ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
29240 | ISO/IEC TR 13335-4:2000 | Information technology — Guidelines for the management of IT Security — Part 4: Selection of safeguards | Atcelts |
29139 | ISO/IEC 15816:2002 | Information technology — Security techniques — Security information objects for access control | Standarts spēkā |
29062 | ISO/IEC 9798-3:1998 | Information technology — Security techniques — Entity authentication — Part 3: Mechanisms using digital signature techniques | Atcelts |
28283 | ISO/IEC WD 14516-2 | Guidelines for the use and management of Trusted Third Party (TTP) services — Part 2: Technical aspects | Izstrādē |
28232 | ISO/IEC 9796-2:1997 | Information technology — Security techniques — Digital signature schemes giving message recovery — Part 2: Mechanisms using a hash-function | Atcelts |
28107 | ISO/IEC 9979:1999 | Information technology — Security techniques — Procedures for the registration of cryptographic algorithms | Atcelts |
27743 | ISO/IEC 9798-1:1997 | Information technology Security techniques Entity authentication | Atcelts |
27743 | ISO/IEC 9798-1:1997 | Information technology — Security techniques — Entity authentication — Part 1: General | Atcelts |
27727 | ISO/IEC 10116:1997 | Information technology — Security techniques — Modes of operation for an n-bit block cipher | Atcelts |
27689 | ISO/IEC CD 15446 | Information technology — Security techniques — Guide for the production of Protection profiles and Security Targets | Izstrādē |
Displaying 721-730 of 774 results.