ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 62070 | ISO/IEC 18031:2005/NP Amd 1 | Information technology — Security techniques — Random bit generation — Amendment 1 | Izstrādē |
| 91022 | ISO/IEC WD 28033-5 | Information security — Fully homomorphic encryption — Part 5: Mechanisms for scheme switching | Izstrādē |
| 84242 | ISO/IEC CD TS 27008.3 | Information technology — Security techniques — Guidelines for the assessment of information security controls | Izstrādē |
| 89943 | ISO/IEC WD 25330 | Information Security — Oblivious Transfer | Izstrādē |
| 90709 | ISO/IEC WD 18367 | Information security, cybersecurity and privacy protection — Cryptographic algorithms and security mechanisms conformance testing | Izstrādē |
| 51625 | ISO/IEC CD 24760 | Information Technology — Security Techniques — A Framework for Identity Management | Izstrādē |
| 90705 | ISO/IEC PWI 25542 | Inclusion of digital signature schemes for Post-Quantum Cryptography in ISO/IEC standards | Izstrādē |
| 92946 | ISO/IEC WD 30111 | Cybersecurity — Vulnerability handling and disclosure processes | Izstrādē |
| 88971 | ISO/IEC DIS 25093-1 | Cybersecurity — Confidential computing — Part 1: Overview and concepts | Izstrādē |
| 88147 | ISO/IEC CD 27566-3.2 | Information security, cybersecurity and privacy protection – Age assurance systems — Part 3: Approaches to analysis or comparison | Izstrādē |
Displaying 551-560 of 807 results.
