ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
21136 | ISO/IEC CD 11768-2 | Information technology security techniques — Evaluation criteria for information technology security — Part 2: Functionality of IT systems, products and components | Izstrādē |
87940 | ISO/IEC CD 11770-8 | Information technology — Security techniques — Part 8: Password-based key derivation | Izstrādē |
27635 | ISO/IEC CD 15408-4 | Information technology — Security techniques — Evaluation criteria for IT security — Part 4: Security assurance requirements | Izstrādē |
27689 | ISO/IEC CD 15446 | Information technology — Security techniques — Guide for the production of Protection profiles and Security Targets | Izstrādē |
33930 | ISO/IEC CD 19792 | Information technology — Security techniques — Security evaluation of biometrics | Izstrādē |
78813 | ISO/IEC CD 20009-3 | Information security — Anonymous entity authentication — Part 3: Mechanisms based on blind signatures | Standarts spēkā |
72401 | ISO/IEC CD 20009-3 | Information technology — Security techniques — Anonymous entity authentication — Part 3: Mechanisms based on blind signatures concepts | Izstrādē |
51625 | ISO/IEC CD 24760 | Information Technology — Security Techniques — A Framework for Identity Management | Izstrādē |
84257 | ISO/IEC CD 27000 | Information technology — Security techniques — Information security management systems — Overview and vocabulary | Izstrādē |
85919 | ISO/IEC CD 27003 | Information technology — Security techniques — Information security management systems — Guidance | Izstrādē |
Displaying 481-490 of 770 results.