ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
91718 | ISO/IEC 14888-2:2008/AWI Amd 1 | Information technology — Security techniques — Digital signatures with appendix — Part 2: Integer factorization based mechanisms — Amendment 1 | Izstrādē |
84242 | ISO/IEC CD TS 27008.3 | Information technology — Security techniques — Guidelines for the assessment of information security controls | Izstrādē |
21136 | ISO/IEC CD 11768-2 | Information technology security techniques — Evaluation criteria for information technology security — Part 2: Functionality of IT systems, products and components | Izstrādē |
91719 | ISO/IEC 14888-2:2008/AWI Amd 2 | Information technology — Security techniques — Digital signatures with appendix — Part 2: Integer factorization based mechanisms — Amendment 2 | Izstrādē |
91717 | ISO/IEC WD 25330-3 | Information Security — Oblivious Transfer — Part 3: Oblivious transfer extensions | Izstrādē |
85850 | ISO/IEC CD 29128-2 | Information security, cybersecurity and privacy protection — Verification of Cryptographic Protocols — Part 2: Evaluation Methods and Activities for Cryptographic Protocols | Izstrādē |
86922 | ISO/IEC PWI 22071 | Inclusion of garbled circuit schemes in SC 27/WG 2 standards | Izstrādē |
86921 | ISO/IEC PWI 22064 | Inclusion of SPAIBE in ISO/IEC 11770-4 | Izstrādē |
70659 | ISO/IEC 27039:2015/CD Cor 1 | Information technology — Security techniques — Selection, deployment and operations of intrusion detection and prevention systems (IDPS) — Technical Corrigendum 1 | Izstrādē |
89515 | ISO/IEC PWI 25236 | Security notion of FHE | Izstrādē |
Displaying 741-750 of 774 results.