Aptauja slēgta |
| 88970 | ISO/IEC DIS 27045 | Information security, cybersecurity and privacy protection — Big data security and privacy — Guidelines for managing big data risks | Aptauja slēgta |
Displaying 261-270 of 793 results.
