Registration number (WIID)Project No.TitleStatus
91718ISO/IEC 14888-2:2008/AWI Amd 1Information technology — Security techniques — Digital signatures with appendix — Part 2: Integer factorization based mechanisms — Amendment 1Izstrādē
84242ISO/IEC CD TS 27008.3Information technology — Security techniques — Guidelines for the assessment of information security controlsIzstrādē
21136ISO/IEC CD 11768-2Information technology security techniques — Evaluation criteria for information technology security — Part 2: Functionality of IT systems, products and componentsIzstrādē
91719ISO/IEC 14888-2:2008/AWI Amd 2Information technology — Security techniques — Digital signatures with appendix — Part 2: Integer factorization based mechanisms — Amendment 2Izstrādē
91717ISO/IEC WD 25330-3Information Security — Oblivious Transfer — Part 3: Oblivious transfer extensionsIzstrādē
85850ISO/IEC CD 29128-2Information security, cybersecurity and privacy protection — Verification of Cryptographic Protocols — Part 2: Evaluation Methods and Activities for Cryptographic ProtocolsIzstrādē
86922ISO/IEC PWI 22071Inclusion of garbled circuit schemes in SC 27/WG 2 standardsIzstrādē
86921ISO/IEC PWI 22064Inclusion of SPAIBE in ISO/IEC 11770-4Izstrādē
70659ISO/IEC 27039:2015/CD Cor 1Information technology — Security techniques — Selection, deployment and operations of intrusion detection and prevention systems (IDPS) — Technical Corrigendum 1Izstrādē
89515ISO/IEC PWI 25236Security notion of FHEIzstrādē
Displaying 741-750 of 774 results.