Registration number (WIID)Project No.TitleStatus
27634ISO/IEC 15408-3:1999Information technology Security techniques Evaluation criteria for IT securityAtcelts
21733ISO/IEC TR 13335-1:1996Information technology — Guidelines for the management of IT Security — Part 1: Concepts and models for IT SecurityAtcelts
50432ISO/IEC 13888-1:2009Information technology -- Security techniques -- Non-repudiationAtcelts
52087ISO/IEC 18031:2005/Cor 1:2009Information technology — Security techniques — Random bit generation — Technical Corrigendum 1Atcelts
62325ISO/IEC 15946-5:2009/Cor 1:2012Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 5: Elliptic curve generation — Technical Corrigendum 1Atcelts
18105ISO/IEC 10118-2:1994Information technology — Security techniques — Hash-functions — Part 2: Hash-functions using an n-bit block cipher algorithmAtcelts
25290ISO/IEC 11770-2:1996Information technology — Security techniques — Key management — Part 2: Mechanisms using symmetric techniquesAtcelts
42105ISO/IEC 27003:2010Information technology — Security techniques — Information security management system implementation guidanceAtcelts
44715ISO/IEC TR 15446:2009Information technology — Security techniques — Guide for the production of Protection Profiles and Security TargetsAtcelts
46447ISO/IEC 18033-3:2005/Cor 2:2007Information technology — Security techniques — Encryption algorithms — Part 3: Block ciphers — Technical Corrigendum 2Atcelts
Displaying 351-360 of 774 results.