ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
88125 | ISO/IEC PWI 24841 | Inclusion of NTRU in ISO/IEC JTC 1/SC 27/WG 2 standards | Izstrādē |
88126 | ISO/IEC PWI 24842 | Inclusion of NTRU in ISO/IEC JTC 1/SC 27/WG 2 standards | Izstrādē |
88127 | ISO/IEC PWI 24843 | Privacy-preserving attribute-based credentials | Izstrādē |
88128 | ISO/IEC PWI 24844 | Inclusion of scheme switching mechanisms for fully homomorphic encryption in ISO/IEC JTC1 SC 27/WG 2 standards | Izstrādē |
88130 | ISO/IEC WD 11770-4 | Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets | Izstrādē |
88131 | ISO/IEC 20009-4:2017/CD Amd 1.2 | Information technology — Security techniques — Anonymous entity authentication — Part 4: Mechanisms based on weak secrets — Amendment 1 | Izstrādē |
88133 | ISO/IEC PWI 22061 | Investigation of the effect of transmission media on QKD security evaluation and possible modifications to ISO/IEC 23837 (WG3 N2559) | Izstrādē |
88134 | ISO/IEC DIS 15408-1 | Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 1: Introduction and general model | Aptauja slēgta |
88135 | ISO/IEC DIS 15408-2 | Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 2: Security functional components | Aptauja slēgta |
88136 | ISO/IEC DIS 15408-3 | Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 3: Security assurance components | Aptauja slēgta |
Displaying 681-690 of 770 results.