ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
25538 | ISO/IEC WD 11770-4 | Information technology — Security techniques — Key management — Part 4: Cryptographic separation | Izstrādē |
88130 | ISO/IEC WD 11770-4 | Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets | Izstrādē |
41309 | ISO/IEC WD 13335-2 | IT security techniques — Management of information and communications technology security — Part 2: Information security risk management | Izstrādē |
23706 | ISO/IEC WD 14516-1 | Guidelines for the use and management of Trusted Third Party (TTP) services — Part 1: General overview | Izstrādē |
28283 | ISO/IEC WD 14516-2 | Guidelines for the use and management of Trusted Third Party (TTP) services — Part 2: Technical aspects | Izstrādē |
27686 | ISO/IEC WD 15443 | Information technology - Security techniques - A framework for IT security assurance | Izstrādē |
29579 | ISO/IEC WD 15946 | Cryptographic techniques based on elliptic curves | Izstrādē |
36359 | ISO/IEC WD 17799 | Information technology — Code of practice for information security management | Izstrādē |
30799 | ISO/IEC WD 18014 | Information technology — Time Stamping Services | Izstrādē |
30813 | ISO/IEC WD 18028 | Information technology — IT Network security | Izstrādē |
Displaying 731-740 of 770 results.