ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 94229 | ISO/IEC PWI 26688 | Application Security Market Analysis | Izstrādē |
| 91718 | ISO/IEC 14888-2:2008/CD Amd 1 | Information technology — Security techniques — Digital signatures with appendix — Part 2: Integer factorization based mechanisms — Amendment 1 | Izstrādē |
| 94280 | ISO/IEC NP 26707 | Security Evaluation Standard for IoT Platforms (SESIP). An effective methodology for applying cybersecurity assessment and re-use for connected products. | Izstrādē |
| 19685 | ISO/IEC WD 11768-3 | Information technology security techniques — Evaluation criteria for information technology security — Part 3: Assurance of IT systems | Izstrādē |
| 94248 | ISO/IEC AWI 20897-1 | Information security, cybersecurity and privacy protection — Physically unclonable functions — Part 1: Security requirements | Izstrādē |
| 84244 | ISO/IEC PWI 13025 | Inclusion of arithmetization-friendly cryptographic algorithms in ISO/IEC standards | Izstrādē |
| 94249 | ISO/IEC AWI 20897-2 | Information security, cybersecurity and privacy protection — Physically unclonable functions — Part 2: Test and evaluation methods | Izstrādē |
| 82887 | ISO/IEC PWI 27045 | Cybersecurity — Big data security and privacy — Guidelines for managing big data risks | Izstrādē |
| 89515 | ISO/IEC PWI 25236 | Security notion of FHE | Izstrādē |
| 27743 | ISO/IEC 9798-1:1997 | Information technology — Security techniques — Entity authentication — Part 1: General | Atcelts |
Displaying 271-280 of 807 results.
