ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
39721 | ISO/IEC 9798-6:2005 | Information technology — Security techniques — Entity authentication — Part 6: Mechanisms using manual data transfer | Atcelts |
57914 | ISO/IEC 24760-1:2011 | Information technology — Security techniques — A framework for identity management — Part 1: Terminology and concepts | Atcelts |
76153 | ISO/IEC 13888-1:2020 | Information security — Non-repudiation — Part 1: General | Atcelts |
44728 | ISO/IEC 18033-3:2005/Cor 1:2006 | Information technology — Security techniques — Encryption algorithms — Part 3: Block ciphers — Technical Corrigendum 1 | Atcelts |
60365 | ISO/IEC 9798-2:2008/Cor 2:2012 | Information technology — Security techniques — Entity authentication — Part 2: Mechanisms using symmetric encipherment algorithms — Technical Corrigendum 2 | Atcelts |
46414 | ISO/IEC 15408-2:2008 | Information technology Security techniques Evaluation criteria for IT security | Atcelts |
62404 | ISO/IEC 24761:2009/Cor 1:2013 | Information technology — Security techniques — Authentication context for biometrics — Technical Corrigendum 1 | Atcelts |
43753 | ISO/IEC 27013:2012 | Information technology — Security techniques — Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1 | Atcelts |
76487 | ISO/IEC 27011:2016/Cor 1:2018 | Information technology — Security techniques — Code of practice for Information security controls based on ISO/IEC 27002 for telecommunications organizations — Technical Corrigendum 1 | Atcelts |
46412 | ISO/IEC 18045:2008 | Information technology — Security techniques — Methodology for IT security evaluation | Atcelts |
Displaying 301-310 of 774 results.