ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
39876 | ISO/IEC 10118-3:2004 | Information technology — Security techniques — Hash-functions — Part 3: Dedicated hash-functions | Atcelts |
64143 | ISO/IEC 27011:2016 | Information technology — Security techniques — Code of practice for Information security controls based on ISO/IEC 27002 for telecommunications organizations | Atcelts |
68091 | ISO/IEC 27019:2017 | Information technology — Security techniques — Information security controls for the energy utility industry | Atcelts |
37416 | ISO/IEC 10118-3:2003 | Information technology — Security techniques — Hash-functions — Part 3: Dedicated hash-functions | Atcelts |
43755 | ISO/IEC TR 27015:2012 | Information technology — Security techniques — Information security management guidelines for financial services | Atcelts |
27634 | ISO/IEC 15408-3:1999 | Information technology Security techniques Evaluation criteria for IT security | Atcelts |
38192 | ISO/IEC 13888-1:2004 | IT security techniques — Non-repudiation — Part 1: General | Atcelts |
50432 | ISO/IEC 13888-1:2009 | Information technology — Security techniques — Non-repudiation — Part 1: General | Atcelts |
21733 | ISO/IEC TR 13335-1:1996 | Information technology — Guidelines for the management of IT Security — Part 1: Concepts and models for IT Security | Atcelts |
28107 | ISO/IEC 9979:1999 | Information technology — Security techniques — Procedures for the registration of cryptographic algorithms | Atcelts |
Displaying 361-370 of 770 results.