Registration number (WIID)Project No.TitleStatus
53473ISO/IEC 11770-2:2008/Cor 1:2009Information technology — Security techniques — Key management — Part 2: Mechanisms using symmetric techniques — Technical Corrigendum 1Atcelts
53475ISO/IEC 11770-4:2006/Cor 1:2009Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets — Technical Corrigendum 1Atcelts
33441ISO/IEC 17799:2000Information technology — Code of practice for information security managementAtcelts
68529ISO/IEC 19790:2012/Cor 1:2015Information technology — Security techniques — Security requirements for cryptographic modules — Technical Corrigendum 1Atcelts
51579ISO/IEC 9798-3:1998/Amd 1:2010Information technology — Security techniques — Entity authentication — Part 3: Mechanisms using digital signature techniques — Amendment 1: .Atcelts
38761ISO/IEC 10116:2006Information technology — Security techniques — Modes of operation for an n-bit block cipherAtcelts
60612ISO/IEC 17825:2016Information technology — Security techniques — Testing methods for the mitigation of non-invasive attack classes against cryptographic modulesAtcelts
42106ISO/IEC 27004:2009Information technology — Security techniques — Information security management — MeasurementAtcelts
27727ISO/IEC 10116:1997Information technology — Security techniques — Modes of operation for an n-bit block cipherAtcelts
17662ISO/IEC 9798-2:1994Information technology — Security techniques — Entity authentication — Part 2: Mechanisms using symmetric encipherment algorithmsAtcelts
Displaying 461-470 of 774 results.