ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
56742 | ISO/IEC 27005:2011 | Information technology — Security techniques — Information security risk management | Atcelts |
25995 | ISO/IEC 14888-2:1999 | Information technology — Security techniques — Digital signatures with appendix — Part 2: Identity-based mechanisms | Atcelts |
39612 | ISO/IEC 17799:2005 | Information technology Security techniques Code of practice for information security management | Atcelts |
53613 | ISO/IEC 14888-3:2006/Amd 1:2010 | Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms — Amendment 1: Elliptic Curve Russian Digital Signature Algorithm, Schnorr Digital Signature Algorithm, Elliptic Curve Schnorr Digital Signature Algorithm, and Elliptic Curve Full Schnorr Digital Signature Algorithm | Atcelts |
37970 | ISO/IEC 18033-1:2005 | Information technology Security techniques Encryption algorithms | Atcelts |
50432 | ISO/IEC 13888-1:2009 | Information technology -- Security techniques -- Non-repudiation | Atcelts |
42105 | ISO/IEC 27003:2010 | Information technology — Security techniques — Information security management system implementation guidance | Atcelts |
23229 | ISO/IEC 13888-1:1997 | Information technology — Security techniques — Non-repudiation — Part 1: General | Atcelts |
42506 | ISO/IEC 27007:2011 | Information technology — Security techniques — Guidelines for information security management systems auditing | Atcelts |
40009 | ISO/IEC 18028-2:2006 | Information technology — Security techniques — IT network security — Part 2: Network security architecture | Atcelts |
Displaying 501-510 of 770 results.