ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
51625 | ISO/IEC CD 24760 | Information Technology — Security Techniques — A Framework for Identity Management | Izstrādē |
72401 | ISO/IEC CD 20009-3 | Information technology — Security techniques — Anonymous entity authentication — Part 3: Mechanisms based on blind signatures concepts | Izstrādē |
63151 | ISO/IEC 9796-3:2006/CD Cor 1 | Information technology — Security techniques — Digital signature schemes giving message recovery — Part 3: Discrete logarithm based mechanisms — Technical Corrigendum 1 | Izstrādē |
71291 | ISO/IEC CD 9798-5 | Information technology — Security techniques — Entity authentication — Part 5: Mechanisms using zero-knowledge techniques | Izstrādē |
90706 | ISO/IEC 29192-4:2013/CD Amd 2 | Information technology — Security techniques — Lightweight cryptography — Part 4: Mechanisms using asymmetric techniques — Amendment 2 | Izstrādē |
88971 | ISO/IEC WD 25093-1 | Cybersecurity — Confidential computing — Part 1: Overview and concepts | Izstrādē |
88970 | ISO/IEC CD 27045 | Information security, cybersecurity and privacy protection — Big data security and privacy — Guidelines for managing big data risks | Izstrādē |
73205 | ISO/IEC 18033-3:2010/DAmd 1 | Information technology — Security techniques — Encryption algorithms — Part 3: Block ciphers — Amendment 1: Kuznyechik | Izstrādē |
89943 | ISO/IEC WD 25330 | Information Security — Oblivious Transfer | Izstrādē |
88147 | ISO/IEC WD 27566-3.3 | Information security, cybersecurity and privacy protection – Age assurance systems — Part 3: Approaches to comparison or analysis | Izstrādē |
Displaying 691-700 of 774 results.