Registration number (WIID)Project No.TitleStatus
43181ISO/IEC 10118-3:2004/Amd 1:2006Information technology — Security techniques — Hash-functions — Part 3: Dedicated hash-functions — Amendment 1: Dedicated Hash-Function 8 (SHA-224)Atcelts
33928ISO/IEC 19790:2006Information technology — Security techniques — Security requirements for cryptographic modulesAtcelts
52946ISO/IEC 24745:2011Information technology — Security techniques — Biometric information protectionAtcelts
39720ISO/IEC 9798-5:2004Information technology — Security techniques — Entity authentication — Part 5: Mechanisms using zero-knowledge techniquesAtcelts
39984ISO/IEC 9798-2:1999/Cor 1:2004Information technology — Security techniques — Entity authentication — Part 2: Mechanisms using symmetric encipherment algorithms — Technical Corrigendum 1Atcelts
31076ISO/IEC 15946-2:2002Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 2: Digital signaturesAtcelts
63411ISO/IEC 27000:2014Information technology — Security techniques — Information security management systems — Overview and vocabularyAtcelts
86889ISO/IEC 29192-1:2012/DAmd 1Information technology — Security techniques — Lightweight cryptography — Part 1: General — Amendment 1Aptauja
56581ISO/IEC DIS 27090Cybersecurity — Artificial Intelligence — Guidance for addressing security threats to artificial intelligence systemsAptauja
61007ISO/IEC DIS 27028Information security, cyber security and privacy protection — Guidance on ISO/IEC 27002 attributesAptauja
Displaying 511-520 of 770 results.