• Filter:

  •  
  •  
  •  
  •  
Standard and/or project Stage TC
IWA 17:2014
Information and operations security and integrity requirements for lottery and gaming organizations
90.93 ISO/TMBG
ISO 7064:1983
Data processing — Check character systems
95.99 ISO/IEC JTC 1/SC 32
ISO/IEC 7064:2003
Information technology — Security techniques — Check character systems
90.93 ISO/IEC JTC 1/SC 27
ISO 8372:1987
Information processing — Modes of operation for a 64-bit block cipher algorithm
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 9796-2:1997
Information technology — Security techniques — Digital signature schemes giving message recovery — Part 2: Mechanisms using a hash-function
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 9796-2:2002
Information technology — Security techniques — Digital signature schemes giving message recovery — Part 2: Integer factorization based mechanisms
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 9796-2:2002/Amd 1:2008
Information technology — Security techniques — Digital signature schemes giving message recovery — Part 2: Integer factorization based mechanisms — Amendment 1
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 9796-2:2010
Information technology — Security techniques — Digital signature schemes giving message recovery — Part 2: Integer factorization based mechanisms
90.93 ISO/IEC JTC 1/SC 27
ISO/IEC 9796-3:2000
Information technology — Security techniques — Digital signature schemes giving message recovery — Part 3: Discrete logarithm based mechanisms
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 9796-3:2006
Information technology — Security techniques — Digital signature schemes giving message recovery — Part 3: Discrete logarithm based mechanisms
90.93 ISO/IEC JTC 1/SC 27
ISO/IEC 9796:1991
Information technology — Security techniques — Digital signature scheme giving message recovery
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 9797-1:1999
Information technology — Security techniques — Message Authentication Codes (MACs) — Part 1: Mechanisms using a block cipher
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 9797-1:2011
Information technology — Security techniques — Message Authentication Codes (MACs) — Part 1: Mechanisms using a block cipher
90.93 ISO/IEC JTC 1/SC 27
ISO/IEC 9797-1:2011/AWI Amd 1
Information technology — Security techniques — Message Authentication Codes (MACs) — Part 1: Mechanisms using a block cipher — Amendment 1
20.00 ISO/IEC JTC 1/SC 27
ISO/IEC 9797-2:2002
Information technology — Security techniques — Message Authentication Codes (MACs) — Part 2: Mechanisms using a dedicated hash-function
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 9797-2:2011
Information technology — Security techniques — Message Authentication Codes (MACs) — Part 2: Mechanisms using a dedicated hash-function
90.92 ISO/IEC JTC 1/SC 27
ISO/IEC 9797-3:2011
Information technology — Security techniques — Message Authentication Codes (MACs) — Part 3: Mechanisms using a universal hash-function
90.93 ISO/IEC JTC 1/SC 27
ISO/IEC 9797-3:2011/DAmd 1
Information technology — Security techniques — Message Authentication Codes (MACs) — Part 3: Mechanisms using a universal hash-function — Amendment 1
40.20 ISO/IEC JTC 1/SC 27
ISO/IEC 9797:1989
Data cryptographic techniques — Data integrity mechanism using a cryptographic check function employing a block cipher algorithm
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 9797:1994
Information technology — Security techniques — Data integrity mechanism using a cryptographic check function employing a block cipher algorithm
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC CD 9797-2
Information technology — Security techniques — Message Authentication Codes (MACs) — Part 2: Mechanisms using a dedicated hash-function
30.60 ISO/IEC JTC 1/SC 27
ISO/IEC 9798-1:1991
Information technology — Security techniques — Entity authentication mechanisms — Part 1: General model
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 9798-1:1997
Information technology — Security techniques — Entity authentication — Part 1: General
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 9798-1:2010
Information technology — Security techniques — Entity authentication — Part 1: General
90.93 ISO/IEC JTC 1/SC 27
ISO/IEC 9798-2:1994
Information technology — Security techniques — Entity authentication — Part 2: Mechanisms using symmetric encipherment algorithms
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 9798-2:1999
Information technology — Security techniques — Entity authentication — Part 2: Mechanisms using symmetric encipherment algorithms
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 9798-2:1999/Cor 1:2004
Information technology — Security techniques — Entity authentication — Part 2: Mechanisms using symmetric encipherment algorithms — Technical Corrigendum 1
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 9798-2:2008
Information technology — Security techniques — Entity authentication — Part 2: Mechanisms using symmetric encipherment algorithms
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 9798-2:2008/Cor 1:2010
Information technology — Security techniques — Entity authentication — Part 2: Mechanisms using symmetric encipherment algorithms — Technical Corrigendum 1
