ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
92416 | ISO/IEC AWI 27007 | Information security, cybersecurity and privacy protection — Guidelines for information security management systems auditing | Izstrādē |
92164 | ISO/IEC NP 25959 | Information security, cybersecurity and privacy protection — Application of attack potential to deep learning-based technology | Izstrādē |
92017 | ISO/IEC PWI 14888-5 | Information technology — Security techniques — Digital signatures with appendix — Part 5: Part-5: lattice-based mechanisms | Izstrādē |
92016 | ISO/IEC AWI 14888-6 | Information technology — Security techniques — Digital signatures with appendix — Part 6: Part 6: Stateless hash-based mechanisms | Izstrādē |
91840 | ISO/IEC WD 25888 | Information Security — Algorithmic Mechanisms to Protect Symmetric Algorithms in Hardware Against Side-Channel Attacks | Izstrādē |
91775 | ISO/IEC WD 27560 | Privacy technologies — Consent record information structure | Izstrādē |
91774 | ISO/IEC PWI 27575 | Privacy for metaverse frameworks | Izstrādē |
91773 | ISO/IEC PWI 25863 | Exploration of digital wallets storing digital credentials | Izstrādē |
91772 | ISO/IEC PWI 25860 | Authenticator exploration | Izstrādē |
91764 | ISO/IEC PWI 25857 | Cybersecurity — Guidance for addressing social engineering threats within the digital environment | Izstrādē |
Displaying 1-10 of 774 results.