Registration number (WIID)Project No.TitleStatus
28232ISO/IEC 9796-2:1997Information technology — Security techniques — Digital signature schemes giving message recovery — Part 2: Mechanisms using a hash-functionAtcelts
42105ISO/IEC 27003:2010Information technology Security techniques Information security management system implementation guidanceAtcelts
56742ISO/IEC 27005:2011Information technology Security techniques Information security risk managementAtcelts
35396ISO/IEC TR 18044:2004Information technology — Security techniques — Information security incident managementAtcelts
69726ISO/IEC 15946-5:2017Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 5: Elliptic curve generationAtcelts
66435ISO/IEC 27000:2016Information technology — Security techniques — Information security management systems — Overview and vocabularyAtcelts
60803ISO/IEC 27035-1:2016Information technology — Security techniques — Information security incident management — Part 1: Principles of incident managementAtcelts
69378ISO/IEC 27001:2013/Cor 2:2015Information technology — Security techniques — Information security management systems — Requirements — Technical Corrigendum 2Atcelts
25898ISO/IEC 9798-5:1999Information technology — Security techniques — Entity authentication — Part 5: Mechanisms using zero knowledge techniquesAtcelts
51579ISO/IEC 9798-3:1998/Amd 1:2010Information technology — Security techniques — Entity authentication — Part 3: Mechanisms using digital signature techniques — Amendment 1: .Atcelts
Displaying 441-450 of 793 results.