ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 46447 | ISO/IEC 18033-3:2005/Cor 2:2007 | Information technology — Security techniques — Encryption algorithms — Part 3: Block ciphers — Technical Corrigendum 2 | Atcelts |
| 45151 | ISO/IEC 29128:2011 | Information technology — Security techniques — Verification of cryptographic protocols | Atcelts |
| 30830 | ISO/IEC 18045:2005 | Information technology — Security techniques — Methodology for IT security evaluation | Atcelts |
| 53472 | ISO/IEC 9798-6:2005/Cor 1:2009 | Information technology — Security techniques — Entity authentication — Part 6: Mechanisms using manual data transfer — Technical Corrigendum 1 | Atcelts |
| 42506 | ISO/IEC 27007:2011 | Information technology — Security techniques — Guidelines for information security management systems auditing | Atcelts |
| 72515 | ISO/IEC 24759:2017 | Information technology — Security techniques — Test requirements for cryptographic modules | Atcelts |
| 69379 | ISO/IEC 27002:2013/Cor 2:2015 | Information technology — Security techniques — Code of practice for information security controls — Technical Corrigendum 2 | Atcelts |
| 37970 | ISO/IEC 18033-1:2005 | Information technology — Security techniques — Encryption algorithms — Part 1: General | Atcelts |
| 29240 | ISO/IEC TR 13335-4:2000 | Information technology — Guidelines for the management of IT Security — Part 4: Selection of safeguards | Atcelts |
| 46414 | ISO/IEC 15408-2:2008 | Information technology Security techniques Evaluation criteria for IT security | Atcelts |
Displaying 271-280 of 791 results.
