ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 21733 | ISO/IEC TR 13335-1:1996 | Information technology — Guidelines for the management of IT Security — Part 1: Concepts and models for IT Security | Atcelts |
| 21136 | ISO/IEC CD 11768-2 | Information technology security techniques — Evaluation criteria for information technology security — Part 2: Functionality of IT systems, products and components | Izstrādē |
| 19687 | ISO/IEC 11770-1:1996 | Information technology — Security techniques — Key management — Part 1: Framework | Atcelts |
| 19685 | ISO/IEC WD 11768-3 | Information technology security techniques — Evaluation criteria for information technology security — Part 3: Assurance of IT systems | Izstrādē |
| 19684 | ISO/IEC WD 11767 | Information technology security techniques — Collection and analysis of requirements for information technology security evaluation criteria | Izstrādē |
| 19682 | ISO/IEC WD 11765 | Security information objects | Izstrādē |
| 18105 | ISO/IEC 10118-2:1994 | Information technology — Security techniques — Hash-functions — Part 2: Hash-functions using an n-bit block cipher algorithm | Atcelts |
| 18104 | ISO/IEC 10118-1:1994 | Information technology — Security techniques — Hash-functions — Part 1: General | Atcelts |
| 18102 | ISO/IEC 10116:1991 | Information technology — Modes of operation for an n-bit block cipher algorithm | Atcelts |
| 17887 | ISO/IEC 9979:1991 | Data cryptographic techniques — Procedures for the registration of cryptographic algorithms | Atcelts |
Displaying 791-800 of 807 results.
