ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
31075 | ISO/IEC 15946-1:2002 | Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 1: General | Atcelts |
31076 | ISO/IEC 15946-2:2002 | Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 2: Digital signatures | Atcelts |
31077 | ISO/IEC 15946-3:2002 | Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 3: Key establishment | Atcelts |
31136 | ISO/IEC 9797-2:2002 | Information technology — Security techniques — Message Authentication Codes (MACs) — Part 2: Mechanisms using a dedicated hash-function | Atcelts |
31138 | ISO/IEC 9796-3:2000 | Information technology — Security techniques — Digital signature schemes giving message recovery — Part 3: Discrete logarithm based mechanisms | Atcelts |
31142 | ISO/IEC TR 13335-5:2001 | Information technology — Guidelines for the management of IT Security — Part 5: Management guidance on network security | Atcelts |
31142 | ISO/IEC TR 13335-5:2001 | Information technology Guidelines for the management of IT Security | Atcelts |
31143 | ISO/IEC 10118-1:2000 | Information technology — Security techniques — Hash-functions — Part 1: General | Atcelts |
31389 | ISO/IEC FCD 9796-1 | Information technology — Security techniques — Digital signature scheme giving message recovery — Part 1: Mechanisms using redundancy | Izstrādē |
31482 | ISO/IEC TR 14516:2002 | Information technology — Security techniques — Guidelines for the use and management of Trusted Third Party services | Standarts spēkā |
Displaying 71-80 of 770 results.