ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 83139 | ISO/IEC WD 18033-8 | Information security — Encryption algorithms — Part 8: Fully Homomorphic Encryption | Izstrādē |
| 81627 | ISO/IEC WD TS 27115.4 | Cybersecurity evaluation of complex systems — Introduction and framework overview | Izstrādē |
| 30813 | ISO/IEC WD 18028 | Information technology — IT Network security | Izstrādē |
| 27635 | ISO/IEC CD 15408-4 | Information technology — Security techniques — Evaluation criteria for IT security — Part 4: Security assurance requirements | Izstrādē |
| 82889 | ISO/IEC PWI 7709.2 | Security and privacy-preserving guidelines for multi-sourced data processing | Izstrādē |
| 82892 | ISO/IEC PWI 7732 | Age verification | Izstrādē |
| 84245 | ISO/IEC PWI 13035 | Amendment of Identity-Based Authenticated Key Exchange | Izstrādē |
| 82883 | ISO/IEC PWI 19792 | Information technology — Security techniques — Security evaluation of biometrics | Izstrādē |
| 27689 | ISO/IEC CD 15446 | Information technology — Security techniques — Guide for the production of Protection profiles and Security Targets | Izstrādē |
| 87375 | ISO/IEC DTS 5689 | Cybersecurity — Security frameworks and use cases for cyber physical systems | Izstrādē |
Displaying 771-780 of 791 results.