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 9798-2:2008/Cor 2:2012
Information technology — Security techniques — Entity authentication — Part 2: Mechanisms using symmetric encipherment algorithms — Technical Corrigendum 2
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 9798-2:2008/Cor 3:2013
Information technology — Security techniques — Entity authentication — Part 2: Mechanisms using symmetric encipherment algorithms — Technical Corrigendum 3
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 9798-2:2019
IT Security techniques — Entity authentication — Part 2: Mechanisms using authenticated encryption
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC 9798-3:1993
Information technology — Security techniques — Entity authentication mechanisms — Part 3: Entity authentication using a public key algorithm
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 9798-3:1998
Information technology — Security techniques — Entity authentication — Part 3: Mechanisms using digital signature techniques
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 9798-3:1998/Amd 1:2010
Information technology — Security techniques — Entity authentication — Part 3: Mechanisms using digital signature techniques — Amendment 1: .
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 9798-3:1998/Cor 1:2009
Information technology — Security techniques — Entity authentication — Part 3: Mechanisms using digital signature techniques — Technical Corrigendum 1
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 9798-3:1998/Cor 2:2012
Information technology — Security techniques — Entity authentication — Part 3: Mechanisms using digital signature techniques — Technical Corrigendum 2
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 9798-3:2019
IT Security techniques — Entity authentication — Part 3: Mechanisms using digital signature techniques
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC 9798-4:1995
Information technology — Security techniques — Entity authentication — Part 4: Mechanisms using a cryptographic check function
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 9798-4:1999
Information technology — Security techniques — Entity authentication — Part 4: Mechanisms using a cryptographic check function
90.93 ISO/IEC JTC 1/SC 27
ISO/IEC 9798-4:1999/Cor 1:2009
Information technology — Security techniques — Entity authentication — Part 4: Mechanisms using a cryptographic check function — Technical Corrigendum 1
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC 9798-4:1999/Cor 2:2012
Information technology — Security techniques — Entity authentication — Part 4: Mechanisms using a cryptographic check function — Technical Corrigendum 2
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC 9798-5:1999
Information technology — Security techniques — Entity authentication — Part 5: Mechanisms using zero knowledge techniques
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 9798-5:2004
Information technology — Security techniques — Entity authentication — Part 5: Mechanisms using zero-knowledge techniques
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 9798-5:2009
Information technology — Security techniques — Entity authentication — Part 5: Mechanisms using zero-knowledge techniques
90.92 ISO/IEC JTC 1/SC 27
ISO/IEC 9798-6:2005
Information technology — Security techniques — Entity authentication — Part 6: Mechanisms using manual data transfer
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 9798-6:2005/Cor 1:2009
Information technology — Security techniques — Entity authentication — Part 6: Mechanisms using manual data transfer — Technical Corrigendum 1
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 9798-6:2010
Information technology — Security techniques — Entity authentication — Part 6: Mechanisms using manual data transfer
90.93 ISO/IEC JTC 1/SC 27
ISO/IEC AWI 9798-5
Information technology — Security techniques — Entity authentication — Part 5: Mechanisms using zero-knowledge techniques
20.00 ISO/IEC JTC 1/SC 27
ISO/IEC CD 9798-5
Information technology — Security techniques — Entity authentication — Part 5: Mechanisms using zero-knowledge techniques
30.98 ISO/IEC JTC 1/SC 27
ISO/IEC 9979:1991
Data cryptographic techniques — Procedures for the registration of cryptographic algorithms
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 9979:1999
Information technology — Security techniques — Procedures for the registration of cryptographic algorithms
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 10116:1991
Information technology — Modes of operation for an n-bit block cipher algorithm
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 10116:1997
Information technology — Security techniques — Modes of operation for an n-bit block cipher
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 10116:2006
Information technology — Security techniques — Modes of operation for an n-bit block cipher
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 10116:2006/Cor 1:2008
Information technology — Security techniques — Modes of operation for an n-bit block cipher — Technical Corrigendum 1
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 10116:2017
