ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 60030 | ISO/IEC NP 17548 | Information technology — Security techniques — Guidance on assuring suitability and adequacy of investigation methods | Izstrādē |
| 60103 | ISO/IEC NP 17598 | Investigation principles and processes | Izstrādē |
| 60236 | ISO/IEC WD 24762 | Information technology — Security techniques — Guidelines for information and communications technology disaster recovery services | Izstrādē |
| 60237 | ISO/IEC 11770-3:2015 | Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques | Atcelts |
| 60365 | ISO/IEC 9798-2:2008/Cor 2:2012 | Information technology — Security techniques — Entity authentication — Part 2: Mechanisms using symmetric encipherment algorithms — Technical Corrigendum 2 | Atcelts |
| 60366 | ISO/IEC 9798-3:1998/Cor 2:2012 | Information technology — Security techniques — Entity authentication — Part 3: Mechanisms using digital signature techniques — Technical Corrigendum 2 | Atcelts |
| 60367 | ISO/IEC 9798-4:1999/CD Cor 2 | Information technology — Security techniques — Entity authentication — Part 4: Mechanisms using a cryptographic check function — Technical Corrigendum 2 | Izstrādē |
| 60412 | ISO/IEC NP 20009-3 | Information technology — Security techniques — Anonymous entity authentication — Part 3: Mechanisms based on blind signatures | Standarts spēkā |
| 60475 | ISO/IEC 10118-3:2004/Cor 1:2011 | Information technology — Security techniques — Hash-functions — Part 3: Dedicated hash-functions — Technical Corrigendum 1 | Atcelts |
| 60612 | ISO/IEC 17825:2016 | Information technology — Security techniques — Testing methods for the mitigation of non-invasive attack classes against cryptographic modules | Atcelts |
Displaying 351-360 of 791 results.
