ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
84986 | ISO/IEC PWI 4922-3 | Secure multiparty computation — Part 3: Mechanisms based on garbled circuit | Izstrādē |
84989 | ISO/IEC FDIS 19896-3 | Information security, cybersecurity and privacy protection — Requirements for the competence of IT security conformance assessment body personnel — Part 3: Knowledge and skills requirements for evaluators and reviewers according to the ISO/IEC 15408 series and ISO/IEC 18045 | Izstrādē |
84999 | ISO/IEC PWI 29128-2 | Information security, cybersecurity and privacy protection — Verification of Cryptographic Protocols — Part 2: Evaluation Methods and Activities for Cryptographic Protocols | Izstrādē |
85008 | ISO/IEC PWI 6109 | Guidelines for data security monitoring based on logging | Izstrādē |
83197 | ISO/IEC PWI 29128-3 | Information security — Verification of cryptographic protocols — Part 3: Part 3: Evaluation Methods and Activities for Protocol Implementation Verification | Izstrādē |
52909 | ISO/IEC NP TR 15443-3 | Information technology — Security techniques — A framework for IT security assurance — Part 3: Analysis of assurance methods | Izstrādē |
88125 | ISO/IEC PWI 24841 | Inclusion of NTRU in ISO/IEC JTC 1/SC 27/WG 2 standards | Izstrādē |
88127 | ISO/IEC PWI 24843 | Privacy-preserving attribute-based credentials | Izstrādē |
88121 | ISO/IEC PWI 24836 | Inclusion of oblivious transfer in ISO/IEC JTC 1/SC 27/WG 2 standards | Izstrādē |
88122 | ISO/IEC PWI 24838 | Inclusion of new tweakable cipher mechanisms in 18033-7 | Izstrādē |
Displaying 541-550 of 774 results.