ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 71291 | ISO/IEC CD 9798-5 | Information technology — Security techniques — Entity authentication — Part 5: Mechanisms using zero-knowledge techniques | Izstrādē |
| 90706 | ISO/IEC 29192-4:2013/CD Amd 2 | Information technology — Security techniques — Lightweight cryptography — Part 4: Mechanisms using asymmetric techniques — Amendment 2 | Izstrādē |
| 84245 | ISO/IEC PWI 13035 | Amendment of Identity-Based Authenticated Key Exchange | Izstrādē |
| 90712 | ISO/IEC PWI 25545 | Guidelines for edge computing security | Izstrādē |
| 27689 | ISO/IEC CD 15446 | Information technology — Security techniques — Guide for the production of Protection profiles and Security Targets | Izstrādē |
| 87375 | ISO/IEC DTS 5689 | Cybersecurity — Security frameworks and use cases for cyber physical systems | Izstrādē |
| 90714 | ISO/IEC CD 19086-4 | Cloud computing — Service level agreement (SLA) framework — Part 4: Components of security and of protection of PII | Izstrādē |
| 90717 | ISO/IEC NP 27574 | Information security, cybersecurity and privacy protection — Privacy in brain computer interface (BCI) applications | Izstrādē |
| 87557 | ISO/IEC CD 4922-3.2 | Information security — Secure multiparty computation — Part 3: Mechanisms based on garbled circuits | Izstrādē |
| 87640 | ISO/IEC DIS 28033-3 | Information security — Fully homomorphic encryption — Part 3: Mechanisms for arithmetic on approximate numbers | Izstrādē |
Displaying 621-630 of 791 results.
