ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
66806 | ISO/IEC 27002:2013/Cor 1:2014 | Information technology — Security techniques — Code of practice for information security controls — Technical Corrigendum 1 | Atcelts |
56551 | ISO/IEC 14888-3:2006/Amd 2:2012 | Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms — Amendment 2: Optimizing hash inputs | Atcelts |
53474 | ISO/IEC 11770-3:2008/Cor 1:2009 | Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques — Technical Corrigendum 1 | Atcelts |
56890 | ISO/IEC TS 30104:2015 | Information Technology — Security Techniques — Physical Security Attacks, Mitigation Techniques and Security Requirements | Atcelts |
65459 | ISO/IEC TS 19608:2018 | Guidance for developing security and privacy functional requirements based on ISO/IEC 15408 | Atcelts |
65421 | ISO/IEC 19772:2009/Cor 1:2014 | Information technology — Security techniques — Authenticated encryption — Technical Corrigendum 1 | Atcelts |
64143 | ISO/IEC 27011:2016 | Information technology — Security techniques — Code of practice for Information security controls based on ISO/IEC 27002 for telecommunications organizations | Atcelts |
70331 | ISO/IEC 29184:2020 | Information technology — Online privacy notices and consent | Atcelts |
45169 | ISO/IEC 29146:2016 | Information technology — Security techniques — A framework for access management | Atcelts |
68091 | ISO/IEC 27019:2017 | Information technology — Security techniques — Information security controls for the energy utility industry | Atcelts |
Displaying 311-320 of 770 results.