ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
52946 | ISO/IEC 24745:2011 | Information technology — Security techniques — Biometric information protection | Atcelts |
54528 | ISO/IEC 18033-1:2005/Amd 1:2011 | Information technology — Security techniques — Encryption algorithms — Part 1: General — Amendment 1 | Atcelts |
31142 | ISO/IEC TR 13335-5:2001 | Information technology — Guidelines for the management of IT Security — Part 5: Management guidance on network security | Atcelts |
40613 | ISO/IEC 15408-2:2005 | Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional requirements | Atcelts |
43753 | ISO/IEC 27013:2012 | Information technology — Security techniques — Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1 | Atcelts |
71113 | ISO/IEC 11770-3:2015/Amd 1:2017 | Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques — Amendment 1: Blinded Diffie-Hellman key agreement | Atcelts |
77722 | ISO/IEC 27006:2015/Amd 1:2020 | Information technology — Security techniques — Requirements for bodies providing audit and certification of information security management systems — Amendment 1 | Atcelts |
19687 | ISO/IEC 11770-1:1996 | Information technology — Security techniques — Key management — Part 1: Framework | Atcelts |
46412 | ISO/IEC 18045:2008 | Information technology — Security techniques — Methodology for IT security evaluation | Atcelts |
69726 | ISO/IEC 15946-5:2017 | Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 5: Elliptic curve generation | Atcelts |
Displaying 321-330 of 770 results.