ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
88134 | ISO/IEC DIS 15408-1 | Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 1: Introduction and general model | Izstrādē |
26157 | ISO/IEC DIS 14980 | Information technology — Code of practice for information security management | Izstrādē |
87940 | ISO/IEC DIS 11770-8 | Information security — Key management — Part 8: Password-based key derivation | Izstrādē |
71525 | ISO/IEC DIS 10118-2 | Information technology — Security techniques — Hash-functions — Part 2: Hash-functions using an n-bit block cipher | Izstrādē |
84242 | ISO/IEC CD TS 27008.3 | Information technology — Security techniques — Guidelines for the assessment of information security controls | Izstrādē |
61008 | ISO/IEC CD TR 27029 | additional document for ISO/IEC 27002 and ISO and IEC standards | Izstrādē |
91721 | ISO/IEC CD TR 22216 | Information security, cybersecurity and privacy protection — New concepts and changes in ISO/IEC 15408:2022 and ISO/IEC 18045:2022 | Izstrādē |
71291 | ISO/IEC CD 9798-5 | Information technology — Security techniques — Entity authentication — Part 5: Mechanisms using zero-knowledge techniques | Izstrādē |
87557 | ISO/IEC CD 4922-3 | Information security — Secure multiparty computation — Part 3: Part 3: Mechanisms based on garbled circuits | Izstrādē |
85851 | ISO/IEC CD 29128-3 | Information security, cybersecurity and privacy protection — Verification of cryptographic protocols — Part 3: Evaluation Methods and Activities for Protocol Implementation Verification | Izstrādē |
Displaying 271-280 of 774 results.