Registration number (WIID)Project No.TitleStatus
46413ISO/IEC 15408-3:2008Information technology Security techniques Evaluation criteria for IT securityAtcelts
69726ISO/IEC 15946-5:2017Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 5: Elliptic curve generationAtcelts
43753ISO/IEC 27013:2012Information technology Security techniques Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1Atcelts
56891ISO/IEC 27000:2012Information technology Security techniques Information security management systems Overview and vocabularyAtcelts
51618ISO/IEC 9797-2:2011Information technology — Security techniques — Message Authentication Codes (MACs) — Part 2: Mechanisms using a dedicated hash-functionAtcelts
65421ISO/IEC 19772:2009/Cor 1:2014Information technology — Security techniques — Authenticated encryption — Technical Corrigendum 1Atcelts
71121ISO/IEC 19896-2:2018IT security techniques — Competence requirements for information security testers and evaluators — Part 2: Knowledge, skills and effectiveness requirements for ISO/IEC 19790 testersAtcelts
76154ISO/IEC 13888-3:2020Information security — Non-repudiation — Part 3: Mechanisms using asymmetric techniquesAtcelts
53469ISO/IEC 9798-2:2008/Cor 1:2010Information technology — Security techniques — Entity authentication — Part 2: Mechanisms using symmetric encipherment algorithms — Technical Corrigendum 1Atcelts
46447ISO/IEC 18033-3:2005/Cor 2:2007Information technology — Security techniques — Encryption algorithms — Part 3: Block ciphers — Technical Corrigendum 2Atcelts
Displaying 331-340 of 793 results.