Registration number (WIID)Project No.TitleStatus
35396ISO/IEC TR 18044:2004Information technology Security techniques Information security incident managementAtcelts
39978ISO/IEC 18033-4:2005Information technology — Security techniques — Encryption algorithms — Part 4: Stream ciphersAtcelts
40012ISO/IEC 18028-5:2006Information technology — Security techniques — IT network security — Part 5: Securing communications across networks using virtual private networksAtcelts
31077ISO/IEC 15946-3:2002Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 3: Key establishmentAtcelts
64138ISO/IEC 27013:2015Information technology — Security techniques — Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1Atcelts
17661ISO/IEC 9798-1:1991Information technology — Security techniques — Entity authentication mechanisms — Part 1: General modelAtcelts
34930ISO/IEC 15946-4:2004Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 4: Digital signatures giving message recoveryAtcelts
52202ISO/IEC 15946-1:2008/Cor 1:2009Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 1: General — Technical Corrigendum 1Atcelts
1439ISO/IEC 14888-1:1998Information technology — Security techniques — Digital signatures with appendix — Part 1: GeneralAtcelts
46381ISO/IEC 17799:2005/Cor 1:2007Information technology — Security techniques — Code of practice for information security management — Technical Corrigendum 1Atcelts
Displaying 511-520 of 791 results.