Registration number (WIID)Project No.TitleStatus
60612ISO/IEC 17825:2016Information technology — Security techniques — Testing methods for the mitigation of non-invasive attack classes against cryptographic modulesAtcelts
60475ISO/IEC 10118-3:2004/Cor 1:2011Information technology — Security techniques — Hash-functions — Part 3: Dedicated hash-functions — Technical Corrigendum 1Atcelts
60412ISO/IEC NP 20009-3Information technology — Security techniques — Anonymous entity authentication — Part 3: Mechanisms based on blind signaturesStandarts spēkā
60367ISO/IEC 9798-4:1999/CD Cor 2Information technology — Security techniques — Entity authentication — Part 4: Mechanisms using a cryptographic check function — Technical Corrigendum 2Izstrādē
60366ISO/IEC 9798-3:1998/Cor 2:2012Information technology — Security techniques — Entity authentication — Part 3: Mechanisms using digital signature techniques — Technical Corrigendum 2Atcelts
60365ISO/IEC 9798-2:2008/Cor 2:2012Information technology — Security techniques — Entity authentication — Part 2: Mechanisms using symmetric encipherment algorithms — Technical Corrigendum 2Atcelts
60237ISO/IEC 11770-3:2015Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniquesAtcelts
60236ISO/IEC WD 24762Information technology — Security techniques — Guidelines for information and communications technology disaster recovery servicesIzstrādē
60103ISO/IEC NP 17598Investigation principles and processesIzstrādē
60030ISO/IEC NP 17548Information technology — Security techniques — Guidance on assuring suitability and adequacy of investigation methodsIzstrādē
Displaying 411-420 of 770 results.