Registration number (WIID)Project No.TitleStatus
68231ISO/IEC 14888-2:2008/Cor 1:2015Information technology — Security techniques — Digital signatures with appendix — Part 2: Integer factorization based mechanisms — Technical Corrigendum 1: To ISO/IEC 14888-2:2008Standarts spēkā
68091ISO/IEC 27019:2017Information technology — Security techniques — Information security controls for the energy utility industryAtcelts
67933ISO/IEC 11770-4:2017Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secretsStandarts spēkā
67741ISO/IEC TS 27034-5-1:2018Information technology — Application security — Part 5-1: Protocols and application security controls data structure, XML schemasStandarts spēkā
67740ISO/IEC 18033-6:2019IT Security techniques — Encryption algorithms — Part 6: Homomorphic encryptionStandarts spēkā
67398ISO/IEC 27007:2017Information technology — Security techniques — Guidelines for information security management systems auditingAtcelts
67397ISO/IEC TS 27008:2019Information technology — Security techniques — Guidelines for the assessment of information security controlsStandarts spēkā
67173ISO/IEC 29192-5:2016Information technology — Security techniques — Lightweight cryptography — Part 5: Hash-functionsStandarts spēkā
67116ISO/IEC 10118-3:2018IT Security techniques — Hash-functions — Part 3: Dedicated hash-functionsStandarts spēkā
67115ISO/IEC 9798-3:2019IT Security techniques — Entity authentication — Part 3: Mechanisms using digital signature techniquesStandarts spēkā
Displaying 321-330 of 770 results.