ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
44734 | ISO/IEC 15946-1:2008 | Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 1: General | Atcelts |
60237 | ISO/IEC 11770-3:2015 | Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques | Atcelts |
35396 | ISO/IEC TR 18044:2004 | Information technology — Security techniques — Information security incident management | Atcelts |
45170 | ISO/IEC 29147:2014 | Information technology — Security techniques — Vulnerability disclosure | Atcelts |
53472 | ISO/IEC 9798-6:2005/Cor 1:2009 | Information technology — Security techniques — Entity authentication — Part 6: Mechanisms using manual data transfer — Technical Corrigendum 1 | Atcelts |
73907 | ISO/IEC 27009:2020 | Information security, cybersecurity and privacy protection — Sector-specific application of ISO/IEC 27001 — Requirements | Atcelts |
45151 | ISO/IEC 29128:2011 | Information technology — Security techniques — Verification of cryptographic protocols | Atcelts |
41531 | ISO/IEC 24761:2009 | Information technology — Security techniques — Authentication context for biometrics | Atcelts |
29240 | ISO/IEC TR 13335-4:2000 | Information technology — Guidelines for the management of IT Security — Part 4: Selection of safeguards | Atcelts |
25898 | ISO/IEC 9798-5:1999 | Information technology — Security techniques — Entity authentication — Part 5: Mechanisms using zero knowledge techniques | Atcelts |
Displaying 301-310 of 770 results.