ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 84999 | ISO/IEC PWI 29128-2 | Information security, cybersecurity and privacy protection — Verification of Cryptographic Protocols — Part 2: Evaluation Methods and Activities for Cryptographic Protocols | Izstrādē |
| 60367 | ISO/IEC 9798-4:1999/CD Cor 2 | Information technology — Security techniques — Entity authentication — Part 4: Mechanisms using a cryptographic check function — Technical Corrigendum 2 | Izstrādē |
| 66671 | ISO/IEC NP TS 14516-2 | Information technology — Security techniques — Guidelines for the use and management of electronic trust service providers — Part 2: Guidelines on information security for CA trust service providers | Izstrādē |
| 60236 | ISO/IEC WD 24762 | Information technology — Security techniques — Guidelines for information and communications technology disaster recovery services | Izstrādē |
| 91042 | ISO/IEC WD 24843.2 | Information security — Attribute-Based Credentials | Izstrādē |
| 73205 | ISO/IEC 18033-3:2010/DAmd 1 | Information technology — Security techniques — Encryption algorithms — Part 3: Block ciphers — Amendment 1: Kuznyechik | Izstrādē |
| 88148 | ISO/IEC PWI 27566-2 | Age assurance systems — Part 2: Interoperability, technical architecture and guidelines for use | Izstrādē |
| 88120 | ISO/IEC PWI TS 27022 | Information technology — Guidance on information security management system processes | Izstrādē |
| 88142 | ISO/IEC PWI 6087 | Digital authentication: Risks and mitigations | Izstrādē |
| 85008 | ISO/IEC PWI 6109 | Guidelines for data security monitoring based on logging | Izstrādē |
Displaying 741-750 of 793 results.
