Registration number (WIID)Project No.TitleStatus
17663ISO/IEC 9798-3:1993Information technology — Security techniques — Entity authentication mechanisms — Part 3: Entity authentication using a public key algorithmAtcelts
61498ISO/IEC 27018:2014Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processorsAtcelts
56889ISO/IEC 27039:2015Information technology — Security techniques — Selection, deployment and operations of intrusion detection and prevention systems (IDPS)Atcelts
54534ISO/IEC 27001:2013Information technology — Security techniques — Information security management systems — RequirementsAtcelts
39978ISO/IEC 18033-4:2005Information technology — Security techniques — Encryption algorithms — Part 4: Stream ciphersAtcelts
40012ISO/IEC 18028-5:2006Information technology — Security techniques — IT network security — Part 5: Securing communications across networks using virtual private networksAtcelts
31077ISO/IEC 15946-3:2002Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 3: Key establishmentAtcelts
64138ISO/IEC 27013:2015Information technology — Security techniques — Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1Atcelts
34930ISO/IEC 15946-4:2004Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 4: Digital signatures giving message recoveryAtcelts
52202ISO/IEC 15946-1:2008/Cor 1:2009Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 1: General — Technical Corrigendum 1Atcelts
Displaying 501-510 of 791 results.