ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 64576 | ISO/IEC NP 18032 | Information technology — Security techniques — Prime number generation | Izstrādē |
| 71290 | ISO/IEC NP 18032 | Information technology Security techniques Prime number generation | Izstrādē |
| 71517 | ISO/IEC 11770-3:2015/NP Amd 2 | Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques — Amendment 2 | Izstrādē |
| 76152 | ISO/IEC PWI 27031 | Information technology Security techniques Guidelines for information and communication technology readiness for business continuity | Izstrādē |
| 85000 | ISO/IEC PWI 29128-3 | Information security, cybersecurity and privacy protection — Verification of cryptographic protocols — Part 3: Part 3: Evaluation Methods and Activities for Protocol Implementation Verification | Izstrādē |
| 73205 | ISO/IEC 18033-3:2010/DAmd 1 | Information technology — Security techniques — Encryption algorithms — Part 3: Block ciphers — Amendment 1: Kuznyechik | Izstrādē |
| 66670 | ISO/IEC NP TS 14516-1 | Information technology — Security techniques — Guidelines for the use and management of electronic trust service providers — Part 1: Overview and concepts | Izstrādē |
| 68838 | ISO/IEC NP TR 20004-2 | Information technology — Security techniques — Refining software vulnerability analysis under ISO/IEC 15408 and ISO/IEC 18045 — Part 2: CWE and CAPEC based software penetration testing | Izstrādē |
| 42723 | ISO/IEC WD 19772 | Information technology — Security techniques — Authenticated encryption | Izstrādē |
| 84246 | ISO/IEC PWI 13042 | Consideration of the Security Model for Mechanism 7a in ISO/IEC 9798-6 | Izstrādē |
Displaying 601-610 of 793 results.
