ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 66435 | ISO/IEC 27000:2016 | Information technology — Security techniques — Information security management systems — Overview and vocabulary | Atcelts |
| 85850 | ISO/IEC DIS 29128-2 | Information security, cybersecurity and privacy protection — Verification of Cryptographic Protocols — Part 2: Evaluation Methods and Activities for Cryptographic Protocols | Aptauja |
| 87638 | ISO/IEC DIS 28033-1 | Information security — Fully homomorphic encryption — Part 1: General | Aptauja |
| 87940 | ISO/IEC DIS 11770-8 | Information security — Key management — Part 8: Password-based key derivation | Aptauja |
| 88131 | ISO/IEC 20009-4:2017/DAmd 1 | Information technology — Security techniques — Anonymous entity authentication — Part 4: Mechanisms based on weak secrets — Amendment 1 | Aptauja |
| 84257 | ISO/IEC DIS 27000 | Information security, cybersecurity and privacy protection — Information security management systems — Overview | Aptauja slēgta |
| 84287 | ISO/DIS 13133 | Financial Services — Security Reference Model for Digital Currency Hardware Wallet (SRM-DCHW) | Aptauja slēgta |
| 87641 | ISO/IEC DIS 28033-4 | Information Security — Fully homomorphic encryption — Part 4: Mechanisms for arithmetic based on look-up table evaluation | Aptauja slēgta |
| 61007 | ISO/IEC DIS 27028 | Information security, cybersecurity and privacy protection — Guidance on using information security control attributes | Aptauja slēgta |
| 56581 | ISO/IEC DIS 27090 | Cybersecurity — Artificial Intelligence — Guidance for addressing security threats and compromises to artificial intelligence systems | Aptauja slēgta |
Displaying 551-560 of 791 results.
