ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 27632 | ISO/IEC 15408-1:1999 | Information technology Security techniques Evaluation criteria for IT security | Atcelts |
| 88134 | ISO/IEC 15408-1 | Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 1: Introduction and general model | Izstrādē |
| 27170 | ISO/IEC 15292:2001 | Information technology - Security techniques - Protection Profile registration procedures | Atcelts |
| 89517 | ISO/IEC 14888-3:2018/DAmd 1 | IT Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms — Amendment 1 | Aptauja slēgta |
| 76382 | ISO/IEC 14888-3:2018 | IT Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms | Standarts spēkā |
| 70631 | ISO/IEC 14888-3:2016/DAmd 1 | Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms — Amendment 1: SM2 digital signature mechanism | Izstrādē |
| 64267 | ISO/IEC 14888-3:2016 | Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms | Atcelts |
| 52498 | ISO/IEC 14888-3:2006/Cor 2:2009 | Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms — Technical Corrigendum 2 | Atcelts |
| 46470 | ISO/IEC 14888-3:2006/Cor 1:2007 | Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms — Technical Corrigendum 1 | Atcelts |
| 56551 | ISO/IEC 14888-3:2006/Amd 2:2012 | Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms — Amendment 2: Optimizing hash inputs | Atcelts |
Displaying 721-730 of 807 results.
