Registration number (WIID)Project No.TitleStatus
52202ISO/IEC 15946-1:2008/Cor 1:2009Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 1: General — Technical Corrigendum 1Atcelts
1439ISO/IEC 14888-1:1998Information technology — Security techniques — Digital signatures with appendix — Part 1: GeneralAtcelts
46381ISO/IEC 17799:2005/Cor 1:2007Information technology — Security techniques — Code of practice for information security management — Technical Corrigendum 1Atcelts
56891ISO/IEC 27000:2012Information technology — Security techniques — Information security management systems — Overview and vocabularyAtcelts
28232ISO/IEC 9796-2:1997Information technology — Security techniques — Digital signature schemes giving message recovery — Part 2: Mechanisms using a hash-functionAtcelts
51620ISO/IEC 19790:2006/Cor 1:2008Information technology — Security techniques — Security requirements for cryptographic modules — Technical Corrigendum 1Atcelts
39690ISO/IEC TR 15446:2004Information technology — Security techniques — Guide for the production of Protection Profiles and Security TargetsAtcelts
25537ISO/IEC 11770-3:1999Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniquesAtcelts
71278ISO/IEC 20547-4:2020Information technology — Big data reference architecture — Part 4: Security and privacyAtcelts
17659ISO/IEC 9797:1989Data cryptographic techniques — Data integrity mechanism using a cryptographic check function employing a block cipher algorithmAtcelts
Displaying 401-410 of 791 results.