Registration number (WIID)Project No.TitleStatus
73722ISO/IEC 29100:2011/Amd 1:2018Information technology — Security techniques — Privacy framework — Amendment 1: ClarificationsAtcelts
42508ISO/IEC 27009:2016Information technology — Security techniques — Sector-specific application of ISO/IEC 27001 — RequirementsAtcelts
52087ISO/IEC 18031:2005/Cor 1:2009Information technology — Security techniques — Random bit generation — Technical Corrigendum 1Atcelts
62325ISO/IEC 15946-5:2009/Cor 1:2012Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 5: Elliptic curve generation — Technical Corrigendum 1Atcelts
60475ISO/IEC 10118-3:2004/Cor 1:2011Information technology — Security techniques — Hash-functions — Part 3: Dedicated hash-functions — Technical Corrigendum 1Atcelts
41532ISO/IEC 24762:2008Information technology — Security techniques — Guidelines for information and communications technology disaster recovery servicesAtcelts
18105ISO/IEC 10118-2:1994Information technology — Security techniques — Hash-functions — Part 2: Hash-functions using an n-bit block cipher algorithmAtcelts
62071ISO/IEC 27035-2:2016Information technology — Security techniques — Information security incident management — Part 2: Guidelines to plan and prepare for incident responseAtcelts
46413ISO/IEC 15408-3:2008Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance componentsAtcelts
25898ISO/IEC 9798-5:1999Information technology — Security techniques — Entity authentication — Part 5: Mechanisms using zero knowledge techniquesAtcelts
Displaying 381-390 of 793 results.