Registration number (WIID)Project No.TitleStatus
44753ISO/IEC 9796-2:2002/Amd 1:2008Information technology — Security techniques — Digital signature schemes giving message recovery — Part 2: Integer factorization based mechanisms — Amendment 1Atcelts
46542ISO/IEC 11770-3:2008Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniquesAtcelts
63411ISO/IEC 27000:2014Information technology Security techniques Information security management systems Overview and vocabularyAtcelts
63411ISO/IEC 27000:2014Information technology — Security techniques — Information security management systems — Overview and vocabularyAtcelts
54530ISO/IEC 18033-1:2015Information technology — Security techniques — Encryption algorithms — Part 1: GeneralAtcelts
31076ISO/IEC 15946-2:2002Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 2: Digital signaturesAtcelts
43753ISO/IEC 27013:2012Information technology Security techniques Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1Atcelts
34388ISO/IEC 18014-3:2004Information technology — Security techniques — Time-stamping services — Part 3: Mechanisms producing linked tokensAtcelts
39984ISO/IEC 9798-2:1999/Cor 1:2004Information technology — Security techniques — Entity authentication — Part 2: Mechanisms using symmetric encipherment algorithms — Technical Corrigendum 1Atcelts
50482ISO/IEC 18014-2:2009Information technology — Security techniques — Time-stamping services — Part 2: Mechanisms producing independent tokensAtcelts
Displaying 311-320 of 807 results.