Registration number (WIID)Project No.TitleStatus
27632ISO/IEC 15408-1:1999Information technology Security techniques Evaluation criteria for IT securityAtcelts
88134ISO/IEC 15408-1Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 1: Introduction and general modelIzstrādē
27170ISO/IEC 15292:2001Information technology - Security techniques - Protection Profile registration proceduresAtcelts
89517ISO/IEC 14888-3:2018/DAmd 1IT Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms — Amendment 1Aptauja slēgta
76382ISO/IEC 14888-3:2018IT Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanismsStandarts spēkā
70631ISO/IEC 14888-3:2016/DAmd 1Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms — Amendment 1: SM2 digital signature mechanismIzstrādē
64267ISO/IEC 14888-3:2016Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanismsAtcelts
52498ISO/IEC 14888-3:2006/Cor 2:2009Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms — Technical Corrigendum 2Atcelts
46470ISO/IEC 14888-3:2006/Cor 1:2007Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms — Technical Corrigendum 1Atcelts
56551ISO/IEC 14888-3:2006/Amd 2:2012Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms — Amendment 2: Optimizing hash inputsAtcelts
Displaying 721-730 of 807 results.