Registration number (WIID)Project No.TitleStatus
25996ISO/IEC 14888-3:1998Information technology — Security techniques — Digital signatures with appendix — Part 3: Certificate-based mechanismsAtcelts
24273ISO/IEC 9798-4:1995Information technology — Security techniques — Entity authentication — Part 4: Mechanisms using a cryptographic check functionAtcelts
63755ISO/IEC 18031:2011/Amd 1:2017Information technology — Security techniques — Random bit generation — Amendment 1: Deterministic random bit generationAtcelts
59648ISO/IEC 27036-1:2014Information technology — Security techniques — Information security for supplier relationships — Part 1: Overview and conceptsAtcelts
45244ISO/IEC TR 27008:2011Information technology — Security techniques — Guidelines for auditors on information security controlsAtcelts
44375ISO/IEC 27032:2012Information technology — Security techniques — Guidelines for cybersecurityAtcelts
73722ISO/IEC 29100:2011/Amd 1:2018Information technology — Security techniques — Privacy framework — Amendment 1: ClarificationsAtcelts
51024ISO/IEC 18033-4:2005/Amd 1:2009Information technology — Security techniques — Encryption algorithms — Part 4: Stream ciphers — Amendment 1: Rabbit and DecimAtcelts
46345ISO/IEC 19772:2009Information technology — Security techniques — Authenticated encryptionAtcelts
72515ISO/IEC 24759:2017Information technology — Security techniques — Test requirements for cryptographic modulesAtcelts
Displaying 281-290 of 770 results.