Registration number (WIID)Project No.TitleStatus
64267ISO/IEC 14888-3:2016Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanismsAtcelts
70631ISO/IEC 14888-3:2016/DAmd 1Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms — Amendment 1: SM2 digital signature mechanismIzstrādē
76382ISO/IEC 14888-3:2018IT Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanismsStandarts spēkā
89517ISO/IEC 14888-3:2018/CD Amd 1IT Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms — Amendment 1Izstrādē
27170ISO/IEC 15292:2001Information technology - Security techniques - Protection Profile registration proceduresAtcelts
27632ISO/IEC 15408-1:1999Information technology Security techniques Evaluation criteria for IT securityAtcelts
27632ISO/IEC 15408-1:1999Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general modelAtcelts
38738ISO/IEC 15408-1:1999/CD Cor 1Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model — Technical Corrigendum 1Izstrādē
40612ISO/IEC 15408-1:2005Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general modelAtcelts
50341ISO/IEC 15408-1:2009Information technology Security techniques Evaluation criteria for IT securityAtcelts
Displaying 81-90 of 770 results.