Registration number (WIID)Project No.TitleStatus
60237ISO/IEC 11770-3:2015Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniquesAtcelts
60236ISO/IEC WD 24762Information technology — Security techniques — Guidelines for information and communications technology disaster recovery servicesIzstrādē
60103ISO/IEC NP 17598Investigation principles and processesIzstrādē
60030ISO/IEC NP 17548Information technology — Security techniques — Guidance on assuring suitability and adequacy of investigation methodsIzstrādē
60029ISO/IEC NP 17547Information technology — Security techniques — Guidelines for analysis & interpretation of digital evidenceIzstrādē
59994ISO/IEC 10118-2:2010/Cor 1:2011Information technology — Security techniques — Hash-functions — Part 2: Hash-functions using an n-bit block cipher — Technical Corrigendum 1Standarts spēkā
59948ISO/IEC 18033-5:2015Information technology — Security techniques — Encryption algorithms — Part 5: Identity-based ciphersStandarts spēkā
59934ISO/IEC 18014-4:2015Information technology — Security techniques — Time-stamping services — Part 4: Traceability of time sourcesStandarts spēkā
59689ISO/IEC 27036-4:2016Information technology — Security techniques — Information security for supplier relationships — Part 4: Guidelines for security of cloud servicesStandarts spēkā
59688ISO/IEC 27036-3:2013Information technology — Security techniques — Information security for supplier relationships — Part 3: Guidelines for information and communication technology supply chain securityAtcelts
Displaying 421-430 of 774 results.