ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 66776 | ISO/IEC NP 19974 | Competence requirements for information security testers and evaluators | Izstrādē |
| 66671 | ISO/IEC NP TS 14516-2 | Information technology — Security techniques — Guidelines for the use and management of electronic trust service providers — Part 2: Guidelines on information security for CA trust service providers | Izstrādē |
| 60030 | ISO/IEC NP 17548 | Information technology — Security techniques — Guidance on assuring suitability and adequacy of investigation methods | Izstrādē |
| 60367 | ISO/IEC 9798-4:1999/CD Cor 2 | Information technology — Security techniques — Entity authentication — Part 4: Mechanisms using a cryptographic check function — Technical Corrigendum 2 | Izstrādē |
| 72401 | ISO/IEC CD 20009-3 | Information technology — Security techniques — Anonymous entity authentication — Part 3: Mechanisms based on blind signatures concepts | Izstrādē |
| 64139 | ISO/IEC NP 19248 | Information technology — Security techniques — Requirements for certification of information security management professionals | Izstrādē |
| 82877 | ISO/IEC PWI 27009 | Information security, cybersecurity and privacy protection — Sector-specific application of ISO/IEC 27001 — Requirements | Izstrādē |
| 38852 | ISO/IEC NP 24742 | Information technology — Information security management metrics and measurements | Izstrādē |
| 29579 | ISO/IEC WD 15946 | Cryptographic techniques based on elliptic curves | Izstrādē |
| 63151 | ISO/IEC 9796-3:2006/CD Cor 1 | Information technology — Security techniques — Digital signature schemes giving message recovery — Part 3: Discrete logarithm based mechanisms — Technical Corrigendum 1 | Izstrādē |
Displaying 601-610 of 791 results.
