ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 75295 | ISO/IEC 11770-5:2020 | Information security — Key management — Part 5: Group key management | Atcelts |
| 72403 | ISO/IEC 19989-2:2020 | Information security — Criteria and methodology for security evaluation of biometric systems — Part 2: Biometric recognition performance | Atcelts |
| 74046 | ISO/IEC 27014:2020 | Information security, cybersecurity and privacy protection — Governance of information security | Atcelts |
| 66435 | ISO/IEC 27000:2016 | Information technology — Security techniques — Information security management systems — Overview and vocabulary | Atcelts |
| 69378 | ISO/IEC 27001:2013/Cor 2:2015 | Information technology — Security techniques — Information security management systems — Requirements — Technical Corrigendum 2 | Atcelts |
| 44716 | ISO/IEC 21827:2008 | Information technology — Security techniques — Systems Security Engineering — Capability Maturity Model® (SSE-CMM®) | Atcelts |
| 41933 | ISO/IEC 27000:2009 | Information technology Security techniques Information security management systems Overview and vocabulary | Atcelts |
| 44728 | ISO/IEC 18033-3:2005/Cor 1:2006 | Information technology — Security techniques — Encryption algorithms — Part 3: Block ciphers — Technical Corrigendum 1 | Atcelts |
| 39066 | ISO/IEC 13335-1:2004 | Information technology Security techniques Management of information and communications technology security | Atcelts |
| 25428 | ISO/IEC 10118-3:1998 | Information technology — Security techniques — Hash-functions — Part 3: Dedicated hash-functions | Atcelts |
Displaying 421-430 of 791 results.
