ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 86885 | ISO/IEC PWI 21867 | Modes of operations for tweakable ciphers | Izstrādē |
| 86886 | ISO/IEC PWI 20009 | Inclusion of the ZYHW anonymous entity authentication mechanism in ISO/IEC 20009-4 | Izstrādē |
| 86890 | ISO/IEC 18033-2:2006/Amd 2 | Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers — Amendment 2 | Izstrādē |
| 19684 | ISO/IEC WD 11767 | Information technology security techniques — Collection and analysis of requirements for information technology security evaluation criteria | Izstrādē |
| 30818 | ISO/IEC WD 18033 | Information technology — Encryption algorithms | Izstrādē |
| 33910 | ISO/IEC WD 19772 | Information technology — Security techniques — Authenticated encryption | Izstrādē |
| 44377 | ISO/IEC NP 27033 | Information technology — IT Network security | Izstrādē |
| 44380 | ISO/IEC NP 27036 | Information technology — Security techniques — Guidelines for security of outsourcing | Izstrādē |
| 51617 | ISO/IEC 9798-2:1999/NP Amd 1 | Information technology — Security techniques — Entity authentication — Part 2: Mechanisms using symmetric encipherment algorithms — Amendment 1 | Izstrādē |
| 41530 | ISO/IEC NP 24760 | Information Technology — Security Techniques — A Framework for Identity Management | Izstrādē |
Displaying 81-90 of 807 results.
