ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 71517 | ISO/IEC 11770-3:2015/NP Amd 2 | Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques — Amendment 2 | Izstrādē |
| 71291 | ISO/IEC CD 9798-5 | Information technology — Security techniques — Entity authentication — Part 5: Mechanisms using zero-knowledge techniques | Izstrādē |
| 71290 | ISO/IEC NP 18032 | Information technology Security techniques Prime number generation | Izstrādē |
| 71278 | ISO/IEC 20547-4:2020 | Information technology — Big data reference architecture — Part 4: Security and privacy | Atcelts |
| 71165 | ISO/IEC 11770-3:2015/Cor 1:2016 | Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques — Technical Corrigendum 1 | Atcelts |
| 71163 | ISO/IEC 24761:2019 | Information technology — Security techniques — Authentication context for biometrics | Standarts spēkā |
| 71122 | ISO/IEC 19896-3:2018 | IT security techniques — Competence requirements for information security testers and evaluators — Part 3: Knowledge, skills and effectiveness requirements for ISO/IEC 15408 evaluators | Atcelts |
| 71121 | ISO/IEC 19896-2:2018 | IT security techniques — Competence requirements for information security testers and evaluators — Part 2: Knowledge, skills and effectiveness requirements for ISO/IEC 19790 testers | Atcelts |
| 71120 | ISO/IEC 19896-1:2018 | IT security techniques — Competence requirements for information security testers and evaluators — Part 1: Introduction, concepts and general requirements | Atcelts |
| 71116 | ISO/IEC 29192-6:2019 | Information technology — Lightweight cryptography — Part 6: Message authentication codes (MACs) | Standarts spēkā |
Displaying 311-320 of 793 results.
