Registration number (WIID)Project No.TitleStatus
19685ISO/IEC WD 11768-3Information technology security techniques — Evaluation criteria for information technology security — Part 3: Assurance of IT systemsIzstrādē
19684ISO/IEC WD 11767Information technology security techniques — Collection and analysis of requirements for information technology security evaluation criteriaIzstrādē
19682ISO/IEC WD 11765Security information objectsIzstrādē
18105ISO/IEC 10118-2:1994Information technology — Security techniques — Hash-functions — Part 2: Hash-functions using an n-bit block cipher algorithmAtcelts
18104ISO/IEC 10118-1:1994Information technology — Security techniques — Hash-functions — Part 1: GeneralAtcelts
18102ISO/IEC 10116:1991Information technology — Modes of operation for an n-bit block cipher algorithmAtcelts
17887ISO/IEC 9979:1991Data cryptographic techniques — Procedures for the registration of cryptographic algorithmsAtcelts
17663ISO/IEC 9798-3:1993Information technology — Security techniques — Entity authentication mechanisms — Part 3: Entity authentication using a public key algorithmAtcelts
17662ISO/IEC 9798-2:1994Information technology — Security techniques — Entity authentication — Part 2: Mechanisms using symmetric encipherment algorithmsAtcelts
17661ISO/IEC 9798-1:1991Information technology — Security techniques — Entity authentication mechanisms — Part 1: General modelAtcelts
Displaying 761-770 of 774 results.