ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
30032 | ISO/IEC WD 10118-4 | Information technology — Security techniques — Hash-functions — Part 4: Hash-functions using modular arithmetic | Izstrādē |
66525 | ISO/IEC NP 19896 | Information technology — Security techniques — Competence requirements for information security testers and evaluators | Izstrādē |
43758 | ISO/IEC NP 27018 | Information technology — Security techniques — Detailing software penetration testing under ISO/IEC 15408 and ISO/IEC 18045 vulnerability analysis | Izstrādē |
53247 | ISO/IEC WD TR 30127 | Information technology — Security techniques — Detailing software penetration testing under ISO/IEC 15408 and ISO/IEC 18045 vulnerability analysis | Izstrādē |
31389 | ISO/IEC FCD 9796-1 | Information technology — Security techniques — Digital signature scheme giving message recovery — Part 1: Mechanisms using redundancy | Izstrādē |
69403 | ISO/IEC NP 20897 | Information technology — Security techniques — Security requirements, test and evaluation methods for physically unclonable functions for generating nonstored security parameters | Izstrādē |
19685 | ISO/IEC WD 11768-3 | Information technology security techniques — Evaluation criteria for information technology security — Part 3: Assurance of IT systems | Izstrādē |
60103 | ISO/IEC NP 17598 | Investigation principles and processes | Izstrādē |
55577 | ISO/IEC NP 15443-1 | Information technology — Security techniques — A framework for IT security assurance — Part 1: Overview and framework | Izstrādē |
52907 | ISO/IEC NP TR 15443-1 | Information technology — Security techniques — A framework for IT security assurance — Part 1: Overview and framework | Izstrādē |
Displaying 81-90 of 774 results.