Registration number (WIID)Project No.TitleStatus
30830ISO/IEC 18045:2005Information technology — Security techniques — Methodology for IT security evaluationAtcelts
44884ISO/IEC 10118-2:2000/Cor 1:2006Information technology — Security techniques — Hash-functions — Part 2: Hash-functions using an n-bit block cipher — Technical Corrigendum 1Atcelts
76559ISO/IEC 27018:2019Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processorsAtcelts
72437ISO/IEC TR 27103:2018Information technology — Security techniques — Cybersecurity and ISO and IEC StandardsAtcelts
45269ISO/IEC 29190:2015Information technology — Security techniques — Privacy capability assessment modelAtcelts
62313ISO/IEC 27006:2015Information technology — Security techniques — Requirements for bodies providing audit and certification of information security management systemsAtcelts
50457ISO/IEC 18014-3:2009Information technology — Security techniques — Time-stamping services — Part 3: Mechanisms producing linked tokensAtcelts
66558ISO/IEC 18031:2011/Cor 1:2014Information technology — Security techniques — Random bit generation — Technical Corrigendum 1Atcelts
23230ISO/IEC 13888-2:1998Information technology — Security techniques — Non-repudiation — Part 2: Mechanisms using symmetric techniquesAtcelts
72917ISO/IEC 15408-5:2022Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 5: Pre-defined packages of security requirementsAtcelts
Displaying 501-510 of 807 results.