Registration number (WIID)Project No.TitleStatus
43759ISO/IEC TR 27019:2013Information technology — Security techniques — Information security management guidelines based on ISO/IEC 27002 for process control systems specific to the energy utility industryAtcelts
30816ISO/IEC 18031:2005Information technology — Security techniques — Random bit generationAtcelts
46413ISO/IEC 15408-3:2008Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance componentsAtcelts
37970ISO/IEC 18033-1:2005Information technology — Security techniques — Encryption algorithms — Part 1: GeneralAtcelts
72515ISO/IEC 24759:2017Information technology — Security techniques — Test requirements for cryptographic modulesAtcelts
46345ISO/IEC 19772:2009Information technology — Security techniques — Authenticated encryptionAtcelts
51024ISO/IEC 18033-4:2005/Amd 1:2009Information technology — Security techniques — Encryption algorithms — Part 4: Stream ciphers — Amendment 1: Rabbit and DecimAtcelts
44375ISO/IEC 27032:2012Information technology — Security techniques — Guidelines for cybersecurityAtcelts
45244ISO/IEC TR 27008:2011Information technology — Security techniques — Guidelines for auditors on information security controlsAtcelts
59648ISO/IEC 27036-1:2014Information technology — Security techniques — Information security for supplier relationships — Part 1: Overview and conceptsAtcelts
Displaying 501-510 of 770 results.