Registration number (WIID)Project No.TitleStatus
82933ISO/IEC 29146:2016/Amd 1:2022Information technology — Security techniques — A framework for access management — Amendment 1Atcelts
42107ISO/IEC 27005:2008Information technology — Security techniques — Information security risk managementAtcelts
51580ISO/IEC 27033-1:2009Information technology — Security techniques — Network security — Part 1: Overview and conceptsAtcelts
25537ISO/IEC 11770-3:1999Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniquesAtcelts
40009ISO/IEC 18028-2:2006Information technology — Security techniques — IT network security — Part 2: Network security architectureAtcelts
39723ISO/IEC 11770-4:2006Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secretsAtcelts
30817ISO/IEC 18032:2005Information technology — Security techniques — Prime number generationAtcelts
21733ISO/IEC TR 13335-1:1996Information technology — Guidelines for the management of IT Security — Part 1: Concepts and models for IT SecurityAtcelts
27634ISO/IEC 15408-3:1999Information technology Security techniques Evaluation criteria for IT securityAtcelts
39876ISO/IEC 10118-3:2004Information technology — Security techniques — Hash-functions — Part 3: Dedicated hash-functionsAtcelts
Displaying 511-520 of 774 results.