ISO/IEC JTC 1/SC 27
| Reģistrācijas numurs (WIID) | Projekta Nr. | Nosaukums | Statuss |
|---|---|---|---|
| 25995 | ISO/IEC 14888-2:1999 | Information technology — Security techniques — Digital signatures with appendix — Part 2: Identity-based mechanisms | Atcelts |
| 44405 | ISO/IEC 27041:2015 | Information technology — Security techniques — Guidance on assuring suitability and adequacy of incident investigative method | Atcelts |
| 42505 | ISO/IEC 27006:2007 | Technologies de l'information — Techniques de sécurité — Exigences pour les organismes procédant à l'audit et à la certification des systèmes de management de la sécurité de l'information | Atcelts |
| 40011 | ISO/IEC 18028-4:2005 | Informācijas tehnoloģija - Drošības paņēmieni - IT tīklu drošība - 4.daļa: Drošības radīšana tālpiekļūstamības gadījumā | Atcelts |
| 35394 | ISO/IEC 18043:2006 | Information technology — Security techniques — Selection, deployment and operations of intrusion detection systems | Atcelts |
| 75296 | ISO/IEC 9797-2:2021 | Information security — Message authentication codes (MACs) — Part 2: Mechanisms using a dedicated hash-function | Atcelts |
| 53474 | ISO/IEC 11770-3:2008/Cor 1:2009 | Technologies de l'information — Techniques de sécurité — Gestion de clés — Partie 3: Mécanismes utilisant des techniques asymétriques — Rectificatif technique 1 | Atcelts |
| 35455 | ISO/IEC 9796-2:2002 | Information technology — Security techniques — Digital signature schemes giving message recovery — Part 2: Integer factorization based mechanisms | Atcelts |
| 40011 | ISO/IEC 18028-4:2005 | Technologies de l'information — Techniques de sécurité — Sécurité de réseaux TI — Partie 4: Téléaccès de la sécurité | Atcelts |
| 27634 | ISO/IEC 15408-3:1999 | Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance requirements | Atcelts |
Attēlo no 321. līdz 330. no pavisam 807 ieraksta(-iem).
