ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
24273 | ISO/IEC 9798-4:1995 | Information technology — Security techniques — Entity authentication — Part 4: Mechanisms using a cryptographic check function | Atcelts |
42505 | ISO/IEC 27006:2007 | Information technology — Security techniques — Requirements for bodies providing audit and certification of information security management systems | Atcelts |
50476 | ISO/IEC 10116:2006/Cor 1:2008 | Information technology — Security techniques — Modes of operation for an n-bit block cipher — Technical Corrigendum 1 | Atcelts |
35394 | ISO/IEC 18043:2006 | Information technology — Security techniques — Selection, deployment and operations of intrusion detection systems | Atcelts |
44374 | ISO/IEC 27031:2011 | Information technology — Security techniques — Guidelines for information and communication technology readiness for business continuity | Atcelts |
53474 | ISO/IEC 11770-3:2008/Cor 1:2009 | Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques — Technical Corrigendum 1 | Atcelts |
40011 | ISO/IEC 18028-4:2005 | Information technology — Security techniques — IT network security — Part 4: Securing remote access | Atcelts |
23229 | ISO/IEC 13888-1:1997 | Information technology — Security techniques — Non-repudiation — Part 1: General | Atcelts |
60365 | ISO/IEC 9798-2:2008/Cor 2:2012 | Information technology — Security techniques — Entity authentication — Part 2: Mechanisms using symmetric encipherment algorithms — Technical Corrigendum 2 | Atcelts |
27634 | ISO/IEC 15408-3:1999 | Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance requirements | Atcelts |
Displaying 311-320 of 774 results.