Registration number (WIID)Project No.TitleStatus
54533ISO/IEC 27002:2013Information technology — Security techniques — Code of practice for information security controlsAtcelts
69378ISO/IEC 27001:2013/Cor 2:2015Information technology — Security techniques — Information security management systems — Requirements — Technical Corrigendum 2Atcelts
43181ISO/IEC 10118-3:2004/Amd 1:2006Information technology — Security techniques — Hash-functions — Part 3: Dedicated hash-functions — Amendment 1: Dedicated Hash-Function 8 (SHA-224)Atcelts
33928ISO/IEC 19790:2006Information technology — Security techniques — Security requirements for cryptographic modulesAtcelts
52946ISO/IEC 24745:2011Information technology — Security techniques — Biometric information protectionAtcelts
39720ISO/IEC 9798-5:2004Information technology — Security techniques — Entity authentication — Part 5: Mechanisms using zero-knowledge techniquesAtcelts
44404ISO/IEC 27040:2015Information technology — Security techniques — Storage securityAtcelts
45123ISO/IEC 29100:2011Information technology — Security techniques — Privacy frameworkAtcelts
54945ISO/IEC 18031:2011Information technology — Security techniques — Random bit generationAtcelts
39984ISO/IEC 9798-2:1999/Cor 1:2004Information technology — Security techniques — Entity authentication — Part 2: Mechanisms using symmetric encipherment algorithms — Technical Corrigendum 1Atcelts
Displaying 481-490 of 770 results.