Registration number (WIID)Project No.TitleStatus
39876ISO/IEC 10118-3:2004Information technology — Security techniques — Hash-functions — Part 3: Dedicated hash-functionsAtcelts
64143ISO/IEC 27011:2016Information technology — Security techniques — Code of practice for Information security controls based on ISO/IEC 27002 for telecommunications organizationsAtcelts
68091ISO/IEC 27019:2017Information technology — Security techniques — Information security controls for the energy utility industryAtcelts
37416ISO/IEC 10118-3:2003Information technology — Security techniques — Hash-functions — Part 3: Dedicated hash-functionsAtcelts
43755ISO/IEC TR 27015:2012Information technology — Security techniques — Information security management guidelines for financial servicesAtcelts
27634ISO/IEC 15408-3:1999Information technology Security techniques Evaluation criteria for IT securityAtcelts
38192ISO/IEC 13888-1:2004IT security techniques — Non-repudiation — Part 1: GeneralAtcelts
50432ISO/IEC 13888-1:2009Information technology — Security techniques — Non-repudiation — Part 1: GeneralAtcelts
21733ISO/IEC TR 13335-1:1996Information technology — Guidelines for the management of IT Security — Part 1: Concepts and models for IT SecurityAtcelts
28107ISO/IEC 9979:1999Information technology — Security techniques — Procedures for the registration of cryptographic algorithmsAtcelts
Displaying 361-370 of 770 results.