ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 71525 | ISO/IEC DIS 10118-2 | Information technology — Security techniques — Hash-functions — Part 2: Hash-functions using an n-bit block cipher | Izstrādē |
| 51625 | ISO/IEC CD 24760 | Information Technology — Security Techniques — A Framework for Identity Management | Izstrādē |
| 71115 | ISO/IEC 29192-2:2012/PDAM 1 | Information technology — Security techniques — Lightweight cryptography — Part 2: Block ciphers — Amendment 1 | Izstrādē |
| 73908 | ISO/IEC NP 20008-2 | Information technology Security techniques Anonymous digital signatures | Izstrādē |
| 64215 | ISO/IEC 15408-1:2009/CD Cor 1 | Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model — Technical Corrigendum 1 | Izstrādē |
| 71903 | ISO/IEC 29115:2013/DAmd 1 | Information technology — Security techniques — Entity authentication assurance framework — Amendment 1 | Izstrādē |
| 60029 | ISO/IEC NP 17547 | Information technology — Security techniques — Guidelines for analysis & interpretation of digital evidence | Izstrādē |
| 88124 | ISO/IEC PWI 24840 | Study and review of authenticate encryption mechanisms for the future revisions of standards | Izstrādē |
| 38739 | ISO/IEC 15408-2:1999/CD Cor 1 | Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional requirements — Technical Corrigendum 1 | Izstrādē |
| 27686 | ISO/IEC WD 15443 | Information technology - Security techniques - A framework for IT security assurance | Izstrādē |
Displaying 661-670 of 793 results.
