Registration number (WIID)Project No.TitleStatus
56889ISO/IEC 27039:2015Information technology — Security techniques — Selection, deployment and operations of intrusion detection and prevention systems (IDPS)Atcelts
54534ISO/IEC 27001:2013Information technology — Security techniques — Information security management systems — RequirementsAtcelts
39978ISO/IEC 18033-4:2005Information technology — Security techniques — Encryption algorithms — Part 4: Stream ciphersAtcelts
40012ISO/IEC 18028-5:2006Information technology — Security techniques — IT network security — Part 5: Securing communications across networks using virtual private networksAtcelts
31077ISO/IEC 15946-3:2002Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 3: Key establishmentAtcelts
34930ISO/IEC 15946-4:2004Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 4: Digital signatures giving message recoveryAtcelts
52202ISO/IEC 15946-1:2008/Cor 1:2009Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 1: General — Technical Corrigendum 1Atcelts
1439ISO/IEC 14888-1:1998Information technology — Security techniques — Digital signatures with appendix — Part 1: GeneralAtcelts
46381ISO/IEC 17799:2005/Cor 1:2007Information technology — Security techniques — Code of practice for information security management — Technical Corrigendum 1Atcelts
56891ISO/IEC 27000:2012Information technology — Security techniques — Information security management systems — Overview and vocabularyAtcelts
Displaying 531-540 of 791 results.