Registration number (WIID)Project No.TitleStatus
43754ISO/IEC 27014:2013Information technology — Security techniques — Governance of information securityAtcelts
69378ISO/IEC 27001:2013/Cor 2:2015Information technology — Security techniques — Information security management systems — Requirements — Technical Corrigendum 2Atcelts
43181ISO/IEC 10118-3:2004/Amd 1:2006Information technology — Security techniques — Hash-functions — Part 3: Dedicated hash-functions — Amendment 1: Dedicated Hash-Function 8 (SHA-224)Atcelts
33928ISO/IEC 19790:2006Information technology — Security techniques — Security requirements for cryptographic modulesAtcelts
52946ISO/IEC 24745:2011Information technology — Security techniques — Biometric information protectionAtcelts
39720ISO/IEC 9798-5:2004Information technology — Security techniques — Entity authentication — Part 5: Mechanisms using zero-knowledge techniquesAtcelts
39984ISO/IEC 9798-2:1999/Cor 1:2004Information technology — Security techniques — Entity authentication — Part 2: Mechanisms using symmetric encipherment algorithms — Technical Corrigendum 1Atcelts
31076ISO/IEC 15946-2:2002Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 2: Digital signaturesAtcelts
54530ISO/IEC 18033-1:2015Information technology — Security techniques — Encryption algorithms — Part 1: GeneralAtcelts
63411ISO/IEC 27000:2014Information technology — Security techniques — Information security management systems — Overview and vocabularyAtcelts
Displaying 441-450 of 774 results.