ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
25898 | ISO/IEC 9798-5:1999 | Information technology — Security techniques — Entity authentication — Part 5: Mechanisms using zero knowledge techniques | Atcelts |
25995 | ISO/IEC 14888-2:1999 | Information technology — Security techniques — Digital signatures with appendix — Part 2: Identity-based mechanisms | Atcelts |
25996 | ISO/IEC 14888-3:1998 | Information technology — Security techniques — Digital signatures with appendix — Part 3: Certificate-based mechanisms | Atcelts |
26157 | ISO/IEC DIS 14980 | Information technology — Code of practice for information security management | Izstrādē |
26955 | ISO/IEC WD 11768-1 | Information technology security techniques — Security mechanisms using zero knowledge techniques — Part 1: General model of security evaluation | Izstrādē |
27170 | ISO/IEC 15292:2001 | Information technology - Security techniques - Protection Profile registration procedures | Atcelts |
27632 | ISO/IEC 15408-1:1999 | Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model | Atcelts |
27632 | ISO/IEC 15408-1:1999 | Information technology Security techniques Evaluation criteria for IT security | Atcelts |
27633 | ISO/IEC 15408-2:1999 | Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional requirements | Atcelts |
27633 | ISO/IEC 15408-2:1999 | Information technology Security techniques Evaluation criteria for IT security | Atcelts |
Displaying 31-40 of 770 results.