ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
92416 | ISO/IEC AWI 27007 | Information security, cybersecurity and privacy protection — Guidelines for information security management systems auditing | Izstrādē |
92016 | ISO/IEC AWI 14888-6 | Information technology — Security techniques — Digital signatures with appendix — Part 6: Part 6: Stateless hash-based mechanisms | Izstrādē |
28107 | ISO/IEC 9979:1999 | Information technology — Security techniques — Procedures for the registration of cryptographic algorithms | Atcelts |
17887 | ISO/IEC 9979:1991 | Data cryptographic techniques — Procedures for the registration of cryptographic algorithms | Atcelts |
54529 | ISO/IEC 9798-6:2010 | Information technology — Security techniques — Entity authentication — Part 6: Mechanisms using manual data transfer | Standarts spēkā |
53472 | ISO/IEC 9798-6:2005/Cor 1:2009 | Information technology — Security techniques — Entity authentication — Part 6: Mechanisms using manual data transfer — Technical Corrigendum 1 | Atcelts |
39721 | ISO/IEC 9798-6:2005 | Information technology — Security techniques — Entity authentication — Part 6: Mechanisms using manual data transfer | Atcelts |
50456 | ISO/IEC 9798-5:2009 | Information technology — Security techniques — Entity authentication — Part 5: Mechanisms using zero-knowledge techniques | Standarts spēkā |
39720 | ISO/IEC 9798-5:2004 | Information technology — Security techniques — Entity authentication — Part 5: Mechanisms using zero-knowledge techniques | Atcelts |
25898 | ISO/IEC 9798-5:1999 | Information technology — Security techniques — Entity authentication — Part 5: Mechanisms using zero knowledge techniques | Atcelts |
Displaying 301-310 of 774 results.