Registration number (WIID)Project No.TitleStatus
25537ISO/IEC 11770-3:1999Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniquesAtcelts
34930ISO/IEC 15946-4:2004Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 4: Digital signatures giving message recoveryAtcelts
40612ISO/IEC 15408-1:2005Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general modelAtcelts
64138ISO/IEC 27013:2015Information technology — Security techniques — Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1Atcelts
31077ISO/IEC 15946-3:2002Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 3: Key establishmentAtcelts
40614ISO/IEC 15408-3:2005Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance requirementsAtcelts
45244ISO/IEC TR 27008:2011Information technology Security techniques Guidelines for auditors on information security controlsAtcelts
40012ISO/IEC 18028-5:2006Information technology — Security techniques — IT network security — Part 5: Securing communications across networks using virtual private networksAtcelts
39978ISO/IEC 18033-4:2005Information technology — Security techniques — Encryption algorithms — Part 4: Stream ciphersAtcelts
27633ISO/IEC 15408-2:1999Information technology Security techniques Evaluation criteria for IT securityAtcelts
Displaying 321-330 of 793 results.