ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
23706 | ISO/IEC WD 14516-1 | Guidelines for the use and management of Trusted Third Party (TTP) services — Part 1: General overview | Izstrādē |
23231 | ISO/IEC 13888-3:1997 | Information technology — Security techniques — Non-repudiation — Part 3: Mechanisms using asymmetric techniques | Atcelts |
23230 | ISO/IEC 13888-2:1998 | Information technology — Security techniques — Non-repudiation — Part 2: Mechanisms using symmetric techniques | Atcelts |
23229 | ISO/IEC 13888-1:1997 | Information technology — Security techniques — Non-repudiation — Part 1: General | Atcelts |
22053 | ISO/IEC 9797:1994 | Information technology — Security techniques — Data integrity mechanism using a cryptographic check function employing a block cipher algorithm | Atcelts |
21756 | ISO/IEC TR 13335-3:1998 | Information technology — Guidelines for the management of IT Security — Part 3: Techniques for the management of IT Security | Atcelts |
21755 | ISO/IEC TR 13335-2:1997 | Information technology — Guidelines for the management of IT Security — Part 2: Managing and planning IT Security | Atcelts |
21733 | ISO/IEC TR 13335-1:1996 | Information technology — Guidelines for the management of IT Security — Part 1: Concepts and models for IT Security | Atcelts |
21136 | ISO/IEC CD 11768-2 | Information technology security techniques — Evaluation criteria for information technology security — Part 2: Functionality of IT systems, products and components | Izstrādē |
19687 | ISO/IEC 11770-1:1996 | Information technology — Security techniques — Key management — Part 1: Framework | Atcelts |
Displaying 751-760 of 774 results.