ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
41532 | ISO/IEC 24762:2008 | Information technology — Security techniques — Guidelines for information and communications technology disaster recovery services | Atcelts |
23231 | ISO/IEC 13888-3:1997 | Information technology — Security techniques — Non-repudiation — Part 3: Mechanisms using asymmetric techniques | Atcelts |
51024 | ISO/IEC 18033-4:2005/Amd 1:2009 | Information technology — Security techniques — Encryption algorithms — Part 4: Stream ciphers — Amendment 1: Rabbit and Decim | Atcelts |
46345 | ISO/IEC 19772:2009 | Information technology — Security techniques — Authenticated encryption | Atcelts |
53613 | ISO/IEC 14888-3:2006/Amd 1:2010 | Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms — Amendment 1: Elliptic Curve Russian Digital Signature Algorithm, Schnorr Digital Signature Algorithm, Elliptic Curve Schnorr Digital Signature Algorithm, and Elliptic Curve Full Schnorr Digital Signature Algorithm | Atcelts |
72515 | ISO/IEC 24759:2017 | Information technology — Security techniques — Test requirements for cryptographic modules | Atcelts |
37970 | ISO/IEC 18033-1:2005 | Information technology — Security techniques — Encryption algorithms — Part 1: General | Atcelts |
73722 | ISO/IEC 29100:2011/Amd 1:2018 | Information technology — Security techniques — Privacy framework — Amendment 1: Clarifications | Atcelts |
42509 | ISO/IEC 27010:2012 | Information technology — Security techniques — Information security management for inter-sector and inter-organizational communications | Atcelts |
46413 | ISO/IEC 15408-3:2008 | Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance components | Atcelts |
Displaying 301-310 of 770 results.