Registration number (WIID)Project No.TitleStatus
42508ISO/IEC 27009:2016Information technology — Security techniques — Sector-specific application of ISO/IEC 27001 — RequirementsAtcelts
27634ISO/IEC 15408-3:1999Information technology Security techniques Evaluation criteria for IT securityAtcelts
28107ISO/IEC 9979:1999Information technology — Security techniques — Procedures for the registration of cryptographic algorithmsAtcelts
21755ISO/IEC TR 13335-2:1997Information technology — Guidelines for the management of IT Security — Part 2: Managing and planning IT SecurityAtcelts
50341ISO/IEC 15408-1:2009Information technology Security techniques Evaluation criteria for IT securityAtcelts
44753ISO/IEC 9796-2:2002/Amd 1:2008Information technology — Security techniques — Digital signature schemes giving message recovery — Part 2: Integer factorization based mechanisms — Amendment 1Atcelts
21733ISO/IEC TR 13335-1:1996Information technology — Guidelines for the management of IT Security — Part 1: Concepts and models for IT SecurityAtcelts
59142ISO/IEC 24759:2014Information technology — Security techniques — Test requirements for cryptographic modulesAtcelts
63411ISO/IEC 27000:2014Information technology Security techniques Information security management systems Overview and vocabularyAtcelts
56552ISO/IEC 29192-2:2012Information technology — Security techniques — Lightweight cryptography — Part 2: Block ciphersAtcelts
Displaying 311-320 of 770 results.