ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
68231 | ISO/IEC 14888-2:2008/Cor 1:2015 | Information technology — Security techniques — Digital signatures with appendix — Part 2: Integer factorization based mechanisms — Technical Corrigendum 1: To ISO/IEC 14888-2:2008 | Standarts spēkā |
68091 | ISO/IEC 27019:2017 | Information technology — Security techniques — Information security controls for the energy utility industry | Atcelts |
67933 | ISO/IEC 11770-4:2017 | Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets | Standarts spēkā |
67741 | ISO/IEC TS 27034-5-1:2018 | Information technology — Application security — Part 5-1: Protocols and application security controls data structure, XML schemas | Standarts spēkā |
67740 | ISO/IEC 18033-6:2019 | IT Security techniques — Encryption algorithms — Part 6: Homomorphic encryption | Standarts spēkā |
67398 | ISO/IEC 27007:2017 | Information technology — Security techniques — Guidelines for information security management systems auditing | Atcelts |
67397 | ISO/IEC TS 27008:2019 | Information technology — Security techniques — Guidelines for the assessment of information security controls | Standarts spēkā |
67173 | ISO/IEC 29192-5:2016 | Information technology — Security techniques — Lightweight cryptography — Part 5: Hash-functions | Standarts spēkā |
67116 | ISO/IEC 10118-3:2018 | IT Security techniques — Hash-functions — Part 3: Dedicated hash-functions | Standarts spēkā |
67115 | ISO/IEC 9798-3:2019 | IT Security techniques — Entity authentication — Part 3: Mechanisms using digital signature techniques | Standarts spēkā |
Displaying 321-330 of 770 results.