Registration number (WIID)Project No.TitleStatus
52946ISO/IEC 24745:2011Information technology — Security techniques — Biometric information protectionAtcelts
54528ISO/IEC 18033-1:2005/Amd 1:2011Information technology — Security techniques — Encryption algorithms — Part 1: General — Amendment 1Atcelts
31142ISO/IEC TR 13335-5:2001Information technology — Guidelines for the management of IT Security — Part 5: Management guidance on network securityAtcelts
40613ISO/IEC 15408-2:2005Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional requirementsAtcelts
43753ISO/IEC 27013:2012Information technology — Security techniques — Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1Atcelts
71113ISO/IEC 11770-3:2015/Amd 1:2017Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques — Amendment 1: Blinded Diffie-Hellman key agreementAtcelts
77722ISO/IEC 27006:2015/Amd 1:2020Information technology — Security techniques — Requirements for bodies providing audit and certification of information security management systems — Amendment 1Atcelts
19687ISO/IEC 11770-1:1996Information technology — Security techniques — Key management — Part 1: FrameworkAtcelts
46412ISO/IEC 18045:2008Information technology — Security techniques — Methodology for IT security evaluationAtcelts
69726ISO/IEC 15946-5:2017Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 5: Elliptic curve generationAtcelts
Displaying 321-330 of 770 results.