Registration number (WIID)Project No.TitleStatus
18105ISO/IEC 10118-2:1994Information technology — Security techniques — Hash-functions — Part 2: Hash-functions using an n-bit block cipher algorithmAtcelts
62325ISO/IEC 15946-5:2009/Cor 1:2012Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 5: Elliptic curve generation — Technical Corrigendum 1Atcelts
52087ISO/IEC 18031:2005/Cor 1:2009Information technology — Security techniques — Random bit generation — Technical Corrigendum 1Atcelts
61005ISO/IEC TR 27023:2015Information technology — Security techniques — Mapping the revised editions of ISO/IEC 27001 and ISO/IEC 27002Atcelts
39066ISO/IEC 13335-1:2004Information technology — Security techniques — Management of information and communications technology security — Part 1: Concepts and models for information and communications technology security managementAtcelts
45169ISO/IEC 29146:2016Information technology — Security techniques — A framework for access managementAtcelts
64143ISO/IEC 27011:2016Information technology — Security techniques — Code of practice for Information security controls based on ISO/IEC 27002 for telecommunications organizationsAtcelts
73721ISO/IEC 19989-3:2020Information security — Criteria and methodology for security evaluation of biometric systems — Part 3: Presentation attack detectionAtcelts
65459ISO/IEC TS 19608:2018Guidance for developing security and privacy functional requirements based on ISO/IEC 15408Atcelts
56890ISO/IEC TS 30104:2015Information Technology — Security Techniques — Physical Security Attacks, Mitigation Techniques and Security RequirementsAtcelts
Displaying 481-490 of 774 results.