Registration number (WIID)Project No.TitleStatus
56742ISO/IEC 27005:2011Information technology — Security techniques — Information security risk managementAtcelts
25995ISO/IEC 14888-2:1999Information technology — Security techniques — Digital signatures with appendix — Part 2: Identity-based mechanismsAtcelts
39612ISO/IEC 17799:2005Information technology Security techniques Code of practice for information security managementAtcelts
53613ISO/IEC 14888-3:2006/Amd 1:2010Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms — Amendment 1: Elliptic Curve Russian Digital Signature Algorithm, Schnorr Digital Signature Algorithm, Elliptic Curve Schnorr Digital Signature Algorithm, and Elliptic Curve Full Schnorr Digital Signature AlgorithmAtcelts
37970ISO/IEC 18033-1:2005Information technology Security techniques Encryption algorithmsAtcelts
50432ISO/IEC 13888-1:2009Information technology -- Security techniques -- Non-repudiationAtcelts
42105ISO/IEC 27003:2010Information technology — Security techniques — Information security management system implementation guidanceAtcelts
23229ISO/IEC 13888-1:1997Information technology — Security techniques — Non-repudiation — Part 1: GeneralAtcelts
42506ISO/IEC 27007:2011Information technology — Security techniques — Guidelines for information security management systems auditingAtcelts
40009ISO/IEC 18028-2:2006Information technology — Security techniques — IT network security — Part 2: Network security architectureAtcelts
Displaying 501-510 of 770 results.