Registration number (WIID)Project No.TitleStatus
66806ISO/IEC 27002:2013/Cor 1:2014Information technology — Security techniques — Code of practice for information security controls — Technical Corrigendum 1Atcelts
56551ISO/IEC 14888-3:2006/Amd 2:2012Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms — Amendment 2: Optimizing hash inputsAtcelts
53474ISO/IEC 11770-3:2008/Cor 1:2009Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques — Technical Corrigendum 1Atcelts
56890ISO/IEC TS 30104:2015Information Technology — Security Techniques — Physical Security Attacks, Mitigation Techniques and Security RequirementsAtcelts
65459ISO/IEC TS 19608:2018Guidance for developing security and privacy functional requirements based on ISO/IEC 15408Atcelts
65421ISO/IEC 19772:2009/Cor 1:2014Information technology — Security techniques — Authenticated encryption — Technical Corrigendum 1Atcelts
64143ISO/IEC 27011:2016Information technology — Security techniques — Code of practice for Information security controls based on ISO/IEC 27002 for telecommunications organizationsAtcelts
70331ISO/IEC 29184:2020Information technology — Online privacy notices and consentAtcelts
45169ISO/IEC 29146:2016Information technology — Security techniques — A framework for access managementAtcelts
68091ISO/IEC 27019:2017Information technology — Security techniques — Information security controls for the energy utility industryAtcelts
Displaying 311-320 of 770 results.