ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
25996 | ISO/IEC 14888-3:1998 | Information technology — Security techniques — Digital signatures with appendix — Part 3: Certificate-based mechanisms | Atcelts |
24273 | ISO/IEC 9798-4:1995 | Information technology — Security techniques — Entity authentication — Part 4: Mechanisms using a cryptographic check function | Atcelts |
63755 | ISO/IEC 18031:2011/Amd 1:2017 | Information technology — Security techniques — Random bit generation — Amendment 1: Deterministic random bit generation | Atcelts |
59648 | ISO/IEC 27036-1:2014 | Information technology — Security techniques — Information security for supplier relationships — Part 1: Overview and concepts | Atcelts |
45244 | ISO/IEC TR 27008:2011 | Information technology — Security techniques — Guidelines for auditors on information security controls | Atcelts |
44375 | ISO/IEC 27032:2012 | Information technology — Security techniques — Guidelines for cybersecurity | Atcelts |
73722 | ISO/IEC 29100:2011/Amd 1:2018 | Information technology — Security techniques — Privacy framework — Amendment 1: Clarifications | Atcelts |
51024 | ISO/IEC 18033-4:2005/Amd 1:2009 | Information technology — Security techniques — Encryption algorithms — Part 4: Stream ciphers — Amendment 1: Rabbit and Decim | Atcelts |
46345 | ISO/IEC 19772:2009 | Information technology — Security techniques — Authenticated encryption | Atcelts |
72515 | ISO/IEC 24759:2017 | Information technology — Security techniques — Test requirements for cryptographic modules | Atcelts |
Displaying 281-290 of 770 results.