ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 92016 | ISO/IEC WD 14888-6 | Information security — Digital signatures with appendix — Part 6: Stateless hash-based mechanisms | Izstrādē |
| 92017 | ISO/IEC AWI 14888-5 | Information security — Digital signatures with appendix — Part 5: Lattice-based mechanisms | Izstrādē |
| 82878 | ISO/IEC FDIS 27017 | Information security, cybersecurity and privacy protection — Information security controls based on ISO/IEC 27002 for cloud services | Izstrādē |
| 64590 | ISO/IEC NP TR 19791 | Information technology — Security techniques — Security assessment of operational systems | Izstrādē |
| 41309 | ISO/IEC WD 13335-2 | IT security techniques — Management of information and communications technology security — Part 2: Information security risk management | Izstrādē |
| 84245 | ISO/IEC PWI 13035 | Amendment of Identity-Based Authenticated Key Exchange | Izstrādē |
| 84249 | ISO/IEC 29134:2017/DAmd 1 | Information technology — Security techniques — Guidelines for privacy impact assessment — Amendment 1 | Izstrādē |
| 21136 | ISO/IEC CD 11768-2 | Information technology security techniques — Evaluation criteria for information technology security — Part 2: Functionality of IT systems, products and components | Izstrādē |
| 84244 | ISO/IEC PWI 13025 | Inclusion of arithmetization-friendly cryptographic algorithms in ISO/IEC standards | Izstrādē |
| 30814 | ISO/IEC WD 18029 | Information technology — Specification for the management and interoperation of public key infrastructure components | Izstrādē |
Displaying 561-570 of 793 results.
