Registration number (WIID)Project No.TitleStatus
31075ISO/IEC 15946-1:2002Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 1: GeneralAtcelts
31076ISO/IEC 15946-2:2002Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 2: Digital signaturesAtcelts
31077ISO/IEC 15946-3:2002Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 3: Key establishmentAtcelts
31136ISO/IEC 9797-2:2002Information technology — Security techniques — Message Authentication Codes (MACs) — Part 2: Mechanisms using a dedicated hash-functionAtcelts
31138ISO/IEC 9796-3:2000Information technology — Security techniques — Digital signature schemes giving message recovery — Part 3: Discrete logarithm based mechanismsAtcelts
31142ISO/IEC TR 13335-5:2001Information technology — Guidelines for the management of IT Security — Part 5: Management guidance on network securityAtcelts
31142ISO/IEC TR 13335-5:2001Information technology Guidelines for the management of IT SecurityAtcelts
31143ISO/IEC 10118-1:2000Information technology — Security techniques — Hash-functions — Part 1: GeneralAtcelts
31389ISO/IEC FCD 9796-1Information technology — Security techniques — Digital signature scheme giving message recovery — Part 1: Mechanisms using redundancyIzstrādē
31482ISO/IEC TR 14516:2002Information technology — Security techniques — Guidelines for the use and management of Trusted Third Party servicesStandarts spēkā
Displaying 71-80 of 770 results.