Registration number (WIID)Project No.TitleStatus
46414ISO/IEC 15408-2:2008Information technology Security techniques Evaluation criteria for IT securityAtcelts
62404ISO/IEC 24761:2009/Cor 1:2013Information technology — Security techniques — Authentication context for biometrics — Technical Corrigendum 1Atcelts
27634ISO/IEC 15408-3:1999Information technology Security techniques Evaluation criteria for IT securityAtcelts
43753ISO/IEC 27013:2012Information technology — Security techniques — Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1Atcelts
21733ISO/IEC TR 13335-1:1996Information technology — Guidelines for the management of IT Security — Part 1: Concepts and models for IT SecurityAtcelts
76154ISO/IEC 13888-3:2020Information security — Non-repudiation — Part 3: Mechanisms using asymmetric techniquesAtcelts
60366ISO/IEC 9798-3:1998/Cor 2:2012Information technology — Security techniques — Entity authentication — Part 3: Mechanisms using digital signature techniques — Technical Corrigendum 2Atcelts
63411ISO/IEC 27000:2014Information technology Security techniques Information security management systems Overview and vocabularyAtcelts
46542ISO/IEC 11770-3:2008Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniquesAtcelts
46412ISO/IEC 18045:2008Information technology — Security techniques — Methodology for IT security evaluationAtcelts
Displaying 311-320 of 791 results.