ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 55578 | ISO/IEC NP 15443-2 | Information technology — Security techniques — A framework for IT security assurance — Part 2: Assurance methods | Izstrādē |
| 88147 | ISO/IEC CD 27566-3.2 | Information security, cybersecurity and privacy protection – Age assurance systems — Part 3: Approaches to analysis or comparison | Izstrādē |
| 91022 | ISO/IEC WD 28033-5 | Information security — Fully homomorphic encryption — Part 5: Mechanisms for scheme switching | Izstrādē |
| 86885 | ISO/IEC PWI 21867 | Modes of operations for tweakable ciphers | Izstrādē |
| 86890 | ISO/IEC 18033-2:2006/Amd 2 | Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers — Amendment 2 | Izstrādē |
| 19684 | ISO/IEC WD 11767 | Information technology security techniques — Collection and analysis of requirements for information technology security evaluation criteria | Izstrādē |
| 44377 | ISO/IEC NP 27033 | Information technology — IT Network security | Izstrādē |
| 70659 | ISO/IEC 27039:2015/CD Cor 1 | Information technology — Security techniques — Selection, deployment and operations of intrusion detection and prevention systems (IDPS) — Technical Corrigendum 1 | Izstrādē |
| 66671 | ISO/IEC NP TS 14516-2 | Information technology — Security techniques — Guidelines for the use and management of electronic trust service providers — Part 2: Guidelines on information security for CA trust service providers | Izstrādē |
| 60236 | ISO/IEC WD 24762 | Information technology — Security techniques — Guidelines for information and communications technology disaster recovery services | Izstrādē |
Displaying 261-270 of 807 results.
