ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
28283 | ISO/IEC WD 14516-2 | Guidelines for the use and management of Trusted Third Party (TTP) services — Part 2: Technical aspects | Izstrādē |
29062 | ISO/IEC 9798-3:1998 | Information technology — Security techniques — Entity authentication — Part 3: Mechanisms using digital signature techniques | Atcelts |
29139 | ISO/IEC 15816:2002 | Information technology — Security techniques — Security information objects for access control | Standarts spēkā |
29240 | ISO/IEC TR 13335-4:2000 | Information technology Guidelines for the management of IT Security | Atcelts |
29240 | ISO/IEC TR 13335-4:2000 | Information technology — Guidelines for the management of IT Security — Part 4: Selection of safeguards | Atcelts |
29578 | ISO/IEC 15945:2002 | Information technology — Security techniques — Specification of TTP services to support the application of digital signatures | Standarts spēkā |
29579 | ISO/IEC WD 15946 | Cryptographic techniques based on elliptic curves | Izstrādē |
29580 | ISO/IEC TR 15947:2002 | Information technology — Security techniques — IT intrusion detection framework | Atcelts |
29580 | ISO/IEC TR 15947:2002 | Information technology Security techniques IT intrusion detection framework | Atcelts |
30032 | ISO/IEC WD 10118-4 | Information technology — Security techniques — Hash-functions — Part 4: Hash-functions using modular arithmetic | Izstrādē |
Displaying 51-60 of 770 results.