Registration number (WIID)Project No.TitleStatus
34387ISO/IEC 18014-2:2002Information technology — Security techniques — Time-stamping services — Part 2: Mechanisms producing independent tokensAtcelts
27743ISO/IEC 9798-1:1997Information technology — Security techniques — Entity authentication — Part 1: GeneralAtcelts
62399ISO/IEC 9798-2:2008/Cor 3:2013Information technology — Security techniques — Entity authentication — Part 2: Mechanisms using symmetric encipherment algorithms — Technical Corrigendum 3Atcelts
15530ISO 8372:1987Information processing — Modes of operation for a 64-bit block cipher algorithmAtcelts
46370ISO/IEC 11770-2:2008Information technology — Security techniques — Key management — Part 2: Mechanisms using symmetric techniquesAtcelts
50482ISO/IEC 18014-2:2009Information technology — Security techniques — Time-stamping services — Part 2: Mechanisms producing independent tokensAtcelts
46413ISO/IEC 15408-3:2008Information technology Security techniques Evaluation criteria for IT securityAtcelts
42103ISO/IEC 27001:2005Information technology Security techniques Information security management systems RequirementsAtcelts
46447ISO/IEC 18033-3:2005/Cor 2:2007Information technology — Security techniques — Encryption algorithms — Part 3: Block ciphers — Technical Corrigendum 2Atcelts
39876ISO/IEC 10118-3:2004Information technology — Security techniques — Hash-functions — Part 3: Dedicated hash-functionsAtcelts
Displaying 291-300 of 774 results.