ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
45172 | ISO/IEC TR 29149:2012 | Information technology — Security techniques — Best practices for the provision and use of time-stamping services | Standarts spēkā |
45170 | ISO/IEC 29147:2014 | Information technology — Security techniques — Vulnerability disclosure | Atcelts |
45169 | ISO/IEC 29146:2016 | Information technology — Security techniques — A framework for access management | Atcelts |
45154 | ISO/IEC NP 29131 | Verification of cryptographic protocols | Izstrādē |
45151 | ISO/IEC 29128:2011 | Information technology — Security techniques — Verification of cryptographic protocols | Atcelts |
45138 | ISO/IEC 29115:2013 | Information technology — Security techniques — Entity authentication assurance framework | Standarts spēkā |
45124 | ISO/IEC 29101:2013 | Information technology — Security techniques — Privacy architecture framework | Atcelts |
45123 | ISO/IEC 29100:2011 | Information technology — Security techniques — Privacy framework | Atcelts |
44884 | ISO/IEC 10118-2:2000/Cor 1:2006 | Information technology — Security techniques — Hash-functions — Part 2: Hash-functions using an n-bit block cipher — Technical Corrigendum 1 | Atcelts |
44753 | ISO/IEC 9796-2:2002/Amd 1:2008 | Information technology — Security techniques — Digital signature schemes giving message recovery — Part 2: Integer factorization based mechanisms — Amendment 1 | Atcelts |
Displaying 561-570 of 774 results.