Registration number (WIID)Project No.TitleStatus
18104ISO/IEC 10118-1:1994Information technology — Security techniques — Hash-functions — Part 1: GeneralAtcelts
42505ISO/IEC 27006:2007Information technology Security techniques Requirements for bodies providing audit and certification of information security management systemsAtcelts
39723ISO/IEC 11770-4:2006Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secretsAtcelts
34387ISO/IEC 18014-2:2002Information technology — Security techniques — Time-stamping services — Part 2: Mechanisms producing independent tokensAtcelts
43656ISO/IEC 14888-3:2006Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanismsAtcelts
54527ISO/IEC 11770-5:2011Information technology — Security techniques — Key management — Part 5: Group key managementAtcelts
40009ISO/IEC 18028-2:2006Information technology — Security techniques — IT network security — Part 2: Network security architectureAtcelts
56890ISO/IEC TS 30104:2015Information Technology — Security Techniques — Physical Security Attacks, Mitigation Techniques and Security RequirementsAtcelts
46381ISO/IEC 17799:2005/Cor 1:2007Information technology - Security techniques - Code of practice for information security management; Technical Corrigendum 1Atcelts
42506ISO/IEC 27007:2011Information technology Security techniques Guidelines for information security management systems auditingAtcelts
Displaying 371-380 of 770 results.