ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
88126 | ISO/IEC PWI 24842 | Inclusion of NTRU in ISO/IEC JTC 1/SC 27/WG 2 standards | Izstrādē |
88128 | ISO/IEC PWI 24844 | Inclusion of scheme switching mechanisms for fully homomorphic encryption in ISO/IEC JTC1 SC 27/WG 2 standards | Izstrādē |
88133 | ISO/IEC PWI 22061 | Investigation of the effect of transmission media on QKD security evaluation and possible modifications to ISO/IEC 23837 (WG3 N2559) | Izstrādē |
88134 | ISO/IEC DIS 15408-1 | Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 1: Introduction and general model | Izstrādē |
63151 | ISO/IEC 9796-3:2006/CD Cor 1 | Information technology — Security techniques — Digital signature schemes giving message recovery — Part 3: Discrete logarithm based mechanisms — Technical Corrigendum 1 | Izstrādē |
88142 | ISO/IEC PWI 6087 | Digital authentication: Risks and mitigations | Izstrādē |
88140 | ISO/IEC FDIS 15408-5 | Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 5: Pre-defined packages of security requirements | Izstrādē |
60236 | ISO/IEC WD 24762 | Information technology — Security techniques — Guidelines for information and communications technology disaster recovery services | Izstrādē |
88130 | ISO/IEC CD 11770-4 | Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets | Izstrādē |
88141 | ISO/IEC DIS 18045 | Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Requirements and methodology for IT security evaluation | Izstrādē |
Displaying 681-690 of 774 results.