ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 91721 | ISO/IEC CD TR 22216 | Information security, cybersecurity and privacy protection — Technical developments in ISO/IEC 15408 (multipart) and ISO/IEC 18045 | Izstrādē |
| 42723 | ISO/IEC WD 19772 | Information technology — Security techniques — Authenticated encryption | Izstrādē |
| 91764 | ISO/IEC PWI 25857 | Cybersecurity — Guidance for addressing social engineering threats within the digital environment | Izstrādē |
| 91773 | ISO/IEC PWI 25863 | Exploration of Security and privacy characteristics for digital identity wallets managing digital credentials | Izstrādē |
| 91772 | ISO/IEC PWI 25860 | Authenticator exploration | Izstrādē |
| 91840 | ISO/IEC WD 25888 | Information Security — Algorithmic Mechanisms to Protect Symmetric Algorithms in Hardware Against Side-Channel Attacks | Izstrādē |
| 68838 | ISO/IEC NP TR 20004-2 | Information technology — Security techniques — Refining software vulnerability analysis under ISO/IEC 15408 and ISO/IEC 18045 — Part 2: CWE and CAPEC based software penetration testing | Izstrādē |
| 66670 | ISO/IEC NP TS 14516-1 | Information technology — Security techniques — Guidelines for the use and management of electronic trust service providers — Part 1: Overview and concepts | Izstrādē |
| 85000 | ISO/IEC PWI 29128-3 | Information security, cybersecurity and privacy protection — Verification of cryptographic protocols — Part 3: Part 3: Evaluation Methods and Activities for Protocol Implementation Verification | Izstrādē |
| 76152 | ISO/IEC PWI 27031 | Information technology Security techniques Guidelines for information and communication technology readiness for business continuity | Izstrādē |
Displaying 751-760 of 791 results.
