Registration number (WIID)Project No.TitleStatus
40613ISO/IEC 15408-2:2005Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional requirementsAtcelts
64267ISO/IEC 14888-3:2016Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanismsAtcelts
34930ISO/IEC 15946-4:2004Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 4: Digital signatures giving message recoveryAtcelts
19687ISO/IEC 11770-1:1996Information technology — Security techniques — Key management — Part 1: FrameworkAtcelts
21756ISO/IEC TR 13335-3:1998Information technology — Guidelines for the management of IT Security — Part 3: Techniques for the management of IT SecurityAtcelts
64138ISO/IEC 27013:2015Information technology — Security techniques — Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1Atcelts
52202ISO/IEC 15946-1:2008/Cor 1:2009Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 1: General — Technical Corrigendum 1Atcelts
34387ISO/IEC 18014-2:2002Information technology — Security techniques — Time-stamping services — Part 2: Mechanisms producing independent tokensAtcelts
39978ISO/IEC 18033-4:2005Information technology — Security techniques — Encryption algorithms — Part 4: Stream ciphersAtcelts
27632ISO/IEC 15408-1:1999Information technology Security techniques Evaluation criteria for IT securityAtcelts
Displaying 281-290 of 807 results.