Registration number (WIID)Project No.TitleStatus
53469ISO/IEC 9798-2:2008/Cor 1:2010Information technology — Security techniques — Entity authentication — Part 2: Mechanisms using symmetric encipherment algorithms — Technical Corrigendum 1Atcelts
45244ISO/IEC TR 27008:2011Information technology Security techniques Guidelines for auditors on information security controlsAtcelts
31136ISO/IEC 9797-2:2002Information technology — Security techniques — Message Authentication Codes (MACs) — Part 2: Mechanisms using a dedicated hash-functionAtcelts
78341ISO/IEC 23264-1:2021Information security — Redaction of authentic data — Part 1: GeneralAtcelts
60366ISO/IEC 9798-3:1998/Cor 2:2012Information technology — Security techniques — Entity authentication — Part 3: Mechanisms using digital signature techniques — Technical Corrigendum 2Atcelts
29240ISO/IEC TR 13335-4:2000Information technology Guidelines for the management of IT SecurityAtcelts
31076ISO/IEC 15946-2:2002Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 2: Digital signaturesAtcelts
44753ISO/IEC 9796-2:2002/Amd 1:2008Information technology — Security techniques — Digital signature schemes giving message recovery — Part 2: Integer factorization based mechanisms — Amendment 1Atcelts
45637ISO/IEC 10118-2:2000/Cor 2:2007Information technology — Security techniques — Hash-functions — Part 2: Hash-functions using an n-bit block cipher — Technical Corrigendum 2Atcelts
73722ISO/IEC 29100:2011/Amd 1:2018Information technology — Security techniques — Privacy framework — Amendment 1: ClarificationsAtcelts
Displaying 341-350 of 793 results.