ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
64139 | ISO/IEC NP 19248 | Information technology — Security techniques — Requirements for certification of information security management professionals | Izstrādē |
86919 | ISO/IEC PWI 22054 | Modes of operations for tweakable ciphers | Izstrādē |
59649 | ISO/IEC 18033-3:2010/WD Amd 1 | Information technology — Security techniques — Encryption algorithms — Part 3: Block ciphers — Amendment 1: Russian Block Cipher GOST | Izstrādē |
60367 | ISO/IEC 9798-4:1999/CD Cor 2 | Information technology — Security techniques — Entity authentication — Part 4: Mechanisms using a cryptographic check function — Technical Corrigendum 2 | Izstrādē |
83139 | ISO/IEC WD 18033-8 | Information security — Encryption algorithms — Part 8: Fully Homomorphic Encryption | Izstrādē |
81627 | ISO/IEC WD TS 27115.3 | Cybersecurity evaluation of complex systems — Introduction and framework overview | Izstrādē |
85935 | ISO/IEC 18014-1:2008/PRF Amd 1 | Information technology — Security techniques — Time-stamping services — Part 1: Framework — Amendment 1 | Izstrādē |
27635 | ISO/IEC CD 15408-4 | Information technology — Security techniques — Evaluation criteria for IT security — Part 4: Security assurance requirements | Izstrādē |
87485 | ISO/IEC 24760-1 | Information security, cybersecurity and privacy protection — A framework for identity management — Part 1: Core concepts and terminology | Izstrādē |
87486 | ISO/IEC 24760-3 | Information security, cybersecurity and privacy protection — A framework for identity management — Part 3: Practice | Izstrādē |
Displaying 651-660 of 770 results.