Registration number (WIID)Project No.TitleStatus
53474ISO/IEC 11770-3:2008/Cor 1:2009Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques — Technical Corrigendum 1Atcelts
53473ISO/IEC 11770-2:2008/Cor 1:2009Information technology — Security techniques — Key management — Part 2: Mechanisms using symmetric techniques — Technical Corrigendum 1Atcelts
53472ISO/IEC 9798-6:2005/Cor 1:2009Information technology — Security techniques — Entity authentication — Part 6: Mechanisms using manual data transfer — Technical Corrigendum 1Atcelts
53471ISO/IEC 9798-4:1999/Cor 1:2009Information technology — Security techniques — Entity authentication — Part 4: Mechanisms using a cryptographic check function — Technical Corrigendum 1Standarts spēkā
53470ISO/IEC 9798-3:1998/Cor 1:2009Information technology — Security techniques — Entity authentication — Part 3: Mechanisms using digital signature techniques — Technical Corrigendum 1Atcelts
53469ISO/IEC 9798-2:2008/Cor 1:2010Information technology — Security techniques — Entity authentication — Part 2: Mechanisms using symmetric encipherment algorithms — Technical Corrigendum 1Atcelts
53456ISO/IEC 11770-1:2010Information technology — Security techniques — Key management — Part 1: FrameworkStandarts spēkā
53247ISO/IEC WD TR 30127Information technology — Security techniques — Detailing software penetration testing under ISO/IEC 15408 and ISO/IEC 18045 vulnerability analysisIzstrādē
53231ISO/IEC 30111:2013Information technology — Security techniques — Vulnerability handling processesAtcelts
52946ISO/IEC 24745:2011Information technology — Security techniques — Biometric information protectionAtcelts
Displaying 481-490 of 770 results.