ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 91719 | ISO/IEC 14888-2:2008/AWI Amd 2 | Information technology — Security techniques — Digital signatures with appendix — Part 2: Integer factorization based mechanisms — Amendment 2 | Izstrādē |
| 91718 | ISO/IEC 14888-2:2008/AWI Amd 1 | Information technology — Security techniques — Digital signatures with appendix — Part 2: Integer factorization based mechanisms — Amendment 1 | Izstrādē |
| 91715 | ISO/IEC CD 25330-1 | Information Security — Oblivious Transfer — Part 1: General | Izstrādē |
| 91720 | ISO/WD TR 25844 | Information security, cybersecurity and privacy protection – Transition information for ISO/IEC 19790 and ISO/IEC 24759 | Izstrādē |
| 91717 | ISO/IEC WD 25330-3.2 | Information Security — Oblivious Transfer — Part 3: Oblivious transfer extensions | Izstrādē |
| 91721 | ISO/IEC CD TR 22216 | Information security, cybersecurity and privacy protection — Technical developments in ISO/IEC 15408 (multipart) and ISO/IEC 18045 | Izstrādē |
| 91764 | ISO/IEC PWI 25857 | Cybersecurity — Guidance for addressing social engineering threats within the digital environment | Izstrādē |
| 91773 | ISO/IEC PWI 25863 | Exploration of Security and privacy characteristics for digital identity wallets managing digital credentials | Izstrādē |
| 91772 | ISO/IEC PWI 25860 | Authenticator exploration | Izstrādē |
| 91840 | ISO/IEC WD 25888 | Information Security — Algorithmic Mechanisms to Protect Symmetric Algorithms in Hardware Against Side-Channel Attacks | Izstrādē |
Displaying 721-730 of 793 results.
