Registration number (WIID)Project No.TitleStatus
84999ISO/IEC PWI 29128-2Information security, cybersecurity and privacy protection — Verification of Cryptographic Protocols — Part 2: Evaluation Methods and Activities for Cryptographic ProtocolsIzstrādē
85008ISO/IEC PWI 6109Guidelines for data security monitoring based on loggingIzstrādē
84249ISO/IEC 29134:2017/DAmd 1Information technology — Security techniques — Guidelines for privacy impact assessment — Amendment 1Izstrādē
41309ISO/IEC WD 13335-2IT security techniques — Management of information and communications technology security — Part 2: Information security risk managementIzstrādē
70631ISO/IEC 14888-3:2016/DAmd 1Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms — Amendment 1: SM2 digital signature mechanismIzstrādē
23706ISO/IEC WD 14516-1Guidelines for the use and management of Trusted Third Party (TTP) services — Part 1: General overviewIzstrādē
19685ISO/IEC WD 11768-3Information technology security techniques — Evaluation criteria for information technology security — Part 3: Assurance of IT systemsIzstrādē
19682ISO/IEC WD 11765Security information objectsIzstrādē
39813ISO/IEC DIS 20886Information technology — International Security, Trust, and Privacy Alliance — Privacy FrameworkIzstrādē
45154ISO/IEC NP 29131Verification of cryptographic protocolsIzstrādē
Displaying 731-740 of 770 results.