ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 60030 | ISO/IEC NP 17548 | Information technology — Security techniques — Guidance on assuring suitability and adequacy of investigation methods | Izstrādē |
| 66776 | ISO/IEC NP 19974 | Competence requirements for information security testers and evaluators | Izstrādē |
| 67001 | ISO/IEC NP 20085 | Test tool requirements and test tool calibration methods for use in testing non-invasive attack mitigation techniques in cryptographic modules | Izstrādē |
| 26955 | ISO/IEC WD 11768-1 | Information technology security techniques — Security mechanisms using zero knowledge techniques — Part 1: General model of security evaluation | Izstrādē |
| 55579 | ISO/IEC NP 15443-3 | Information technology — Security techniques — A framework for IT security assurance — Part 3: Analysis of assurance methods | Izstrādē |
| 45272 | ISO/IEC PDTR 29193 | Secure system design principles and techniques | Izstrādē |
| 66801 | ISO/IEC NP 19989 | Information technology — Security techniques — Criteria and methodology for security evaluation of biometric systems | Izstrādē |
| 43752 | ISO/IEC WD 27012 | Information technology - Security techniques — ISM guidelines for e-government services | Izstrādē |
| 63151 | ISO/IEC 9796-3:2006/CD Cor 1 | Information technology — Security techniques — Digital signature schemes giving message recovery — Part 3: Discrete logarithm based mechanisms — Technical Corrigendum 1 | Izstrādē |
| 72401 | ISO/IEC CD 20009-3 | Information technology — Security techniques — Anonymous entity authentication — Part 3: Mechanisms based on blind signatures concepts | Izstrādē |
Displaying 651-660 of 793 results.
