ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
42103 | ISO/IEC 27001:2005 | Information technology — Security techniques — Information security management systems — Requirements | Atcelts |
64267 | ISO/IEC 14888-3:2016 | Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms | Atcelts |
50482 | ISO/IEC 18014-2:2009 | Information technology — Security techniques — Time-stamping services — Part 2: Mechanisms producing independent tokens | Atcelts |
39733 | ISO/IEC TR 15443-1:2005 | Information technology — Security techniques — A framework for IT security assurance — Part 1: Overview and framework | Atcelts |
56552 | ISO/IEC 29192-2:2012 | Information technology — Security techniques — Lightweight cryptography — Part 2: Block ciphers | Atcelts |
44715 | ISO/IEC TR 15446:2009 | Information technology — Security techniques — Guide for the production of Protection Profiles and Security Targets | Atcelts |
54528 | ISO/IEC 18033-1:2005/Amd 1:2011 | Information technology — Security techniques — Encryption algorithms — Part 1: General — Amendment 1 | Atcelts |
31142 | ISO/IEC TR 13335-5:2001 | Information technology — Guidelines for the management of IT Security — Part 5: Management guidance on network security | Atcelts |
34386 | ISO/IEC 18014-1:2002 | Information technology — Security techniques — Time-stamping services — Part 1: Framework | Atcelts |
40613 | ISO/IEC 15408-2:2005 | Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional requirements | Atcelts |
Displaying 271-280 of 774 results.