ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
88148 | ISO/IEC PWI 27566-2 | Age assurance systems — Part 2: Interoperability, technical architecture and guidelines for use | Izstrādē |
91774 | ISO/IEC PWI 27575 | Privacy for metaverse frameworks | Izstrādē |
84999 | ISO/IEC PWI 29128-2 | Information security, cybersecurity and privacy protection — Verification of Cryptographic Protocols — Part 2: Evaluation Methods and Activities for Cryptographic Protocols | Izstrādē |
85000 | ISO/IEC PWI 29128-3 | Information security, cybersecurity and privacy protection — Verification of cryptographic protocols — Part 3: Part 3: Evaluation Methods and Activities for Protocol Implementation Verification | Izstrādē |
83197 | ISO/IEC PWI 29128-3 | Information security — Verification of cryptographic protocols — Part 3: Part 3: Evaluation Methods and Activities for Protocol Implementation Verification | Izstrādē |
84986 | ISO/IEC PWI 4922-3 | Secure multiparty computation — Part 3: Mechanisms based on garbled circuit | Izstrādē |
88142 | ISO/IEC PWI 6087 | Digital authentication: Risks and mitigations | Izstrādē |
85008 | ISO/IEC PWI 6109 | Guidelines for data security monitoring based on logging | Izstrādē |
82882 | ISO/IEC PWI 7680 | Requirements for the competence of ICT products cybersecurity conformity assessment body personnel – Knowledge, skills and effectiveness for ISO/IEC 15408 and ISO/IEC 19790 validators | Izstrādē |
82888 | ISO/IEC PWI 7699 | Guidance for addressing security threats and failures in artificial intelligence | Izstrādē |
Displaying 651-660 of 774 results.