Registration number (WIID)Project No.TitleStatus
44407ISO/IEC 27043:2015Information technology — Security techniques — Incident investigation principles and processesAtcelts
31142ISO/IEC TR 13335-5:2001Information technology — Guidelines for the management of IT Security — Part 5: Management guidance on network securityAtcelts
52906ISO/IEC 19790:2012Information technology — Security techniques — Security requirements for cryptographic modulesAtcelts
53613ISO/IEC 14888-3:2006/Amd 1:2010Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms — Amendment 1: Elliptic Curve Russian Digital Signature Algorithm, Schnorr Digital Signature Algorithm, Elliptic Curve Schnorr Digital Signature Algorithm, and Elliptic Curve Full Schnorr Digital Signature AlgorithmAtcelts
25995ISO/IEC 14888-2:1999Information technology — Security techniques — Digital signatures with appendix — Part 2: Identity-based mechanismsAtcelts
24273ISO/IEC 9798-4:1995Information technology — Security techniques — Entity authentication — Part 4: Mechanisms using a cryptographic check functionAtcelts
50678ISO/IEC 18014-1:2008Information technology — Security techniques — Time-stamping services — Part 1: FrameworkAtcelts
57915ISO/IEC 24760-2:2015Information technology — Security techniques — A framework for identity management — Part 2: Reference architecture and requirementsAtcelts
67398ISO/IEC 27007:2017Information technology — Security techniques — Guidelines for information security management systems auditingAtcelts
60365ISO/IEC 9798-2:2008/Cor 2:2012Information technology — Security techniques — Entity authentication — Part 2: Mechanisms using symmetric encipherment algorithms — Technical Corrigendum 2Atcelts
Displaying 361-370 of 791 results.