ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 86885 | ISO/IEC PWI 21867 | Modes of operations for tweakable ciphers | Izstrādē |
| 94300 | ISO/IEC NP TS 27116-1 | Information security, cybersecurity and privacy protection — Security and privacy — Part 1: Framework for multipurpose evaluation | Izstrādē |
| 90717 | ISO/IEC WD 27505 | Information security, cybersecurity and privacy protection — Privacy in brain computer interface (BCI) applications | Izstrādē |
| 94249 | ISO/IEC AWI 20897-2 | Information security, cybersecurity and privacy protection — Physically unclonable functions — Part 2: Test and evaluation methods | Izstrādē |
| 86886 | ISO/IEC PWI 20009 | Inclusion of the ZYHW anonymous entity authentication mechanism in ISO/IEC 20009-4 | Izstrādē |
| 41309 | ISO/IEC WD 13335-2 | IT security techniques — Management of information and communications technology security — Part 2: Information security risk management | Izstrādē |
| 86890 | ISO/IEC 18033-2:2006/Amd 2 | Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers — Amendment 2 | Izstrādē |
| 84249 | ISO/IEC 29134:2017/DAmd 1 | Information technology — Security techniques — Guidelines for privacy impact assessment — Amendment 1 | Izstrādē |
| 19684 | ISO/IEC WD 11767 | Information technology security techniques — Collection and analysis of requirements for information technology security evaluation criteria | Izstrādē |
| 84244 | ISO/IEC PWI 13025 | Inclusion of arithmetization-friendly cryptographic algorithms in ISO/IEC standards | Izstrādē |
Displaying 791-800 of 807 results.
