ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 19685 | ISO/IEC WD 11768-3 | Information technology security techniques — Evaluation criteria for information technology security — Part 3: Assurance of IT systems | Izstrādē |
| 66801 | ISO/IEC NP 19989 | Information technology — Security techniques — Criteria and methodology for security evaluation of biometric systems | Izstrādē |
| 43752 | ISO/IEC WD 27012 | Information technology - Security techniques — ISM guidelines for e-government services | Izstrādē |
| 71525 | ISO/IEC DIS 10118-2 | Information technology — Security techniques — Hash-functions — Part 2: Hash-functions using an n-bit block cipher | Izstrādē |
| 73908 | ISO/IEC NP 20008-2 | Information technology Security techniques Anonymous digital signatures | Izstrādē |
| 89506 | ISO/IEC PWI 25227 | Inclusion of further attribute-based credential schemes in SC27/WG2 standards | Izstrādē |
| 91775 | ISO/IEC CD 27560 | Privacy technologies — Consent record information structure | Izstrādē |
| 38739 | ISO/IEC 15408-2:1999/CD Cor 1 | Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional requirements — Technical Corrigendum 1 | Izstrādē |
| 41312 | ISO/IEC NP 13335-5 | Information technology — Guidelines for the management of IT Security — Part 5: Management guidance on network security | Izstrādē |
| 38738 | ISO/IEC 15408-1:1999/CD Cor 1 | Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model — Technical Corrigendum 1 | Izstrādē |
Displaying 781-790 of 791 results.
