ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
89517 | ISO/IEC 14888-3:2018/CD Amd 1 | IT Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms — Amendment 1 | Izstrādē |
89513 | ISO/IEC PWI 25234 | New Lightweight Asymmetric Cryptographic Techniques | Izstrādē |
90013 | ISO/IEC 9797-2:2021/PWI Cor 2 | Information security — Message authentication codes (MACs) — Part 2: Mechanisms using a dedicated hash-function — Technical Corrigendum 2 | Izstrādē |
60103 | ISO/IEC NP 17598 | Investigation principles and processes | Izstrādē |
64141 | ISO/IEC WD 27005 | Information technology — Security techniques — Information security risk management | Izstrādē |
69403 | ISO/IEC NP 20897 | Information technology — Security techniques — Security requirements, test and evaluation methods for physically unclonable functions for generating nonstored security parameters | Izstrādē |
82887 | ISO/IEC PWI 27045 | Cybersecurity — Big data security and privacy — Guidelines for managing big data risks | Izstrādē |
51586 | ISO/IEC NP 27033-7 | Information technology — Security techniques — Network security — Part 7: Wireless | Izstrādē |
82882 | ISO/IEC PWI 7680 | Requirements for the competence of ICT products cybersecurity conformity assessment body personnel – Knowledge, skills and effectiveness for ISO/IEC 15408 and ISO/IEC 19790 validators | Izstrādē |
90011 | ISO/IEC PWI 27566-2 | Information security, cybersecurity and privacy protection — Age assurance systems — Part 2: Technical approaches and guidance for implementation | Izstrādē |
Displaying 581-590 of 770 results.