ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 61003 | ISO/IEC 27021:2017 | Information technology — Security techniques — Competence requirements for information security management systems professionals | Standarts spēkā |
| 60804 | ISO/IEC 27034-6:2016 | Information technology — Security techniques — Application security — Part 6: Case studies | Standarts spēkā |
| 60803 | ISO/IEC 27035-1:2016 | Information technology — Security techniques — Information security incident management — Part 1: Principles of incident management | Atcelts |
| 60612 | ISO/IEC 17825:2016 | Information technology — Security techniques — Testing methods for the mitigation of non-invasive attack classes against cryptographic modules | Atcelts |
| 60475 | ISO/IEC 10118-3:2004/Cor 1:2011 | Information technology — Security techniques — Hash-functions — Part 3: Dedicated hash-functions — Technical Corrigendum 1 | Atcelts |
| 60412 | ISO/IEC NP 20009-3 | Information technology — Security techniques — Anonymous entity authentication — Part 3: Mechanisms based on blind signatures | Standarts spēkā |
| 60367 | ISO/IEC 9798-4:1999/CD Cor 2 | Information technology — Security techniques — Entity authentication — Part 4: Mechanisms using a cryptographic check function — Technical Corrigendum 2 | Izstrādē |
| 60366 | ISO/IEC 9798-3:1998/Cor 2:2012 | Information technology — Security techniques — Entity authentication — Part 3: Mechanisms using digital signature techniques — Technical Corrigendum 2 | Atcelts |
| 60365 | ISO/IEC 9798-2:2008/Cor 2:2012 | Information technology — Security techniques — Entity authentication — Part 2: Mechanisms using symmetric encipherment algorithms — Technical Corrigendum 2 | Atcelts |
| 60237 | ISO/IEC 11770-3:2015 | Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques | Atcelts |
Displaying 431-440 of 793 results.
