ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 44734 | ISO/IEC 15946-1:2008 | Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 1: General | Atcelts |
| 35396 | ISO/IEC TR 18044:2004 | Information technology — Security techniques — Information security incident management | Atcelts |
| 50476 | ISO/IEC 10116:2006/Cor 1:2008 | Information technology — Security techniques — Modes of operation for an n-bit block cipher — Technical Corrigendum 1 | Atcelts |
| 23229 | ISO/IEC 13888-1:1997 | Information technology — Security techniques — Non-repudiation — Part 1: General | Atcelts |
| 50522 | ISO/IEC 9798-2:2008 | Information technology — Security techniques — Entity authentication — Part 2: Mechanisms using symmetric encipherment algorithms | Atcelts |
| 25898 | ISO/IEC 9798-5:1999 | Information technology — Security techniques — Entity authentication — Part 5: Mechanisms using zero knowledge techniques | Atcelts |
| 64143 | ISO/IEC 27011:2016 | Information technology — Security techniques — Code of practice for Information security controls based on ISO/IEC 27002 for telecommunications organizations | Atcelts |
| 22053 | ISO/IEC 9797:1994 | Information technology — Security techniques — Data integrity mechanism using a cryptographic check function employing a block cipher algorithm | Atcelts |
| 50432 | ISO/IEC 13888-1:2009 | Information technology — Security techniques — Non-repudiation — Part 1: General | Atcelts |
| 45170 | ISO/IEC 29147:2014 | Information technology — Security techniques — Vulnerability disclosure | Atcelts |
Displaying 301-310 of 791 results.