Information technology — Security techniques — Modes of operation for an n-bit block cipher
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC 10116:2017/AWI Amd 1
Information technology — Security techniques — Modes of operation for an n-bit block cipher — Amendment 1
20.00 ISO/IEC JTC 1/SC 27
ISO/IEC 10118-1:1994
Information technology — Security techniques — Hash-functions — Part 1: General
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 10118-1:2000
Information technology — Security techniques — Hash-functions — Part 1: General
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 10118-1:2016
Information technology — Security techniques — Hash-functions — Part 1: General
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC 10118-1:2016/AWI Amd 1
Information technology — Security techniques — Hash-functions — Part 1: General — Amendment 1
20.00 ISO/IEC JTC 1/SC 27
ISO/IEC 10118-2:1994
Information technology — Security techniques — Hash-functions — Part 2: Hash-functions using an n-bit block cipher algorithm
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 10118-2:2000
Information technology — Security techniques — Hash-functions — Part 2: Hash-functions using an n-bit block cipher
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 10118-2:2000/Cor 1:2006
Information technology — Security techniques — Hash-functions — Part 2: Hash-functions using an n-bit block cipher — Technical Corrigendum 1
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 10118-2:2000/Cor 2:2007
Information technology — Security techniques — Hash-functions — Part 2: Hash-functions using an n-bit block cipher — Technical Corrigendum 2
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 10118-2:2010
Information technology — Security techniques — Hash-functions — Part 2: Hash-functions using an n-bit block cipher
90.93 ISO/IEC JTC 1/SC 27
ISO/IEC 10118-2:2010/Cor 1:2011
Information technology — Security techniques — Hash-functions — Part 2: Hash-functions using an n-bit block cipher — Technical Corrigendum 1
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC 10118-3:1998
Information technology — Security techniques — Hash-functions — Part 3: Dedicated hash-functions
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 10118-3:2003
Information technology — Security techniques — Hash-functions — Part 3: Dedicated hash-functions
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 10118-3:2004
Information technology — Security techniques — Hash-functions — Part 3: Dedicated hash-functions
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 10118-3:2004/Amd 1:2006
Information technology — Security techniques — Hash-functions — Part 3: Dedicated hash-functions — Amendment 1: Dedicated Hash-Function 8 (SHA-224)
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 10118-3:2004/Cor 1:2011
Information technology — Security techniques — Hash-functions — Part 3: Dedicated hash-functions — Technical Corrigendum 1
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 10118-3:2018
IT Security techniques — Hash-functions — Part 3: Dedicated hash-functions
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC 10118-4:1998
Information technology — Security techniques — Hash-functions — Part 4: Hash-functions using modular arithmetic
90.93 ISO/IEC JTC 1/SC 27
ISO/IEC 10118-4:1998/Amd 1:2014
Information technology — Security techniques — Hash-functions — Part 4: Hash-functions using modular arithmetic — Amendment 1: Object identifiers
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC 10118-4:1998/Cor 1:2014
Information technology — Security techniques — Hash-functions — Part 4: Hash-functions using modular arithmetic — Technical Corrigendum 1
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC 11770-1:1996
Information technology — Security techniques — Key management — Part 1: Framework
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 11770-1:2010
Information technology — Security techniques — Key management — Part 1: Framework
90.93 ISO/IEC JTC 1/SC 27
ISO/IEC 11770-2:1996
Information technology — Security techniques — Key management — Part 2: Mechanisms using symmetric techniques
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 11770-2:1996/Cor 1:2005
Information technology — Security techniques — Key management — Part 2: Mechanisms using symmetric techniques — Technical Corrigendum 1
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 11770-2:2008
Information technology — Security techniques — Key management — Part 2: Mechanisms using symmetric techniques
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 11770-2:2008/Cor 1:2009
Information technology — Security techniques — Key management — Part 2: Mechanisms using symmetric techniques — Technical Corrigendum 1
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 11770-2:2018
IT Security techniques — Key management — Part 2: Mechanisms using symmetric techniques
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC 11770-3:1999
Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 11770-3:2008
Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 11770-3:2008/Cor 1:2009
Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques — Technical Corrigendum 1
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 11770-3:2015
Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC 11770-3:2015/AWI Amd 2
Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques — Amendment 2
20.00 ISO/IEC JTC 1/SC 27
ISO/IEC 11770-3:2015/Amd 1:2017
Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques — Amendment 1: Blinded Diffie-Hellman key agreement
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC 11770-3:2015/Cor 1:2016
Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques — Technical Corrigendum 1
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC 11770-4:2006
Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 11770-4:2006/Cor 1:2009
Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets — Technical Corrigendum 1
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 11770-4:2017
Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC 11770-4:2017/Amd 1:2019
Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets — Amendment 1: Unbalanced Password-Authenticated Key Agreement with Identity-Based Cryptosystems (UPAKA-IBC)
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC 11770-4:2017/CD Amd 2.2
Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets — Amendment 2
30.60 ISO/IEC JTC 1/SC 27
ISO/IEC 11770-5:2011
Information technology — Security techniques — Key management — Part 5: Group key management
90.92 ISO/IEC JTC 1/SC 27
ISO/IEC 11770-6:2016
Information technology — Security techniques — Key management — Part 6: Key derivation
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC CD 11770-5
Information technology — Security techniques — Key management — Part 5: Group key management
30.20 ISO/IEC JTC 1/SC 27
ISO/IEC 11889-1:2009
Information technology — Trusted Platform Module — Part 1: Overview
90.93 ISO/IEC JTC 1
ISO/IEC 11889-1:2015
Information technology — Trusted platform module library — Part 1: Architecture
60.60 ISO/IEC JTC 1
ISO/IEC 11889-2:2009
Information technology — Trusted Platform Module — Part 2: Design principles
90.93 ISO/IEC JTC 1
ISO/IEC 11889-2:2015
Information technology — Trusted Platform Module Library — Part 2: Structures
60.60 ISO/IEC JTC 1
ISO/IEC 11889-3:2009
Information technology — Trusted Platform Module — Part 3: Structures
90.93 ISO/IEC JTC 1
ISO/IEC 11889-3:2015
Information technology — Trusted Platform Module Library — Part 3: Commands
60.60 ISO/IEC JTC 1
ISO/IEC 11889-4:2009
Information technology — Trusted Platform Module — Part 4: Commands
90.93 ISO/IEC JTC 1
ISO/IEC 11889-4:2015
Information technology — Trusted Platform Module Library — Part 4: Supporting Routines
60.60 ISO/IEC JTC 1
ISO/IEC 13335-1:2004
Information technology — Security techniques — Management of information and communications technology security — Part 1: Concepts and models for information and communications technology security management
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC TR 13335-1:1996
Information technology — Guidelines for the management of IT Security — Part 1: Concepts and models for IT Security
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC TR 13335-2:1997
Information technology — Guidelines for the management of IT Security — Part 2: Managing and planning IT Security
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC TR 13335-3:1998
Information technology — Guidelines for the management of IT Security — Part 3: Techniques for the management of IT Security
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC TR 13335-4:2000
Information technology — Guidelines for the management of IT Security — Part 4: Selection of safeguards
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC TR 13335-5:2001
Information technology — Guidelines for the management of IT Security — Part 5: Management guidance on network security
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 13888-1:1997
Information technology — Security techniques — Non-repudiation — Part 1: General
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 13888-1:2004
IT security techniques — Non-repudiation — Part 1: General
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 13888-1:2009
Information technology — Security techniques — Non-repudiation — Part 1: General
90.92 ISO/IEC JTC 1/SC 27
ISO/IEC 13888-2:1998
Information technology — Security techniques — Non-repudiation — Part 2: Mechanisms using symmetric techniques
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 13888-2:2010
Information technology — Security techniques — Non-repudiation — Part 2: Mechanisms using symmetric techniques
90.93 ISO/IEC JTC 1/SC 27
ISO/IEC 13888-2:2010/Cor 1:2012
Information technology — Security techniques — Non-repudiation — Part 2: Mechanisms using symmetric techniques — Technical Corrigendum 1
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC 13888-3:1997
Information technology — Security techniques — Non-repudiation — Part 3: Mechanisms using asymmetric techniques
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 13888-3:2009
Information technology — Security techniques — Non-repudiation — Part 3: Mechanisms using asymmetric techniques
90.92 ISO/IEC JTC 1/SC 27
ISO/IEC CD 13888-1
Information technology — Security techniques — Non-repudiation — Part 1: General
30.60 ISO/IEC JTC 1/SC 27
ISO/IEC CD 13888-3
