ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
42508 | ISO/IEC 27009:2016 | Information technology — Security techniques — Sector-specific application of ISO/IEC 27001 — Requirements | Atcelts |
27634 | ISO/IEC 15408-3:1999 | Information technology Security techniques Evaluation criteria for IT security | Atcelts |
28107 | ISO/IEC 9979:1999 | Information technology — Security techniques — Procedures for the registration of cryptographic algorithms | Atcelts |
21755 | ISO/IEC TR 13335-2:1997 | Information technology — Guidelines for the management of IT Security — Part 2: Managing and planning IT Security | Atcelts |
50341 | ISO/IEC 15408-1:2009 | Information technology Security techniques Evaluation criteria for IT security | Atcelts |
44753 | ISO/IEC 9796-2:2002/Amd 1:2008 | Information technology — Security techniques — Digital signature schemes giving message recovery — Part 2: Integer factorization based mechanisms — Amendment 1 | Atcelts |
21733 | ISO/IEC TR 13335-1:1996 | Information technology — Guidelines for the management of IT Security — Part 1: Concepts and models for IT Security | Atcelts |
59142 | ISO/IEC 24759:2014 | Information technology — Security techniques — Test requirements for cryptographic modules | Atcelts |
63411 | ISO/IEC 27000:2014 | Information technology Security techniques Information security management systems Overview and vocabulary | Atcelts |
56552 | ISO/IEC 29192-2:2012 | Information technology — Security techniques — Lightweight cryptography — Part 2: Block ciphers | Atcelts |
Displaying 311-320 of 770 results.