ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
31531 | ISO/IEC 7064:2003 | Information technology — Security techniques — Check character systems | Standarts spēkā |
31488 | ISO/IEC 9798-4:1999 | Information technology — Security techniques — Entity authentication — Part 4: Mechanisms using a cryptographic check function | Standarts spēkā |
31487 | ISO/IEC 10118-2:2000 | Information technology — Security techniques — Hash-functions — Part 2: Hash-functions using an n-bit block cipher | Atcelts |
31482 | ISO/IEC TR 14516:2002 | Information technology — Security techniques — Guidelines for the use and management of Trusted Third Party services | Standarts spēkā |
31482 | ISO/IEC TR 14516:2002 | Information technology — Security techniques — Guidelines for the use and management of Trusted Third Party services | Standarts spēkā |
31389 | ISO/IEC FCD 9796-1 | Information technology — Security techniques — Digital signature scheme giving message recovery — Part 1: Mechanisms using redundancy | Izstrādē |
31143 | ISO/IEC 10118-1:2000 | Information technology — Security techniques — Hash-functions — Part 1: General | Atcelts |
31142 | ISO/IEC TR 13335-5:2001 | Information technology — Guidelines for the management of IT Security — Part 5: Management guidance on network security | Atcelts |
31142 | ISO/IEC TR 13335-5:2001 | Information technology Guidelines for the management of IT Security | Atcelts |
31138 | ISO/IEC 9796-3:2000 | Information technology — Security techniques — Digital signature schemes giving message recovery — Part 3: Discrete logarithm based mechanisms | Atcelts |
Displaying 691-700 of 774 results.