Information technology — Security techniques — Non-repudiation — Part 3: Mechanisms using asymmetric techniques
30.60 ISO/IEC JTC 1/SC 27
ISO/IEC TR 14516:2002
Information technology — Security techniques — Guidelines for the use and management of Trusted Third Party services
90.93 ISO/IEC JTC 1/SC 27
ISO/IEC 14888-1:1998
Information technology — Security techniques — Digital signatures with appendix — Part 1: General
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 14888-1:2008
Information technology — Security techniques — Digital signatures with appendix — Part 1: General
90.60 ISO/IEC JTC 1/SC 27
ISO/IEC 14888-2:1999
Information technology — Security techniques — Digital signatures with appendix — Part 2: Identity-based mechanisms
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 14888-2:2008
Information technology — Security techniques — Digital signatures with appendix — Part 2: Integer factorization based mechanisms
90.60 ISO/IEC JTC 1/SC 27
ISO/IEC 14888-2:2008/Cor 1:2015
Information technology — Security techniques — Digital signatures with appendix — Part 2: Integer factorization based mechanisms — Technical Corrigendum 1: To ISO/IEC 14888-2:2008
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC 14888-3:1998
Information technology — Security techniques — Digital signatures with appendix — Part 3: Certificate-based mechanisms
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 14888-3:1998/Cor 1:2001
Information technology — Security techniques — Digital signatures with appendix — Part 3: Certificate-based mechanisms — Technical Corrigendum 1
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 14888-3:2006
Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 14888-3:2006/Amd 1:2010
Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms — Amendment 1: Elliptic Curve Russian Digital Signature Algorithm, Schnorr Digital Signature Algorithm, Elliptic Curve Schnorr Digital Signature Algorithm, and Elliptic Curve Full Schnorr Digital Signature Algorithm
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 14888-3:2006/Amd 2:2012
Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms — Amendment 2: Optimizing hash inputs
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 14888-3:2006/Cor 1:2007
Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms — Technical Corrigendum 1
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 14888-3:2006/Cor 2:2009
Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms — Technical Corrigendum 2
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 14888-3:2016
Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 14888-3:2016/DAmd 1
Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms — Amendment 1: SM2 digital signature mechanism
40.98 ISO/IEC JTC 1/SC 27
ISO/IEC 14888-3:2018
IT Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC 15292:2001
Information technology - Security techniques - Protection Profile registration procedures
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 15408-1:1999
Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 15408-1:2005
Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 15408-1:2009
Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model
90.92 ISO/IEC JTC 1/SC 27
ISO/IEC 15408-2:1999
Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional requirements
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 15408-2:2005
Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional requirements
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 15408-2:2008
Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional components
90.92 ISO/IEC JTC 1/SC 27
ISO/IEC 15408-3:1999
Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance requirements
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 15408-3:2005
Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance requirements
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 15408-3:2008
Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance components
90.92 ISO/IEC JTC 1/SC 27
ISO/IEC CD 15408-1.3
Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model
30.60 ISO/IEC JTC 1/SC 27
ISO/IEC CD 15408-2
Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional components
30.60 ISO/IEC JTC 1/SC 27
ISO/IEC CD 15408-3
Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance components
30.60 ISO/IEC JTC 1/SC 27
ISO/IEC CD 15408-4
Information technology — Security techniques — Evaluation criteria for IT security — Part 4: Framework for the specification of evaluation methods and activities
30.60 ISO/IEC JTC 1/SC 27
ISO/IEC CD 15408-5
Information technology — Security techniques — Evaluation criteria for IT security — Part 5: Pre-defined packages of security requirements
30.60 ISO/IEC JTC 1/SC 27
ISO/IEC TR 15443-1:2005
Information technology — Security techniques — A framework for IT security assurance — Part 1: Overview and framework
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC TR 15443-1:2012
Information technology — Security techniques — Security assurance framework — Part 1: Introduction and concepts
90.93 ISO/IEC JTC 1/SC 27
ISO/IEC TR 15443-2:2005
Information technology — Security techniques — A framework for IT security assurance — Part 2: Assurance methods
