ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
53634 | ISO/IEC 9798-1:2010 | Information technology — Security techniques — Entity authentication — Part 1: General | Standarts spēkā |
65480 | ISO/IEC 15946-1:2016 | Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 1: General | Standarts spēkā |
76354 | ISO/IEC 20897-2:2022 | Information security, cybersecurity and privacy protection — Physically unclonable functions — Part 2: Test and evaluation methods | Standarts spēkā |
68231 | ISO/IEC 14888-2:2008/Cor 1:2015 | Information technology — Security techniques — Digital signatures with appendix — Part 2: Integer factorization based mechanisms — Technical Corrigendum 1: To ISO/IEC 14888-2:2008 | Standarts spēkā |
72890 | ISO/IEC TR 22216:2022 | Information security, cybersecurity and privacy protection — New concepts and changes in ISO/IEC 15408:2022 and ISO/IEC 18045:2022 | Standarts spēkā |
43756 | ISO/IEC TR 27016:2014 | Information technology — Security techniques — Information security management — Organizational economics | Standarts spēkā |
44381 | ISO/IEC 27037:2012 | Information technology — Security techniques — Guidelines for identification, collection, acquisition and preservation of digital evidence | Standarts spēkā |
78751 | ISO/IEC 18033-5:2015/Amd 1:2021 | Information technology — Security techniques — Encryption algorithms — Part 5: Identity-based ciphers — Amendment 1: SM9 mechanism | Standarts spēkā |
64120 | ISO/IEC 27004:2016 | Information technology — Security techniques — Information security management — Monitoring, measurement, analysis and evaluation | Standarts spēkā |
62072 | ISO/IEC PDTS 27035-3 | Information technology — Security techniques — Information security incident management — Part 3: Guidelines for incident response operations | Standarts spēkā |
Displaying 741-750 of 770 results.