Registration number (WIID)Project No.TitleStatus
53231ISO/IEC 30111:2013Information technology — Security techniques — Vulnerability handling processesAtcelts
27632ISO/IEC 15408-1:1999Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general modelAtcelts
56742ISO/IEC 27005:2011Information technology — Security techniques — Information security risk managementAtcelts
27632ISO/IEC 15408-1:1999Information technology Security techniques Evaluation criteria for IT securityAtcelts
52498ISO/IEC 14888-3:2006/Cor 2:2009Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms — Technical Corrigendum 2Atcelts
43754ISO/IEC 27014:2013Information technology — Security techniques — Governance of information securityAtcelts
64136ISO/IEC 15946-1:2008/Cor 2:2014Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 1: General — Technical Corrigendum 2Atcelts
69378ISO/IEC 27001:2013/Cor 2:2015Information technology — Security techniques — Information security management systems — Requirements — Technical Corrigendum 2Atcelts
43181ISO/IEC 10118-3:2004/Amd 1:2006Information technology — Security techniques — Hash-functions — Part 3: Dedicated hash-functions — Amendment 1: Dedicated Hash-Function 8 (SHA-224)Atcelts
33928ISO/IEC 19790:2006Information technology — Security techniques — Security requirements for cryptographic modulesAtcelts
Displaying 481-490 of 770 results.