Registration number (WIID)Project No.TitleStatus
40613ISO/IEC 15408-2:2005Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional requirementsAtcelts
17887ISO/IEC 9979:1991Data cryptographic techniques — Procedures for the registration of cryptographic algorithmsAtcelts
17663ISO/IEC 9798-3:1993Information technology — Security techniques — Entity authentication mechanisms — Part 3: Entity authentication using a public key algorithmAtcelts
77722ISO/IEC 27006:2015/Amd 1:2020Information technology — Security techniques — Requirements for bodies providing audit and certification of information security management systems — Amendment 1Atcelts
42505ISO/IEC 27006:2007Information technology — Security techniques — Requirements for bodies providing audit and certification of information security management systemsAtcelts
35394ISO/IEC 18043:2006Information technology — Security techniques — Selection, deployment and operations of intrusion detection systemsAtcelts
19687ISO/IEC 11770-1:1996Information technology — Security techniques — Key management — Part 1: FrameworkAtcelts
29580ISO/IEC TR 15947:2002Information technology — Security techniques — IT intrusion detection frameworkAtcelts
61498ISO/IEC 27018:2014Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processorsAtcelts
34387ISO/IEC 18014-2:2002Information technology — Security techniques — Time-stamping services — Part 2: Mechanisms producing independent tokensAtcelts
Displaying 351-360 of 791 results.