ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
19682 | ISO/IEC WD 11765 | Security information objects | Izstrādē |
19685 | ISO/IEC WD 11768-3 | Information technology security techniques — Evaluation criteria for information technology security — Part 3: Assurance of IT systems | Izstrādē |
71903 | ISO/IEC 29115:2013/DAmd 1 | Information technology — Security techniques — Entity authentication assurance framework — Amendment 1 | Izstrādē |
71115 | ISO/IEC 29192-2:2012/PDAM 1 | Information technology — Security techniques — Lightweight cryptography — Part 2: Block ciphers — Amendment 1 | Izstrādē |
61006 | ISO/IEC AWI TR 27024 | Information security, cybersecurity and privacy protection — Government and regulatory use of ISO/IEC 27001, ISO/IEC 27002 and other information security standards | Izstrādē |
90013 | ISO/IEC 9797-2:2021/PWI Cor 2 | Information security — Message authentication codes (MACs) — Part 2: Mechanisms using a dedicated hash-function — Technical Corrigendum 2 | Izstrādē |
45272 | ISO/IEC PDTR 29193 | Secure system design principles and techniques | Izstrādē |
72401 | ISO/IEC CD 20009-3 | Information technology — Security techniques — Anonymous entity authentication — Part 3: Mechanisms based on blind signatures concepts | Izstrādē |
28283 | ISO/IEC WD 14516-2 | Guidelines for the use and management of Trusted Third Party (TTP) services — Part 2: Technical aspects | Izstrādē |
25538 | ISO/IEC WD 11770-4 | Information technology — Security techniques — Key management — Part 4: Cryptographic separation | Izstrādē |
Displaying 41-50 of 774 results.