ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
27634 | ISO/IEC 15408-3:1999 | Information technology Security techniques Evaluation criteria for IT security | Atcelts |
27634 | ISO/IEC 15408-3:1999 | Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance requirements | Atcelts |
27635 | ISO/IEC CD 15408-4 | Information technology — Security techniques — Evaluation criteria for IT security — Part 4: Security assurance requirements | Izstrādē |
27686 | ISO/IEC WD 15443 | Information technology - Security techniques - A framework for IT security assurance | Izstrādē |
27689 | ISO/IEC CD 15446 | Information technology — Security techniques — Guide for the production of Protection profiles and Security Targets | Izstrādē |
27727 | ISO/IEC 10116:1997 | Information technology — Security techniques — Modes of operation for an n-bit block cipher | Atcelts |
27743 | ISO/IEC 9798-1:1997 | Information technology — Security techniques — Entity authentication — Part 1: General | Atcelts |
27743 | ISO/IEC 9798-1:1997 | Information technology Security techniques Entity authentication | Atcelts |
28107 | ISO/IEC 9979:1999 | Information technology — Security techniques — Procedures for the registration of cryptographic algorithms | Atcelts |
28232 | ISO/IEC 9796-2:1997 | Information technology — Security techniques — Digital signature schemes giving message recovery — Part 2: Mechanisms using a hash-function | Atcelts |
Displaying 41-50 of 770 results.