ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 27743 | ISO/IEC 9798-1:1997 | Information technology Security techniques Entity authentication | Atcelts |
| 52906 | ISO/IEC 19790:2012 | Information technology — Security techniques — Security requirements for cryptographic modules | Atcelts |
| 39271 | ISO/IEC TR 15443-2:2005 | Information technology — Security techniques — A framework for IT security assurance — Part 2: Assurance methods | Atcelts |
| 50522 | ISO/IEC 9798-2:2008 | Information technology — Security techniques — Entity authentication — Part 2: Mechanisms using symmetric encipherment algorithms | Atcelts |
| 60237 | ISO/IEC 11770-3:2015 | Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques | Atcelts |
| 50297 | ISO/IEC 27002:2005 | Information technology — Security techniques — Code of practice for information security management | Atcelts |
| 40010 | ISO/IEC 18028-3:2005 | Information technology — Security techniques — IT network security — Part 3: Securing communications between networks using security gateways | Atcelts |
| 41531 | ISO/IEC 24761:2009 | Information technology — Security techniques — Authentication context for biometrics | Atcelts |
| 44734 | ISO/IEC 15946-1:2008 | Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 1: General | Atcelts |
| 25290 | ISO/IEC 11770-2:1996 | Information technology — Security techniques — Key management — Part 2: Mechanisms using symmetric techniques | Atcelts |
Displaying 371-380 of 793 results.
