ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 73722 | ISO/IEC 29100:2011/Amd 1:2018 | Information technology — Security techniques — Privacy framework — Amendment 1: Clarifications | Atcelts |
| 42508 | ISO/IEC 27009:2016 | Information technology — Security techniques — Sector-specific application of ISO/IEC 27001 — Requirements | Atcelts |
| 52087 | ISO/IEC 18031:2005/Cor 1:2009 | Information technology — Security techniques — Random bit generation — Technical Corrigendum 1 | Atcelts |
| 62325 | ISO/IEC 15946-5:2009/Cor 1:2012 | Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 5: Elliptic curve generation — Technical Corrigendum 1 | Atcelts |
| 60475 | ISO/IEC 10118-3:2004/Cor 1:2011 | Information technology — Security techniques — Hash-functions — Part 3: Dedicated hash-functions — Technical Corrigendum 1 | Atcelts |
| 41532 | ISO/IEC 24762:2008 | Information technology — Security techniques — Guidelines for information and communications technology disaster recovery services | Atcelts |
| 18105 | ISO/IEC 10118-2:1994 | Information technology — Security techniques — Hash-functions — Part 2: Hash-functions using an n-bit block cipher algorithm | Atcelts |
| 62071 | ISO/IEC 27035-2:2016 | Information technology — Security techniques — Information security incident management — Part 2: Guidelines to plan and prepare for incident response | Atcelts |
| 46413 | ISO/IEC 15408-3:2008 | Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance components | Atcelts |
| 25898 | ISO/IEC 9798-5:1999 | Information technology — Security techniques — Entity authentication — Part 5: Mechanisms using zero knowledge techniques | Atcelts |
Displaying 381-390 of 793 results.
