ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
46447 | ISO/IEC 18033-3:2005/Cor 2:2007 | Information technology — Security techniques — Encryption algorithms — Part 3: Block ciphers — Technical Corrigendum 2 | Atcelts |
54528 | ISO/IEC 18033-1:2005/Amd 1:2011 | Information technology — Security techniques — Encryption algorithms — Part 1: General — Amendment 1 | Atcelts |
31142 | ISO/IEC TR 13335-5:2001 | Information technology — Guidelines for the management of IT Security — Part 5: Management guidance on network security | Atcelts |
34386 | ISO/IEC 18014-1:2002 | Information technology — Security techniques — Time-stamping services — Part 1: Framework | Atcelts |
40613 | ISO/IEC 15408-2:2005 | Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional requirements | Atcelts |
31143 | ISO/IEC 10118-1:2000 | Information technology — Security techniques — Hash-functions — Part 1: General | Atcelts |
77722 | ISO/IEC 27006:2015/Amd 1:2020 | Information technology — Security techniques — Requirements for bodies providing audit and certification of information security management systems — Amendment 1 | Atcelts |
19687 | ISO/IEC 11770-1:1996 | Information technology — Security techniques — Key management — Part 1: Framework | Atcelts |
34387 | ISO/IEC 18014-2:2002 | Information technology — Security techniques — Time-stamping services — Part 2: Mechanisms producing independent tokens | Atcelts |
27743 | ISO/IEC 9798-1:1997 | Information technology — Security techniques — Entity authentication — Part 1: General | Atcelts |
Displaying 281-290 of 774 results.