ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 28232 | ISO/IEC 9796-2:1997 | Information technology — Security techniques — Digital signature schemes giving message recovery — Part 2: Mechanisms using a hash-function | Atcelts |
| 42105 | ISO/IEC 27003:2010 | Information technology Security techniques Information security management system implementation guidance | Atcelts |
| 56742 | ISO/IEC 27005:2011 | Information technology Security techniques Information security risk management | Atcelts |
| 35396 | ISO/IEC TR 18044:2004 | Information technology — Security techniques — Information security incident management | Atcelts |
| 69726 | ISO/IEC 15946-5:2017 | Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 5: Elliptic curve generation | Atcelts |
| 66435 | ISO/IEC 27000:2016 | Information technology — Security techniques — Information security management systems — Overview and vocabulary | Atcelts |
| 60803 | ISO/IEC 27035-1:2016 | Information technology — Security techniques — Information security incident management — Part 1: Principles of incident management | Atcelts |
| 69378 | ISO/IEC 27001:2013/Cor 2:2015 | Information technology — Security techniques — Information security management systems — Requirements — Technical Corrigendum 2 | Atcelts |
| 25898 | ISO/IEC 9798-5:1999 | Information technology — Security techniques — Entity authentication — Part 5: Mechanisms using zero knowledge techniques | Atcelts |
| 51579 | ISO/IEC 9798-3:1998/Amd 1:2010 | Information technology — Security techniques — Entity authentication — Part 3: Mechanisms using digital signature techniques — Amendment 1: . | Atcelts |
Displaying 441-450 of 793 results.
