Registration number (WIID)Project No.TitleStatus
41532ISO/IEC 24762:2008Information technology — Security techniques — Guidelines for information and communications technology disaster recovery servicesAtcelts
23231ISO/IEC 13888-3:1997Information technology — Security techniques — Non-repudiation — Part 3: Mechanisms using asymmetric techniquesAtcelts
51024ISO/IEC 18033-4:2005/Amd 1:2009Information technology — Security techniques — Encryption algorithms — Part 4: Stream ciphers — Amendment 1: Rabbit and DecimAtcelts
46345ISO/IEC 19772:2009Information technology — Security techniques — Authenticated encryptionAtcelts
53613ISO/IEC 14888-3:2006/Amd 1:2010Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms — Amendment 1: Elliptic Curve Russian Digital Signature Algorithm, Schnorr Digital Signature Algorithm, Elliptic Curve Schnorr Digital Signature Algorithm, and Elliptic Curve Full Schnorr Digital Signature AlgorithmAtcelts
72515ISO/IEC 24759:2017Information technology — Security techniques — Test requirements for cryptographic modulesAtcelts
37970ISO/IEC 18033-1:2005Information technology — Security techniques — Encryption algorithms — Part 1: GeneralAtcelts
73722ISO/IEC 29100:2011/Amd 1:2018Information technology — Security techniques — Privacy framework — Amendment 1: ClarificationsAtcelts
42509ISO/IEC 27010:2012Information technology — Security techniques — Information security management for inter-sector and inter-organizational communicationsAtcelts
46413ISO/IEC 15408-3:2008Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance componentsAtcelts
Displaying 301-310 of 770 results.