Registration number (WIID)Project No.TitleStatus
46541ISO/IEC 15946-5:2009Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 5: Elliptic curve generationAtcelts
46470ISO/IEC 14888-3:2006/Cor 1:2007Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms — Technical Corrigendum 1Atcelts
46447ISO/IEC 18033-3:2005/Cor 2:2007Information technology — Security techniques — Encryption algorithms — Part 3: Block ciphers — Technical Corrigendum 2Atcelts
46435ISO/IEC 18033-3:2005/Cor 3:2008Information technology — Security techniques — Encryption algorithms — Part 3: Block ciphers — Technical Corrigendum 3: .Atcelts
46414ISO/IEC 15408-2:2008Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional componentsAtcelts
46414ISO/IEC 15408-2:2008Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional componentsStandarts spēkā
46414ISO/IEC 15408-2:2008Information technology Security techniques Evaluation criteria for IT securityAtcelts
46413ISO/IEC 15408-3:2008Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance componentsStandarts spēkā
46413ISO/IEC 15408-3:2008Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance componentsAtcelts
46413ISO/IEC 15408-3:2008Information technology Security techniques Evaluation criteria for IT securityAtcelts
Displaying 571-580 of 807 results.