Registration number (WIID)Project No.TitleStatus
42103ISO/IEC 27001:2005Information technology — Security techniques — Information security management systems — RequirementsAtcelts
64267ISO/IEC 14888-3:2016Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanismsAtcelts
50482ISO/IEC 18014-2:2009Information technology — Security techniques — Time-stamping services — Part 2: Mechanisms producing independent tokensAtcelts
39733ISO/IEC TR 15443-1:2005Information technology — Security techniques — A framework for IT security assurance — Part 1: Overview and frameworkAtcelts
56552ISO/IEC 29192-2:2012Information technology — Security techniques — Lightweight cryptography — Part 2: Block ciphersAtcelts
44715ISO/IEC TR 15446:2009Information technology — Security techniques — Guide for the production of Protection Profiles and Security TargetsAtcelts
54528ISO/IEC 18033-1:2005/Amd 1:2011Information technology — Security techniques — Encryption algorithms — Part 1: General — Amendment 1Atcelts
31142ISO/IEC TR 13335-5:2001Information technology — Guidelines for the management of IT Security — Part 5: Management guidance on network securityAtcelts
34386ISO/IEC 18014-1:2002Information technology — Security techniques — Time-stamping services — Part 1: FrameworkAtcelts
40613ISO/IEC 15408-2:2005Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional requirementsAtcelts
Displaying 271-280 of 774 results.