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC TR 15443-2:2012
Information technology — Security techniques — Security assurance framework — Part 2: Analysis
90.93 ISO/IEC JTC 1/SC 27
ISO/IEC TR 15443-3:2007
Information technology — Security techniques — A framework for IT security assurance — Part 3: Analysis of assurance methods
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC TR 15446:2004
Information technology — Security techniques — Guide for the production of Protection Profiles and Security Targets
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC TR 15446:2009
Information technology — Security techniques — Guide for the production of Protection Profiles and Security Targets
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC TR 15446:2017
Information technology — Security techniques — Guidance for the production of protection profiles and security targets
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC 15816:2002
Information technology — Security techniques — Security information objects for access control
90.93 ISO/IEC JTC 1/SC 27
ISO/IEC 15945:2002
Information technology — Security techniques — Specification of TTP services to support the application of digital signatures
90.93 ISO/IEC JTC 1/SC 27
ISO/IEC 15946-1:2002
Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 1: General
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 15946-1:2008
Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 1: General
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 15946-1:2008/Cor 1:2009
Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 1: General — Technical Corrigendum 1
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 15946-1:2008/Cor 2:2014
Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 1: General — Technical Corrigendum 2
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 15946-1:2016
Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 1: General
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC 15946-2:2002
Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 2: Digital signatures
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 15946-3:2002
Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 3: Key establishment
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 15946-4:2004
Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 4: Digital signatures giving message recovery
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 15946-5:2009
Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 5: Elliptic curve generation
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 15946-5:2009/Cor 1:2012
Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 5: Elliptic curve generation — Technical Corrigendum 1
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 15946-5:2017
Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 5: Elliptic curve generation
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC TR 15947:2002
Information technology — Security techniques — IT intrusion detection framework
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 17799:2000
Information technology — Code of practice for information security management
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 17799:2005
Information technology — Security techniques — Code of practice for information security management
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 17799:2005/Cor 1:2007
Information technology — Security techniques — Code of practice for information security management — Technical Corrigendum 1
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 17825:2016
Information technology — Security techniques — Testing methods for the mitigation of non-invasive attack classes against cryptographic modules
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC 17922:2017
Information technology — Security techniques — Telebiometric authentication framework using biometric hardware security module
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC 18014-1:2002
Information technology — Security techniques — Time-stamping services — Part 1: Framework
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 18014-1:2008
Information technology — Security techniques — Time-stamping services — Part 1: Framework
90.93 ISO/IEC JTC 1/SC 27
ISO/IEC 18014-2:2002
Information technology — Security techniques — Time-stamping services — Part 2: Mechanisms producing independent tokens
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 18014-2:2009
Information technology — Security techniques — Time-stamping services — Part 2: Mechanisms producing independent tokens
90.92 ISO/IEC JTC 1/SC 27
ISO/IEC 18014-3:2004
Information technology — Security techniques — Time-stamping services — Part 3: Mechanisms producing linked tokens
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 18014-3:2009
Information technology — Security techniques — Time-stamping services — Part 3: Mechanisms producing linked tokens
90.93 ISO/IEC JTC 1/SC 27
ISO/IEC 18014-4:2015
Information technology — Security techniques — Time-stamping services — Part 4: Traceability of time sources
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC WD 18014-2
Information technology — Security techniques — Time-stamping services — Part 2: Mechanisms producing independent tokens
