Registration number (WIID)Project No.TitleStatus
44715ISO/IEC TR 15446:2009Information technology — Security techniques — Guide for the production of Protection Profiles and Security TargetsAtcelts
44379ISO/IEC 27035:2011Information technology — Security techniques — Information security incident managementAtcelts
34388ISO/IEC 18014-3:2004Information technology — Security techniques — Time-stamping services — Part 3: Mechanisms producing linked tokensAtcelts
46447ISO/IEC 18033-3:2005/Cor 2:2007Information technology — Security techniques — Encryption algorithms — Part 3: Block ciphers — Technical Corrigendum 2Atcelts
51618ISO/IEC 9797-2:2011Information technology — Security techniques — Message Authentication Codes (MACs) — Part 2: Mechanisms using a dedicated hash-functionAtcelts
50482ISO/IEC 18014-2:2009Information technology — Security techniques — Time-stamping services — Part 2: Mechanisms producing independent tokensAtcelts
43753ISO/IEC 27013:2012Information technology Security techniques Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1Atcelts
46413ISO/IEC 15408-3:2008Information technology Security techniques Evaluation criteria for IT securityAtcelts
45244ISO/IEC TR 27008:2011Information technology Security techniques Guidelines for auditors on information security controlsAtcelts
60366ISO/IEC 9798-3:1998/Cor 2:2012Information technology — Security techniques — Entity authentication — Part 3: Mechanisms using digital signature techniques — Technical Corrigendum 2Atcelts
Displaying 441-450 of 807 results.