ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 43759 | ISO/IEC TR 27019:2013 | Information technology — Security techniques — Information security management guidelines based on ISO/IEC 27002 for process control systems specific to the energy utility industry | Atcelts |
| 30816 | ISO/IEC 18031:2005 | Information technology — Security techniques — Random bit generation | Atcelts |
| 87557 | ISO/IEC DIS 4922-3 | Information security — Secure multiparty computation — Part 3: Mechanisms based on garbled circuits | Aptauja |
| 61007 | ISO/IEC DIS 27028.2 | Information security, cybersecurity and privacy protection — Guidance on using information security control attributes | Aptauja slēgta |
| 56582 | ISO/IEC DIS 27091 | Cybersecurity and Privacy — Artificial Intelligence — Privacy protection | Aptauja slēgta |
| 88970 | ISO/IEC DIS 27045 | Information security, cybersecurity and privacy protection — Big data security and privacy — Guidelines for managing big data risks | Aptauja slēgta |
| 90707 | ISO/IEC 18033-7:2022/DAmd 1 | Information security — Encryption algorithms — Part 7: Tweakable block ciphers — Amendment 1 | Aptauja slēgta |
| 87940 | ISO/IEC DIS 11770-8 | Information security — Key management — Part 8: Password-based key derivation | Aptauja slēgta |
| 88131 | ISO/IEC 20009-4:2017/DAmd 1 | Information technology — Security techniques — Anonymous entity authentication — Part 4: Mechanisms based on weak secrets — Amendment 1 | Aptauja slēgta |
| 89517 | ISO/IEC 14888-3:2018/DAmd 1 | IT Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms — Amendment 1 | Aptauja slēgta |
Displaying 561-570 of 807 results.
