ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 92164 | ISO/IEC AWI 25959 | Information security, cybersecurity and privacy protection — Application of attack potential to deep learning-based technology | Izstrādē |
| 89517 | ISO/IEC 14888-3:2018/DAmd 1 | IT Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms — Amendment 1 | Izstrādē |
| 85920 | ISO/IEC CD 27004 | Information technology — Security techniques — Information security management — Monitoring, measurement, analysis and evaluation | Izstrādē |
| 88143 | ISO/IEC 27566-1 | Information security, cybersecurity and privacy protection — Age assurance systems — Part 1: Framework | Izstrādē |
| 91716 | ISO/IEC WD 25330-2 | Information Security — Oblivious Transfer — Part 2: Base oblivious transfer | Izstrādē |
| 92016 | ISO/IEC WD 14888-6 | Information security — Digital signatures with appendix — Part 6: Stateless hash-based mechanisms | Izstrādē |
| 91840 | ISO/IEC WD 25888 | Information Security — Algorithmic Mechanisms to Protect Symmetric Algorithms in Hardware Against Side-Channel Attacks | Izstrādē |
| 92017 | ISO/IEC AWI 14888-5 | Information security — Digital signatures with appendix — Part 5: Lattice-based mechanisms | Izstrādē |
| 92416 | ISO/IEC CD 27007 | Information security, cybersecurity and privacy protection — Guidelines for information security management systems auditing | Izstrādē |
| 89525 | ISO/IEC WD 27573 | Privacy protection of user avatar and system avatar interactions in the metaverse | Izstrādē |
Displaying 1-10 of 791 results.
