Registration number (WIID)Project No.TitleStatus
44734ISO/IEC 15946-1:2008Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 1: GeneralAtcelts
60237ISO/IEC 11770-3:2015Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniquesAtcelts
35396ISO/IEC TR 18044:2004Information technology — Security techniques — Information security incident managementAtcelts
45170ISO/IEC 29147:2014Information technology — Security techniques — Vulnerability disclosureAtcelts
53472ISO/IEC 9798-6:2005/Cor 1:2009Information technology — Security techniques — Entity authentication — Part 6: Mechanisms using manual data transfer — Technical Corrigendum 1Atcelts
73907ISO/IEC 27009:2020Information security, cybersecurity and privacy protection — Sector-specific application of ISO/IEC 27001 — RequirementsAtcelts
45151ISO/IEC 29128:2011Information technology — Security techniques — Verification of cryptographic protocolsAtcelts
41531ISO/IEC 24761:2009Information technology — Security techniques — Authentication context for biometricsAtcelts
29240ISO/IEC TR 13335-4:2000Information technology — Guidelines for the management of IT Security — Part 4: Selection of safeguardsAtcelts
25898ISO/IEC 9798-5:1999Information technology — Security techniques — Entity authentication — Part 5: Mechanisms using zero knowledge techniquesAtcelts
Displaying 301-310 of 770 results.