ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
17887 | ISO/IEC 9979:1991 | Data cryptographic techniques — Procedures for the registration of cryptographic algorithms | Atcelts |
28107 | ISO/IEC 9979:1999 | Information technology — Security techniques — Procedures for the registration of cryptographic algorithms | Atcelts |
92016 | ISO/IEC AWI 14888-6 | Information technology — Security techniques — Digital signatures with appendix — Part 6: Part 6: Stateless hash-based mechanisms | Izstrādē |
92416 | ISO/IEC AWI 27007 | Information security, cybersecurity and privacy protection — Guidelines for information security management systems auditing | Izstrādē |
89525 | ISO/IEC AWI 27573 | Privacy protection of user avatar and system avatar interactions in the metaverse | Izstrādē |
61006 | ISO/IEC AWI TR 27024 | Information security, cybersecurity and privacy protection — Government and regulatory use of ISO/IEC 27001, ISO/IEC 27002 and other information security standards | Izstrādē |
80400 | ISO/IEC AWI TS 27568 | Security and privacy of digital twins | Izstrādē |
21136 | ISO/IEC CD 11768-2 | Information technology security techniques — Evaluation criteria for information technology security — Part 2: Functionality of IT systems, products and components | Izstrādē |
88130 | ISO/IEC CD 11770-4 | Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets | Izstrādē |
27635 | ISO/IEC CD 15408-4 | Information technology — Security techniques — Evaluation criteria for IT security — Part 4: Security assurance requirements | Izstrādē |
Displaying 471-480 of 774 results.