Registration number (WIID)Project No.TitleStatus
50341ISO/IEC 15408-1:2009Information technology Security techniques Evaluation criteria for IT securityAtcelts
50297ISO/IEC 27002:2005Information technology — Security techniques — Code of practice for information security managementAtcelts
46542ISO/IEC 11770-3:2008Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniquesAtcelts
46541ISO/IEC 15946-5:2009Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 5: Elliptic curve generationAtcelts
46470ISO/IEC 14888-3:2006/Cor 1:2007Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms — Technical Corrigendum 1Atcelts
46447ISO/IEC 18033-3:2005/Cor 2:2007Information technology — Security techniques — Encryption algorithms — Part 3: Block ciphers — Technical Corrigendum 2Atcelts
46435ISO/IEC 18033-3:2005/Cor 3:2008Information technology — Security techniques — Encryption algorithms — Part 3: Block ciphers — Technical Corrigendum 3: .Atcelts
46414ISO/IEC 15408-2:2008Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional componentsAtcelts
46414ISO/IEC 15408-2:2008Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional componentsStandarts spēkā
46414ISO/IEC 15408-2:2008Information technology Security techniques Evaluation criteria for IT securityAtcelts
Displaying 531-540 of 770 results.