20.60 ISO/IEC JTC 1/SC 27
ISO/IEC 18028-1:2006
Information technology — Security techniques — IT network security — Part 1: Network security management
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 18028-2:2006
Information technology — Security techniques — IT network security — Part 2: Network security architecture
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 18028-3:2005
Information technology — Security techniques — IT network security — Part 3: Securing communications between networks using security gateways
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 18028-4:2005
Information technology — Security techniques — IT network security — Part 4: Securing remote access
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 18028-5:2006
Information technology — Security techniques — IT network security — Part 5: Securing communications across networks using virtual private networks
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 18031:2005
Information technology — Security techniques — Random bit generation
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 18031:2005/Cor 1:2009
Information technology — Security techniques — Random bit generation — Technical Corrigendum 1
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 18031:2011
Information technology — Security techniques — Random bit generation
90.93 ISO/IEC JTC 1/SC 27
ISO/IEC 18031:2011/Amd 1:2017
Information technology — Security techniques — Random bit generation — Amendment 1: Deterministic random bit generation
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC 18031:2011/Cor 1:2014
Information technology — Security techniques — Random bit generation — Technical Corrigendum 1
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC 18032:2005
Information technology — Security techniques — Prime number generation
90.92 ISO/IEC JTC 1/SC 27
ISO/IEC DIS 18032
Information technology — Security techniques — Prime number generation
40.60 ISO/IEC JTC 1/SC 27
ISO/IEC 18033-1:2005
Information technology — Security techniques — Encryption algorithms — Part 1: General
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 18033-1:2005/Amd 1:2011
Information technology — Security techniques — Encryption algorithms — Part 1: General — Amendment 1
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 18033-1:2015
Information technology — Security techniques — Encryption algorithms — Part 1: General
90.92 ISO/IEC JTC 1/SC 27
ISO/IEC 18033-2:2006
Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers
90.93 ISO/IEC JTC 1/SC 27
ISO/IEC 18033-2:2006/Amd 1:2017
Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers — Amendment 1: FACE
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC 18033-3:2005
Information technology — Security techniques — Encryption algorithms — Part 3: Block ciphers
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 18033-3:2005/Cor 1:2006
Information technology — Security techniques — Encryption algorithms — Part 3: Block ciphers — Technical Corrigendum 1
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 18033-3:2005/Cor 2:2007
Information technology — Security techniques — Encryption algorithms — Part 3: Block ciphers — Technical Corrigendum 2
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 18033-3:2005/Cor 3:2008
Information technology — Security techniques — Encryption algorithms — Part 3: Block ciphers — Technical Corrigendum 3: .
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 18033-3:2010
Information technology — Security techniques — Encryption algorithms — Part 3: Block ciphers
90.92 ISO/IEC JTC 1/SC 27
ISO/IEC 18033-3:2010/DAmd 1
Information technology — Security techniques — Encryption algorithms — Part 3: Block ciphers — Amendment 1: Kuznyechik
40.98 ISO/IEC JTC 1/SC 27
ISO/IEC 18033-3:2010/DAmd 2
Information technology — Security techniques — Encryption algorithms — Part 3: Block ciphers — Amendment 2: SM4
40.98 ISO/IEC JTC 1/SC 27
ISO/IEC 18033-4:2005
Information technology — Security techniques — Encryption algorithms — Part 4: Stream ciphers
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 18033-4:2005/Amd 1:2009
Information technology — Security techniques — Encryption algorithms — Part 4: Stream ciphers — Amendment 1: Rabbit and Decim
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 18033-4:2011
Information technology — Security techniques — Encryption algorithms — Part 4: Stream ciphers
90.93 ISO/IEC JTC 1/SC 27
ISO/IEC 18033-4:2011/PDAM 1
Information technology — Security techniques — Encryption algorithms — Part 4: Stream ciphers — Amendment 1: IT Security techniques — Encryption algorithms — Part 4: Stream ciphers — Amendment 1: ZUC
30.60 ISO/IEC JTC 1/SC 27
ISO/IEC 18033-5:2015
Information technology — Security techniques — Encryption algorithms — Part 5: Identity-based ciphers
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC 18033-5:2015/AWI Amd 1
Information technology — Security techniques — Encryption algorithms — Part 5: Identity-based ciphers — Amendment 1
20.00 ISO/IEC JTC 1/SC 27
ISO/IEC 18033-6:2019
IT Security techniques — Encryption algorithms — Part 6: Homomorphic encryption
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC CD 18033-1
