ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 71113 | ISO/IEC 11770-3:2015/Amd 1:2017 | Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques — Amendment 1: Blinded Diffie-Hellman key agreement | Atcelts |
| 70659 | ISO/IEC 27039:2015/CD Cor 1 | Information technology — Security techniques — Selection, deployment and operations of intrusion detection and prevention systems (IDPS) — Technical Corrigendum 1 | Izstrādē |
| 70631 | ISO/IEC 14888-3:2016/DAmd 1 | Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms — Amendment 1: SM2 digital signature mechanism | Izstrādē |
| 70331 | ISO/IEC 29184:2020 | Information technology — Online privacy notices and consent | Standarts spēkā |
| 70082 | ISO/IEC 20085-2:2020 | IT Security techniques — Test tool requirements and test tool calibration methods for use in testing non-invasive attack mitigation techniques in cryptographic modules — Part 2: Test calibration methods and apparatus | Standarts spēkā |
| 70081 | ISO/IEC 20085-1:2019 | IT Security techniques — Test tool requirements and test tool calibration methods for use in testing non-invasive attack mitigation techniques in cryptographic modules — Part 1: Test tools and techniques | Standarts spēkā |
| 69726 | ISO/IEC 15946-5:2017 | Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 5: Elliptic curve generation | Atcelts |
| 69725 | ISO/IEC 30111:2019 | Information technology — Security techniques — Vulnerability handling processes | Standarts spēkā |
| 69403 | ISO/IEC NP 20897 | Information technology — Security techniques — Security requirements, test and evaluation methods for physically unclonable functions for generating nonstored security parameters | Izstrādē |
| 69379 | ISO/IEC 27002:2013/Cor 2:2015 | Information technology — Security techniques — Code of practice for information security controls — Technical Corrigendum 2 | Atcelts |
Displaying 321-330 of 791 results.
