ISO/IEC JTC 1/SC 27
| Reģistrācijas numurs (WIID) | Projekta Nr. | Nosaukums | Statuss |
|---|---|---|---|
| 27632 | ISO/IEC 15408-1:1999 | Technologies de l'information — Techniques de sécurité — Critères d'évaluation pour la sécurité TI — Partie 1: Introduction et modèle général | Atcelts |
| 45169 | ISO/IEC 29146:2016 | Information technology — Security techniques — A framework for access management | Atcelts |
| 71113 | ISO/IEC 11770-3:2015/Amd 1:2017 | Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques — Amendment 1: Blinded Diffie-Hellman key agreement | Atcelts |
| 44407 | ISO/IEC 27043:2015 | Technologies de l'information — Techniques de sécurité — Principes et processus d'investigation sur incident | Atcelts |
| 30653 | ISO/IEC 9798-2:1999 | Information technology — Security techniques — Entity authentication — Part 2: Mechanisms using symmetric encipherment algorithms | Atcelts |
| 69726 | ISO/IEC 15946-5:2017 | Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 5: Elliptic curve generation | Atcelts |
| 71121 | ISO/IEC 19896-2:2018 | IT security techniques — Competence requirements for information security testers and evaluators — Part 2: Knowledge, skills and effectiveness requirements for ISO/IEC 19790 testers | Atcelts |
| 39066 | ISO/IEC 13335-1:2004 | Information technology — Security techniques — Management of information and communications technology security — Part 1: Concepts and models for information and communications technology security management | Atcelts |
| 65421 | ISO/IEC 19772:2009/Cor 1:2014 | Technologies de l'information — Techniques de sécurité — Chiffrage authentifié — Rectificatif technique 1 | Atcelts |
| 18105 | ISO/IEC 10118-2:1994 | Information technology — Security techniques — Hash-functions — Part 2: Hash-functions using an n-bit block cipher algorithm | Atcelts |
Attēlo no 281. līdz 290. no pavisam 807 ieraksta(-iem).
