ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 85850 | ISO/IEC FDIS 29128-2 | Information security, cybersecurity and privacy protection — Verification of Cryptographic Protocols — Part 2: Evaluation Methods and Activities for Cryptographic Protocols | Izstrādē |
| 94230 | ISO/IEC PWI 26689 | Gap analysis for standards on privacy notices and consent and ways to address potential gaps | Izstrādē |
| 82893 | ISO/IEC PWI 7748 | Guidance and practice for privacy preservation based on zero-knowledge proofs | Izstrādē |
| 92017 | ISO/IEC AWI 14888-5 | Information security — Digital signatures with appendix — Part 5: Lattice-based mechanisms | Izstrādē |
| 92016 | ISO/IEC WD 14888-6 | Information security — Digital signatures with appendix — Part 6: Stateless hash-based mechanisms | Izstrādē |
| 60029 | ISO/IEC NP 17547 | Information technology — Security techniques — Guidelines for analysis & interpretation of digital evidence | Izstrādē |
| 91716 | ISO/IEC CD 25330-2.2 | Information security — Oblivious transfer — Part 2: Base oblivious transfer protocols | Izstrādē |
| 85008 | ISO/IEC PWI 6109 | Guidelines for data security monitoring based on logging | Izstrādē |
| 94236 | ISO/IEC AWI TS 27115-1 | Information security, cybersecurity and privacy protection — Cybersecurity of system of systems — Part 1: Security architecture description | Izstrādē |
| 85920 | ISO/IEC DIS 27004 | Information technology — Security techniques — Information security management — Monitoring, measurement, analysis and evaluation | Izstrādē |
Displaying 781-790 of 807 results.
