ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
73909 | ISO/IEC WD 29115.4 | Information technology — Security techniques — Entity authentication assurance framework | Izstrādē |
60103 | ISO/IEC NP 17598 | Investigation principles and processes | Izstrādē |
53247 | ISO/IEC WD TR 30127 | Information technology — Security techniques — Detailing software penetration testing under ISO/IEC 15408 and ISO/IEC 18045 vulnerability analysis | Izstrādē |
62548 | ISO/IEC NP 27036-5 | Information technology — Security techniques — Information security for supplier relationships — Part 5: Guidelines for security of cloud services | Izstrādē |
89513 | ISO/IEC PWI 25234 | New Lightweight Asymmetric Cryptographic Techniques | Izstrādē |
38740 | ISO/IEC 15408-3:1999/CD Cor 1 | Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance requirements — Technical Corrigendum 1 | Izstrādē |
89517 | ISO/IEC 14888-3:2018/CD Amd 1 | IT Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms — Amendment 1 | Izstrādē |
66525 | ISO/IEC NP 19896 | Information technology — Security techniques — Competence requirements for information security testers and evaluators | Izstrādē |
90711 | ISO/IEC WD TR 25544 | The effect of different transmission media on the security evaluation of quantum key distribution | Izstrādē |
30032 | ISO/IEC WD 10118-4 | Information technology — Security techniques — Hash-functions — Part 4: Hash-functions using modular arithmetic | Izstrādē |
Displaying 661-670 of 770 results.