ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 28283 | ISO/IEC WD 14516-2 | Guidelines for the use and management of Trusted Third Party (TTP) services — Part 2: Technical aspects | Izstrādē |
| 29062 | ISO/IEC 9798-3:1998 | Information technology — Security techniques — Entity authentication — Part 3: Mechanisms using digital signature techniques | Atcelts |
| 29139 | ISO/IEC 15816:2002 | Information technology — Security techniques — Security information objects for access control | Standarts spēkā |
| 29240 | ISO/IEC TR 13335-4:2000 | Information technology — Guidelines for the management of IT Security — Part 4: Selection of safeguards | Atcelts |
| 29240 | ISO/IEC TR 13335-4:2000 | Information technology Guidelines for the management of IT Security | Atcelts |
| 29578 | ISO/IEC 15945:2002 | Information technology — Security techniques — Specification of TTP services to support the application of digital signatures | Standarts spēkā |
| 29579 | ISO/IEC WD 15946 | Cryptographic techniques based on elliptic curves | Izstrādē |
| 29580 | ISO/IEC TR 15947:2002 | Information technology — Security techniques — IT intrusion detection framework | Atcelts |
| 29580 | ISO/IEC TR 15947:2002 | Information technology Security techniques IT intrusion detection framework | Atcelts |
| 30032 | ISO/IEC WD 10118-4 | Information technology — Security techniques — Hash-functions — Part 4: Hash-functions using modular arithmetic | Izstrādē |
Displaying 51-60 of 791 results.
