Registration number (WIID)Project No.TitleStatus
44734ISO/IEC 15946-1:2008Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 1: GeneralAtcelts
35396ISO/IEC TR 18044:2004Information technology — Security techniques — Information security incident managementAtcelts
50476ISO/IEC 10116:2006/Cor 1:2008Information technology — Security techniques — Modes of operation for an n-bit block cipher — Technical Corrigendum 1Atcelts
23229ISO/IEC 13888-1:1997Information technology — Security techniques — Non-repudiation — Part 1: GeneralAtcelts
50522ISO/IEC 9798-2:2008Information technology — Security techniques — Entity authentication — Part 2: Mechanisms using symmetric encipherment algorithmsAtcelts
25898ISO/IEC 9798-5:1999Information technology — Security techniques — Entity authentication — Part 5: Mechanisms using zero knowledge techniquesAtcelts
64143ISO/IEC 27011:2016Information technology — Security techniques — Code of practice for Information security controls based on ISO/IEC 27002 for telecommunications organizationsAtcelts
22053ISO/IEC 9797:1994Information technology — Security techniques — Data integrity mechanism using a cryptographic check function employing a block cipher algorithmAtcelts
50432ISO/IEC 13888-1:2009Information technology — Security techniques — Non-repudiation — Part 1: GeneralAtcelts
45170ISO/IEC 29147:2014Information technology — Security techniques — Vulnerability disclosureAtcelts
Displaying 301-310 of 791 results.