Registration number (WIID)Project No.TitleStatus
53475ISO/IEC 11770-4:2006/Cor 1:2009Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets — Technical Corrigendum 1Atcelts
76154ISO/IEC 13888-3:2020Information security — Non-repudiation — Part 3: Mechanisms using asymmetric techniquesAtcelts
21733ISO/IEC TR 13335-1:1996Information technology — Guidelines for the management of IT Security — Part 1: Concepts and models for IT SecurityAtcelts
35455ISO/IEC 9796-2:2002Information technology — Security techniques — Digital signature schemes giving message recovery — Part 2: Integer factorization based mechanismsAtcelts
71113ISO/IEC 11770-3:2015/Amd 1:2017Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques — Amendment 1: Blinded Diffie-Hellman key agreementAtcelts
40011ISO/IEC 18028-4:2005Information technology Security techniques IT network securityAtcelts
25537ISO/IEC 11770-3:1999Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniquesAtcelts
51580ISO/IEC 27033-1:2009Information technology Security techniques Network securityAtcelts
40009ISO/IEC 18028-2:2006Information technology — Security techniques — IT network security — Part 2: Network security architectureAtcelts
51618ISO/IEC 9797-2:2011Information technology — Security techniques — Message Authentication Codes (MACs) — Part 2: Mechanisms using a dedicated hash-functionAtcelts
Displaying 381-390 of 791 results.