Registration number (WIID)Project No.TitleStatus
66435ISO/IEC 27000:2016Information technology — Security techniques — Information security management systems — Overview and vocabularyAtcelts
54534ISO/IEC 27001:2013Information technology — Security techniques — Information security management systems — RequirementsAtcelts
40011ISO/IEC 18028-4:2005Information technology Security techniques IT network securityAtcelts
39978ISO/IEC 18033-4:2005Information technology — Security techniques — Encryption algorithms — Part 4: Stream ciphersAtcelts
40012ISO/IEC 18028-5:2006Information technology — Security techniques — IT network security — Part 5: Securing communications across networks using virtual private networksAtcelts
31077ISO/IEC 15946-3:2002Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 3: Key establishmentAtcelts
64138ISO/IEC 27013:2015Information technology — Security techniques — Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1Atcelts
43751ISO/IEC 27011:2008Information technology — Security techniques — Information security management guidelines for telecommunications organizations based on ISO/IEC 27002Atcelts
34930ISO/IEC 15946-4:2004Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 4: Digital signatures giving message recoveryAtcelts
52202ISO/IEC 15946-1:2008/Cor 1:2009Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 1: General — Technical Corrigendum 1Atcelts
Displaying 411-420 of 770 results.