Registration number (WIID)Project No.TitleStatus
50341ISO/IEC 15408-1:2009Information technology Security techniques Evaluation criteria for IT securityAtcelts
42715ISO/IEC 11770-2:1996/Cor 1:2005Information technology — Security techniques — Key management — Part 2: Mechanisms using symmetric techniques — Technical Corrigendum 1Atcelts
64267ISO/IEC 14888-3:2016Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanismsAtcelts
40009ISO/IEC 18028-2:2006Information technology — Security techniques — IT network security — Part 2: Network security architectureAtcelts
34386ISO/IEC 18014-1:2002Information technology — Security techniques — Time-stamping services — Part 1: FrameworkAtcelts
25537ISO/IEC 11770-3:1999Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniquesAtcelts
31143ISO/IEC 10118-1:2000Information technology — Security techniques — Hash-functions — Part 1: GeneralAtcelts
27743ISO/IEC 9798-1:1997Information technology — Security techniques — Entity authentication — Part 1: GeneralAtcelts
42103ISO/IEC 27001:2005Information technology Security techniques Information security management systems RequirementsAtcelts
29240ISO/IEC TR 13335-4:2000Information technology Guidelines for the management of IT SecurityAtcelts
Displaying 341-350 of 791 results.