Registration number (WIID)Project No.TitleStatus
38739ISO/IEC 15408-2:1999/CD Cor 1Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional requirements — Technical Corrigendum 1Izstrādē
38738ISO/IEC 15408-1:1999/CD Cor 1Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model — Technical Corrigendum 1Izstrādē
38192ISO/IEC 13888-1:2004IT security techniques — Non-repudiation — Part 1: GeneralAtcelts
38192ISO/IEC 13888-1:2004IT security techniques Non-repudiationAtcelts
37972ISO/IEC 18033-3:2005Information technology — Security techniques — Encryption algorithms — Part 3: Block ciphersAtcelts
37971ISO/IEC 18033-2:2006Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphersStandarts spēkā
37970ISO/IEC 18033-1:2005Information technology Security techniques Encryption algorithmsAtcelts
37970ISO/IEC 18033-1:2005Information technology — Security techniques — Encryption algorithms — Part 1: GeneralAtcelts
37416ISO/IEC 10118-3:2003Information technology — Security techniques — Hash-functions — Part 3: Dedicated hash-functionsAtcelts
36359ISO/IEC WD 17799Information technology — Code of practice for information security managementIzstrādē
Displaying 681-690 of 791 results.