ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 51624 | ISO/IEC WD 24745 | Information technology — Biometric template protection | Izstrādē |
| 52908 | ISO/IEC NP TR 15443-2 | Information technology — Security techniques — A framework for IT security assurance — Part 2: Assurance methods | Izstrādē |
| 62073 | ISO/IEC 18033-3:2010/NP Amd 1 | Information technology — Security techniques — Encryption algorithms — Part 3: Block ciphers — Amendment 1 | Izstrādē |
| 66232 | ISO/IEC NP 27050-4 | Information technology — Security techniques — Electronic discovery — Part 4: ICT readiness for electronic discovery | Izstrādē |
| 64576 | ISO/IEC NP 18032 | Information technology — Security techniques — Prime number generation | Izstrādē |
| 71290 | ISO/IEC NP 18032 | Information technology Security techniques Prime number generation | Izstrādē |
| 71517 | ISO/IEC 11770-3:2015/NP Amd 2 | Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques — Amendment 2 | Izstrādē |
| 76152 | ISO/IEC PWI 27031 | Information technology Security techniques Guidelines for information and communication technology readiness for business continuity | Izstrādē |
| 85000 | ISO/IEC PWI 29128-3 | Information security, cybersecurity and privacy protection — Verification of cryptographic protocols — Part 3: Part 3: Evaluation Methods and Activities for Protocol Implementation Verification | Izstrādē |
| 66670 | ISO/IEC NP TS 14516-1 | Information technology — Security techniques — Guidelines for the use and management of electronic trust service providers — Part 1: Overview and concepts | Izstrādē |
Displaying 721-730 of 791 results.
