ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
18105 | ISO/IEC 10118-2:1994 | Information technology — Security techniques — Hash-functions — Part 2: Hash-functions using an n-bit block cipher algorithm | Atcelts |
62325 | ISO/IEC 15946-5:2009/Cor 1:2012 | Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 5: Elliptic curve generation — Technical Corrigendum 1 | Atcelts |
52087 | ISO/IEC 18031:2005/Cor 1:2009 | Information technology — Security techniques — Random bit generation — Technical Corrigendum 1 | Atcelts |
61005 | ISO/IEC TR 27023:2015 | Information technology — Security techniques — Mapping the revised editions of ISO/IEC 27001 and ISO/IEC 27002 | Atcelts |
39066 | ISO/IEC 13335-1:2004 | Information technology — Security techniques — Management of information and communications technology security — Part 1: Concepts and models for information and communications technology security management | Atcelts |
45169 | ISO/IEC 29146:2016 | Information technology — Security techniques — A framework for access management | Atcelts |
64143 | ISO/IEC 27011:2016 | Information technology — Security techniques — Code of practice for Information security controls based on ISO/IEC 27002 for telecommunications organizations | Atcelts |
73721 | ISO/IEC 19989-3:2020 | Information security — Criteria and methodology for security evaluation of biometric systems — Part 3: Presentation attack detection | Atcelts |
65459 | ISO/IEC TS 19608:2018 | Guidance for developing security and privacy functional requirements based on ISO/IEC 15408 | Atcelts |
56890 | ISO/IEC TS 30104:2015 | Information Technology — Security Techniques — Physical Security Attacks, Mitigation Techniques and Security Requirements | Atcelts |
Displaying 481-490 of 774 results.