Registration number (WIID)Project No.TitleStatus
63461ISO/IEC 27033-1:2015Information technology — Security techniques — Network security — Part 1: Overview and conceptsAtcelts
18105ISO/IEC 10118-2:1994Information technology — Security techniques — Hash-functions — Part 2: Hash-functions using an n-bit block cipher algorithmAtcelts
62325ISO/IEC 15946-5:2009/Cor 1:2012Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 5: Elliptic curve generation — Technical Corrigendum 1Atcelts
52087ISO/IEC 18031:2005/Cor 1:2009Information technology — Security techniques — Random bit generation — Technical Corrigendum 1Atcelts
39066ISO/IEC 13335-1:2004Information technology — Security techniques — Management of information and communications technology security — Part 1: Concepts and models for information and communications technology security managementAtcelts
45169ISO/IEC 29146:2016Information technology — Security techniques — A framework for access managementAtcelts
64143ISO/IEC 27011:2016Information technology — Security techniques — Code of practice for Information security controls based on ISO/IEC 27002 for telecommunications organizationsAtcelts
66806ISO/IEC 27002:2013/Cor 1:2014Information technology — Security techniques — Code of practice for information security controls — Technical Corrigendum 1Atcelts
51521ISO/IEC 19792:2009Information technology — Security techniques — Security evaluation of biometricsAtcelts
18104ISO/IEC 10118-1:1994Information technology — Security techniques — Hash-functions — Part 1: GeneralAtcelts
Displaying 431-440 of 807 results.