Registration number (WIID)Project No.TitleStatus
67933ISO/IEC 11770-4:2017Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secretsStandarts spēkā
53475ISO/IEC 11770-4:2006/Cor 1:2009Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets — Technical Corrigendum 1Atcelts
39723ISO/IEC 11770-4:2006Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secretsAtcelts
85929ISO/IEC 11770-3:2021/Amd 1:2025Information security — Key management — Part 3: Mechanisms using asymmetric techniques — Amendment 1: TFNS identity-based key agreementStandarts spēkā
71517ISO/IEC 11770-3:2015/NP Amd 2Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques — Amendment 2Izstrādē
78750ISO/IEC 11770-3:2015/DAmd 2Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques — Amendment 2: SM9 key agreement protocolStandarts spēkā
71165ISO/IEC 11770-3:2015/Cor 1:2016Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques — Technical Corrigendum 1Atcelts
71113ISO/IEC 11770-3:2015/Amd 1:2017Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques — Amendment 1: Blinded Diffie-Hellman key agreementAtcelts
60237ISO/IEC 11770-3:2015Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniquesAtcelts
53474ISO/IEC 11770-3:2008/Cor 1:2009Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques — Technical Corrigendum 1Atcelts
Displaying 761-770 of 807 results.