ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 44407 | ISO/IEC 27043:2015 | Information technology — Security techniques — Incident investigation principles and processes | Atcelts |
| 31142 | ISO/IEC TR 13335-5:2001 | Information technology — Guidelines for the management of IT Security — Part 5: Management guidance on network security | Atcelts |
| 52906 | ISO/IEC 19790:2012 | Information technology — Security techniques — Security requirements for cryptographic modules | Atcelts |
| 53613 | ISO/IEC 14888-3:2006/Amd 1:2010 | Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms — Amendment 1: Elliptic Curve Russian Digital Signature Algorithm, Schnorr Digital Signature Algorithm, Elliptic Curve Schnorr Digital Signature Algorithm, and Elliptic Curve Full Schnorr Digital Signature Algorithm | Atcelts |
| 25995 | ISO/IEC 14888-2:1999 | Information technology — Security techniques — Digital signatures with appendix — Part 2: Identity-based mechanisms | Atcelts |
| 24273 | ISO/IEC 9798-4:1995 | Information technology — Security techniques — Entity authentication — Part 4: Mechanisms using a cryptographic check function | Atcelts |
| 50678 | ISO/IEC 18014-1:2008 | Information technology — Security techniques — Time-stamping services — Part 1: Framework | Atcelts |
| 57915 | ISO/IEC 24760-2:2015 | Information technology — Security techniques — A framework for identity management — Part 2: Reference architecture and requirements | Atcelts |
| 67398 | ISO/IEC 27007:2017 | Information technology — Security techniques — Guidelines for information security management systems auditing | Atcelts |
| 60365 | ISO/IEC 9798-2:2008/Cor 2:2012 | Information technology — Security techniques — Entity authentication — Part 2: Mechanisms using symmetric encipherment algorithms — Technical Corrigendum 2 | Atcelts |
Displaying 361-370 of 791 results.
