Registration number (WIID)Project No.TitleStatus
71517ISO/IEC 11770-3:2015/NP Amd 2Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques — Amendment 2Izstrādē
71291ISO/IEC CD 9798-5Information technology — Security techniques — Entity authentication — Part 5: Mechanisms using zero-knowledge techniquesIzstrādē
71290ISO/IEC NP 18032Information technology Security techniques Prime number generationIzstrādē
71278ISO/IEC 20547-4:2020Information technology — Big data reference architecture — Part 4: Security and privacyAtcelts
71165ISO/IEC 11770-3:2015/Cor 1:2016Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques — Technical Corrigendum 1Atcelts
71163ISO/IEC 24761:2019Information technology — Security techniques — Authentication context for biometricsStandarts spēkā
71122ISO/IEC 19896-3:2018IT security techniques — Competence requirements for information security testers and evaluators — Part 3: Knowledge, skills and effectiveness requirements for ISO/IEC 15408 evaluatorsAtcelts
71121ISO/IEC 19896-2:2018IT security techniques — Competence requirements for information security testers and evaluators — Part 2: Knowledge, skills and effectiveness requirements for ISO/IEC 19790 testersAtcelts
71120ISO/IEC 19896-1:2018IT security techniques — Competence requirements for information security testers and evaluators — Part 1: Introduction, concepts and general requirementsAtcelts
71116ISO/IEC 29192-6:2019Information technology — Lightweight cryptography — Part 6: Message authentication codes (MACs)Standarts spēkā
Displaying 311-320 of 793 results.