Registration number (WIID)Project No.TitleStatus
85850ISO/IEC DIS 29128-2Information security, cybersecurity and privacy protection — Verification of Cryptographic Protocols — Part 2: Evaluation Methods and Activities for Cryptographic ProtocolsAptauja slēgta
85851ISO/IEC DIS 29128-3Information security, cybersecurity and privacy protection — Verification of cryptographic protocols — Part 3: Evaluation methods and activities for protocol implementation verificationAptauja
87557ISO/IEC DIS 4922-3Information security — Secure multiparty computation — Part 3: Mechanisms based on garbled circuitsIzstrādē
87375ISO/IEC DTS 5689Cybersecurity — Security frameworks and use cases for cyber physical systemsIzstrādē
38853ISO/IEC FCD 24743Information technology — Security techniques — Information security management systems requirements specificationIzstrādē
31389ISO/IEC FCD 9796-1Information technology — Security techniques — Digital signature scheme giving message recovery — Part 1: Mechanisms using redundancyIzstrādē
88135ISO/IEC FDIS 15408-2Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 2: Security functional componentsIzstrādē
88136ISO/IEC FDIS 15408-3Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 3: Security assurance componentsIzstrādē
84257ISO/IEC FDIS 27000Information security, cybersecurity and privacy protection — Information security management systems — OverviewIzstrādē
82878ISO/IEC FDIS 27017Information security, cybersecurity and privacy protection — Information security controls based on ISO/IEC 27002 for cloud servicesIzstrādē
Displaying 531-540 of 793 results.