ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
60612 | ISO/IEC 17825:2016 | Information technology — Security techniques — Testing methods for the mitigation of non-invasive attack classes against cryptographic modules | Atcelts |
60475 | ISO/IEC 10118-3:2004/Cor 1:2011 | Information technology — Security techniques — Hash-functions — Part 3: Dedicated hash-functions — Technical Corrigendum 1 | Atcelts |
60412 | ISO/IEC NP 20009-3 | Information technology — Security techniques — Anonymous entity authentication — Part 3: Mechanisms based on blind signatures | Standarts spēkā |
60367 | ISO/IEC 9798-4:1999/CD Cor 2 | Information technology — Security techniques — Entity authentication — Part 4: Mechanisms using a cryptographic check function — Technical Corrigendum 2 | Izstrādē |
60366 | ISO/IEC 9798-3:1998/Cor 2:2012 | Information technology — Security techniques — Entity authentication — Part 3: Mechanisms using digital signature techniques — Technical Corrigendum 2 | Atcelts |
60365 | ISO/IEC 9798-2:2008/Cor 2:2012 | Information technology — Security techniques — Entity authentication — Part 2: Mechanisms using symmetric encipherment algorithms — Technical Corrigendum 2 | Atcelts |
60237 | ISO/IEC 11770-3:2015 | Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques | Atcelts |
60236 | ISO/IEC WD 24762 | Information technology — Security techniques — Guidelines for information and communications technology disaster recovery services | Izstrādē |
60103 | ISO/IEC NP 17598 | Investigation principles and processes | Izstrādē |
60030 | ISO/IEC NP 17548 | Information technology — Security techniques — Guidance on assuring suitability and adequacy of investigation methods | Izstrādē |
Displaying 411-420 of 770 results.