Registration number (WIID)Project No.TitleStatus
63081ISO/IEC 27050-1:2016Information technology — Security techniques — Electronic discovery — Part 1: Overview and conceptsAtcelts
45151ISO/IEC 29128:2011Information technology — Security techniques — Verification of cryptographic protocolsAtcelts
53472ISO/IEC 9798-6:2005/Cor 1:2009Information technology — Security techniques — Entity authentication — Part 6: Mechanisms using manual data transfer — Technical Corrigendum 1Atcelts
53470ISO/IEC 9798-3:1998/Cor 1:2009Information technology — Security techniques — Entity authentication — Part 3: Mechanisms using digital signature techniques — Technical Corrigendum 1Atcelts
44735ISO/IEC 13888-3:2009Information technology — Security techniques — Non-repudiation — Part 3: Mechanisms using asymmetric techniquesAtcelts
50951ISO/IEC TR 20004:2012Information technology — Security techniques — Refining software vulnerability analysis under ISO/IEC 15408 and ISO/IEC 18045Atcelts
42106ISO/IEC 27004:2009Information technology — Security techniques — Information security management — MeasurementAtcelts
68530ISO/IEC 24759:2014/Cor 1:2015Information technology — Security techniques — Test requirements for cryptographic modules — Technical Corrigendum 1Atcelts
27727ISO/IEC 10116:1997Information technology — Security techniques — Modes of operation for an n-bit block cipherAtcelts
29240ISO/IEC TR 13335-4:2000Information technology — Guidelines for the management of IT Security — Part 4: Selection of safeguardsAtcelts
Displaying 331-340 of 791 results.