ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 84249 | ISO/IEC 29134:2017/DAmd 1 | Information technology — Security techniques — Guidelines for privacy impact assessment — Amendment 1 | Izstrādē |
| 86890 | ISO/IEC 18033-2:2006/FDAmd 2 | Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers — Amendment 2 | Izstrādē |
| 71525 | ISO/IEC DIS 10118-2 | Information technology — Security techniques — Hash-functions — Part 2: Hash-functions using an n-bit block cipher | Izstrādē |
| 73909 | ISO/IEC WD 29115.4 | Information technology — Security techniques — Entity authentication assurance framework | Izstrādē |
| 86886 | ISO/IEC PWI 20009 | Inclusion of the ZYHW anonymous entity authentication mechanism in ISO/IEC 20009-4 | Izstrādē |
| 43752 | ISO/IEC WD 27012 | Information technology - Security techniques — ISM guidelines for e-government services | Izstrādē |
| 86885 | ISO/IEC PWI 21867 | Modes of operations for tweakable ciphers | Izstrādē |
| 91022 | ISO/IEC WD 28033-5 | Information security — Fully homomorphic encryption — Part 5: Mechanisms for scheme switching | Izstrādē |
| 38855 | ISO/IEC NP 24745 | Information technology — Biometric template protection | Izstrādē |
| 84242 | ISO/IEC CD TS 27008.3 | Information technology — Security techniques — Guidelines for the assessment of information security controls | Izstrādē |
Displaying 591-600 of 793 results.
