Registration number (WIID)Project No.TitleStatus
25898ISO/IEC 9798-5:1999Information technology — Security techniques — Entity authentication — Part 5: Mechanisms using zero knowledge techniquesAtcelts
25995ISO/IEC 14888-2:1999Information technology — Security techniques — Digital signatures with appendix — Part 2: Identity-based mechanismsAtcelts
25996ISO/IEC 14888-3:1998Information technology — Security techniques — Digital signatures with appendix — Part 3: Certificate-based mechanismsAtcelts
26157ISO/IEC DIS 14980Information technology — Code of practice for information security managementIzstrādē
26955ISO/IEC WD 11768-1Information technology security techniques — Security mechanisms using zero knowledge techniques — Part 1: General model of security evaluationIzstrādē
27170ISO/IEC 15292:2001Information technology - Security techniques - Protection Profile registration proceduresAtcelts
27632ISO/IEC 15408-1:1999Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general modelAtcelts
27632ISO/IEC 15408-1:1999Information technology Security techniques Evaluation criteria for IT securityAtcelts
27633ISO/IEC 15408-2:1999Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional requirementsAtcelts
27633ISO/IEC 15408-2:1999Information technology Security techniques Evaluation criteria for IT securityAtcelts
Displaying 31-40 of 770 results.