ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 60365 | ISO/IEC 9798-2:2008/Cor 2:2012 | Information technology — Security techniques — Entity authentication — Part 2: Mechanisms using symmetric encipherment algorithms — Technical Corrigendum 2 | Atcelts |
| 57915 | ISO/IEC 24760-2:2015 | Information technology — Security techniques — A framework for identity management — Part 2: Reference architecture and requirements | Atcelts |
| 39721 | ISO/IEC 9798-6:2005 | Information technology — Security techniques — Entity authentication — Part 6: Mechanisms using manual data transfer | Atcelts |
| 39733 | ISO/IEC TR 15443-1:2005 | Information technology — Security techniques — A framework for IT security assurance — Part 1: Overview and framework | Atcelts |
| 77582 | ISO/IEC 24760-1:2019 | IT Security and Privacy — A framework for identity management — Part 1: Terminology and concepts | Atcelts |
| 25898 | ISO/IEC 9798-5:1999 | Information technology — Security techniques — Entity authentication — Part 5: Mechanisms using zero knowledge techniques | Atcelts |
| 67398 | ISO/IEC 27007:2017 | Information technology — Security techniques — Guidelines for information security management systems auditing | Atcelts |
| 18105 | ISO/IEC 10118-2:1994 | Information technology — Security techniques — Hash-functions — Part 2: Hash-functions using an n-bit block cipher algorithm | Atcelts |
| 54528 | ISO/IEC 18033-1:2005/Amd 1:2011 | Information technology — Security techniques — Encryption algorithms — Part 1: General — Amendment 1 | Atcelts |
| 31142 | ISO/IEC TR 13335-5:2001 | Information technology — Guidelines for the management of IT Security — Part 5: Management guidance on network security | Atcelts |
Displaying 351-360 of 793 results.
