ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
18104 | ISO/IEC 10118-1:1994 | Information technology — Security techniques — Hash-functions — Part 1: General | Atcelts |
42505 | ISO/IEC 27006:2007 | Information technology Security techniques Requirements for bodies providing audit and certification of information security management systems | Atcelts |
39723 | ISO/IEC 11770-4:2006 | Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets | Atcelts |
34387 | ISO/IEC 18014-2:2002 | Information technology — Security techniques — Time-stamping services — Part 2: Mechanisms producing independent tokens | Atcelts |
43656 | ISO/IEC 14888-3:2006 | Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms | Atcelts |
54527 | ISO/IEC 11770-5:2011 | Information technology — Security techniques — Key management — Part 5: Group key management | Atcelts |
40009 | ISO/IEC 18028-2:2006 | Information technology — Security techniques — IT network security — Part 2: Network security architecture | Atcelts |
56890 | ISO/IEC TS 30104:2015 | Information Technology — Security Techniques — Physical Security Attacks, Mitigation Techniques and Security Requirements | Atcelts |
46381 | ISO/IEC 17799:2005/Cor 1:2007 | Information technology - Security techniques - Code of practice for information security management; Technical Corrigendum 1 | Atcelts |
42506 | ISO/IEC 27007:2011 | Information technology Security techniques Guidelines for information security management systems auditing | Atcelts |
Displaying 371-380 of 770 results.