ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
31389 | ISO/IEC FCD 9796-1 | Information technology — Security techniques — Digital signature scheme giving message recovery — Part 1: Mechanisms using redundancy | Izstrādē |
84991 | ISO/IEC PWI 17618 | Management of digital evidence using verifiable and trustable technology | Izstrādē |
83197 | ISO/IEC PWI 29128-3 | Information security — Verification of cryptographic protocols — Part 3: Part 3: Evaluation Methods and Activities for Protocol Implementation Verification | Izstrādē |
62548 | ISO/IEC NP 27036-5 | Information technology — Security techniques — Information security for supplier relationships — Part 5: Guidelines for security of cloud services | Izstrādē |
84990 | ISO/IEC PWI 17603 | Confidential computing | Izstrādē |
33930 | ISO/IEC CD 19792 | Information technology — Security techniques — Security evaluation of biometrics | Izstrādē |
52909 | ISO/IEC NP TR 15443-3 | Information technology — Security techniques — A framework for IT security assurance — Part 3: Analysis of assurance methods | Izstrādē |
30813 | ISO/IEC WD 18028 | Information technology — IT Network security | Izstrādē |
82892 | ISO/IEC PWI 7732 | Age verification | Izstrādē |
82889 | ISO/IEC PWI TS 7709.2 | Information technology — Big data security and privacy - Security and privacy-preserving guidelines for multi-sourced data processing | Izstrādē |
Displaying 571-580 of 770 results.