ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 23230 | ISO/IEC 13888-2:1998 | Information technology — Security techniques — Non-repudiation — Part 2: Mechanisms using symmetric techniques | Atcelts |
| 18102 | ISO/IEC 10116:1991 | Information technology — Modes of operation for an n-bit block cipher algorithm | Atcelts |
| 30817 | ISO/IEC 18032:2005 | Information technology — Security techniques — Prime number generation | Atcelts |
| 67398 | ISO/IEC 27007:2017 | Information technology — Security techniques — Guidelines for information security management systems auditing | Atcelts |
| 35396 | ISO/IEC TR 18044:2004 | Information technology Security techniques Information security incident management | Atcelts |
| 24273 | ISO/IEC 9798-4:1995 | Information technology — Security techniques — Entity authentication — Part 4: Mechanisms using a cryptographic check function | Atcelts |
| 60365 | ISO/IEC 9798-2:2008/Cor 2:2012 | Information technology — Security techniques — Entity authentication — Part 2: Mechanisms using symmetric encipherment algorithms — Technical Corrigendum 2 | Atcelts |
| 73907 | ISO/IEC 27009:2020 | Information security, cybersecurity and privacy protection — Sector-specific application of ISO/IEC 27001 — Requirements | Atcelts |
| 52906 | ISO/IEC 19790:2012 | Information technology — Security techniques — Security requirements for cryptographic modules | Atcelts |
| 21733 | ISO/IEC TR 13335-1:1996 | Information technology — Guidelines for the management of IT Security — Part 1: Concepts and models for IT Security | Atcelts |
Displaying 431-440 of 793 results.
