ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 56551 | ISO/IEC 14888-3:2006/Amd 2:2012 | Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms — Amendment 2: Optimizing hash inputs | Atcelts |
| 56427 | ISO/IEC 29192-4:2013 | Information technology — Security techniques — Lightweight cryptography — Part 4: Mechanisms using asymmetric techniques | Standarts spēkā |
| 56426 | ISO/IEC 29192-3:2012 | Information technology — Security techniques — Lightweight cryptography — Part 3: Stream ciphers | Standarts spēkā |
| 56425 | ISO/IEC 29192-1:2012 | Information technology — Security techniques — Lightweight cryptography — Part 1: General | Standarts spēkā |
| 55585 | ISO/IEC 27034-5:2017 | Information technology — Security techniques — Application security — Part 5: Protocols and application security controls data structure | Standarts spēkā |
| 55584 | ISO/IEC NP 27034-4 | Information technology — Security techniques — Application security — Part 4: Application security validation | Standarts spēkā |
| 55583 | ISO/IEC 27034-3:2018 | Information technology — Application security — Part 3: Application security management process | Standarts spēkā |
| 55582 | ISO/IEC 27034-2:2015 | Information technology — Security techniques — Application security — Part 2: Organization normative framework | Atcelts |
| 55579 | ISO/IEC NP 15443-3 | Information technology — Security techniques — A framework for IT security assurance — Part 3: Analysis of assurance methods | Izstrādē |
| 55578 | ISO/IEC NP 15443-2 | Information technology — Security techniques — A framework for IT security assurance — Part 2: Assurance methods | Izstrādē |
Displaying 491-500 of 807 results.
