Registration number (WIID)Project No.TitleStatus
18105ISO/IEC 10118-2:1994Information technology — Security techniques — Hash-functions — Part 2: Hash-functions using an n-bit block cipher algorithmAtcelts
62325ISO/IEC 15946-5:2009/Cor 1:2012Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 5: Elliptic curve generation — Technical Corrigendum 1Atcelts
52087ISO/IEC 18031:2005/Cor 1:2009Information technology — Security techniques — Random bit generation — Technical Corrigendum 1Atcelts
39066ISO/IEC 13335-1:2004Information technology — Security techniques — Management of information and communications technology security — Part 1: Concepts and models for information and communications technology security managementAtcelts
45169ISO/IEC 29146:2016Information technology — Security techniques — A framework for access managementAtcelts
64143ISO/IEC 27011:2016Information technology — Security techniques — Code of practice for Information security controls based on ISO/IEC 27002 for telecommunications organizationsAtcelts
73721ISO/IEC 19989-3:2020Information security — Criteria and methodology for security evaluation of biometric systems — Part 3: Presentation attack detectionAtcelts
57916ISO/IEC 24760-3:2016Information technology — Security techniques — A framework for identity management — Part 3: PracticeAtcelts
66806ISO/IEC 27002:2013/Cor 1:2014Information technology — Security techniques — Code of practice for information security controls — Technical Corrigendum 1Atcelts
51521ISO/IEC 19792:2009Information technology — Security techniques — Security evaluation of biometricsAtcelts
Displaying 461-470 of 791 results.