ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 85929 | ISO/IEC 11770-3:2021/Amd 1:2025 | Information security — Key management — Part 3: Mechanisms using asymmetric techniques — Amendment 1: TFNS identity-based key agreement | Standarts spēkā |
| 69725 | ISO/IEC 30111:2019 | Information technology — Security techniques — Vulnerability handling processes | Standarts spēkā |
| 78724 | ISO/IEC WD 9798-5 | Information technology — Security techniques — Entity authentication — Part 5: Mechanisms using zero-knowledge techniques | Standarts spēkā |
| 37971 | ISO/IEC 18033-2:2006 | Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers | Standarts spēkā |
| 85922 | ISO/IEC 27013:2021/Amd 1:2024 | Information security, cybersecurity and privacy protection — Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1 — Amendment 1 | Standarts spēkā |
| 73207 | ISO/IEC 11770-2:2018 | IT Security techniques — Key management — Part 2: Mechanisms using symmetric techniques | Standarts spēkā |
| 59138 | ISO/IEC TR 15443-1:2012 | Information technology — Security techniques — Security assurance framework — Part 1: Introduction and concepts | Standarts spēkā |
| 51585 | ISO/IEC 27033-6:2016 | Information technology — Security techniques — Network security — Part 6: Securing wireless IP network access | Standarts spēkā |
| 86012 | ISO/IEC 29134:2023 | Information technology — Security techniques — Guidelines for privacy impact assessment | Standarts spēkā |
| 86013 | ISO/IEC 29146:2024 | Information technology — Security techniques — A framework for access management | Standarts spēkā |
Displaying 671-680 of 791 results.
