Registration number (WIID)Project No.TitleStatus
73721ISO/IEC 19989-3:2020Information security — Criteria and methodology for security evaluation of biometric systems — Part 3: Presentation attack detectionAtcelts
64143ISO/IEC 27011:2016Information technology — Security techniques — Code of practice for Information security controls based on ISO/IEC 27002 for telecommunications organizationsAtcelts
65421ISO/IEC 19772:2009/Cor 1:2014Information technology — Security techniques — Authenticated encryption — Technical Corrigendum 1Atcelts
45169ISO/IEC 29146:2016Information technology — Security techniques — A framework for access managementAtcelts
39066ISO/IEC 13335-1:2004Information technology — Security techniques — Management of information and communications technology security — Part 1: Concepts and models for information and communications technology security managementAtcelts
46541ISO/IEC 15946-5:2009Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 5: Elliptic curve generationAtcelts
60803ISO/IEC 27035-1:2016Information technology — Security techniques — Information security incident management — Part 1: Principles of incident managementAtcelts
63411ISO/IEC 27000:2014Information technology Security techniques Information security management systems Overview and vocabularyAtcelts
71165ISO/IEC 11770-3:2015/Cor 1:2016Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques — Technical Corrigendum 1Atcelts
53469ISO/IEC 9798-2:2008/Cor 1:2010Information technology — Security techniques — Entity authentication — Part 2: Mechanisms using symmetric encipherment algorithms — Technical Corrigendum 1Atcelts
Displaying 281-290 of 793 results.