ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
29579 | ISO/IEC WD 15946 | Cryptographic techniques based on elliptic curves | Izstrādē |
38852 | ISO/IEC NP 24742 | Information technology — Information security management metrics and measurements | Izstrādē |
60030 | ISO/IEC NP 17548 | Information technology — Security techniques — Guidance on assuring suitability and adequacy of investigation methods | Izstrādē |
66776 | ISO/IEC NP 19974 | Competence requirements for information security testers and evaluators | Izstrādē |
67001 | ISO/IEC NP 20085 | Test tool requirements and test tool calibration methods for use in testing non-invasive attack mitigation techniques in cryptographic modules | Izstrādē |
66801 | ISO/IEC NP 19989 | Information technology — Security techniques — Criteria and methodology for security evaluation of biometric systems | Izstrādē |
42106 | ISO/IEC 27004:2009 | Information technology Security techniques Information security management Measurement | Atcelts |
31487 | ISO/IEC 10118-2:2000 | Information technology — Security techniques — Hash-functions — Part 2: Hash-functions using an n-bit block cipher | Atcelts |
40008 | ISO/IEC 18028-1:2006 | Information technology Security techniques IT network security | Atcelts |
17659 | ISO/IEC 9797:1989 | Data cryptographic techniques — Data integrity mechanism using a cryptographic check function employing a block cipher algorithm | Atcelts |
Displaying 261-270 of 774 results.