Registration number (WIID)Project No.TitleStatus
40612ISO/IEC 15408-1:2005Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general modelAtcelts
45244ISO/IEC TR 27008:2011Information technology Security techniques Guidelines for auditors on information security controlsAtcelts
64138ISO/IEC 27013:2015Information technology — Security techniques — Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1Atcelts
31077ISO/IEC 15946-3:2002Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 3: Key establishmentAtcelts
40614ISO/IEC 15408-3:2005Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance requirementsAtcelts
40012ISO/IEC 18028-5:2006Information technology — Security techniques — IT network security — Part 5: Securing communications across networks using virtual private networksAtcelts
39978ISO/IEC 18033-4:2005Information technology — Security techniques — Encryption algorithms — Part 4: Stream ciphersAtcelts
34388ISO/IEC 18014-3:2004Information technology — Security techniques — Time-stamping services — Part 3: Mechanisms producing linked tokensAtcelts
40011ISO/IEC 18028-4:2005Information technology Security techniques IT network securityAtcelts
27633ISO/IEC 15408-2:1999Information technology Security techniques Evaluation criteria for IT securityAtcelts
Displaying 321-330 of 807 results.