Information technology — Security techniques — Encryption algorithms — Part 1: General
30.20 ISO/IEC JTC 1/SC 27
ISO/IEC FDIS 18033-3
IT Security techniques — Encryption algorithms — Part 3: Block ciphers
50.00 ISO/IEC JTC 1/SC 27
ISO/IEC 18043:2006
Information technology — Security techniques — Selection, deployment and operations of intrusion detection systems
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC TR 18044:2004
Information technology — Security techniques — Information security incident management
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 18045:2005
Information technology — Security techniques — Methodology for IT security evaluation
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 18045:2008
Information technology — Security techniques — Methodology for IT security evaluation
90.92 ISO/IEC JTC 1/SC 27
ISO/IEC CD 18045
Information technology — Security techniques — Methodology for IT security evaluation
30.20 ISO/IEC JTC 1/SC 27
ISO/IEC 18180:2013
Information technology — Specification for the Extensible Configuration Checklist Description Format (XCCDF) Version 1.2
90.60 ISO/IEC JTC 1
ISO/IEC 18367:2016
Information technology — Security techniques — Cryptographic algorithms and security mechanisms conformance testing
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC 18370-1:2016
Information technology — Security techniques — Blind digital signatures — Part 1: General
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC 18370-2:2016
Information technology — Security techniques — Blind digital signatures — Part 2: Discrete logarithm based mechanisms
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC TS 19249:2017
Information technology — Security techniques — Catalogue of architectural and design principles for secure products, systems and applications
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC 19592-1:2016
Information technology — Security techniques — Secret sharing — Part 1: General
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC 19592-2:2017
Information technology — Security techniques — Secret sharing — Part 2: Fundamental mechanisms
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC TS 19608:2018
Guidance for developing security and privacy functional requirements based on ISO/IEC 15408
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC 19772:2009
Information technology — Security techniques — Authenticated encryption
90.93 ISO/IEC JTC 1/SC 27
ISO/IEC 19772:2009/Cor 1:2014
Information technology — Security techniques — Authenticated encryption — Technical Corrigendum 1
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC 19772:2009/DAmd 1
Information technology — Security techniques — Authenticated encryption — Amendment 1
40.20 ISO/IEC JTC 1/SC 27
ISO/IEC 19790:2006
Information technology — Security techniques — Security requirements for cryptographic modules
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 19790:2006/Cor 1:2008
Information technology — Security techniques — Security requirements for cryptographic modules — Technical Corrigendum 1
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 19790:2012
Information technology — Security techniques — Security requirements for cryptographic modules
90.93 ISO/IEC JTC 1/SC 27
ISO/IEC 19790:2012/Cor 1:2015
Information technology — Security techniques — Security requirements for cryptographic modules — Technical Corrigendum 1
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC TR 19791:2006
Information technology — Security techniques — Security assessment of operational systems
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC TR 19791:2010
Information technology — Security techniques — Security assessment of operational systems
90.93 ISO/IEC JTC 1/SC 27
ISO/IEC 19792:2009
Information technology — Security techniques — Security evaluation of biometrics
90.93 ISO/IEC JTC 1/SC 27
ISO/IEC 19823-10:2017
Information technology — Conformance test methods for security service crypto suites — Part 10: Crypto suite AES-128
90.92 ISO/IEC JTC 1/SC 31
ISO/IEC 19823-13:2018
Information technology — Conformance test methods for security service crypto suites — Part 13: Cryptographic Suite Grain-128A
60.60 ISO/IEC JTC 1/SC 31
ISO/IEC 19823-19:2018
Information technology — Conformance test methods for security service crypto suites — Part 19: Crypto suite RAMON
60.60 ISO/IEC JTC 1/SC 31
ISO/IEC 19823-21:2019
Information technology — Conformance test methods for security service crypto suites — Part 21: Crypto suite SIMON
60.60 ISO/IEC JTC 1/SC 31
ISO/IEC 19823-22:2019
Information technology — Conformance test methods for security service crypto suites — Part 22: Crypto suite SPECK
60.60 ISO/IEC JTC 1/SC 31
ISO/IEC CD 19823-16
Information technology — Conformance test methods for security service crypto suites — Part 16: Part 16:Crypto suite ECDSA-ECDH security services for air interface communications
30.99 ISO/IEC JTC 1/SC 31
ISO/IEC DIS 19823-10
Information technology — Conformance test methods for security service crypto suites — Part 10: Crypto suite AES-128
40.60 ISO/IEC JTC 1/SC 31
ISO/IEC 19896-1:2018
IT security techniques — Competence requirements for information security testers and evaluators — Part 1: Introduction, concepts and general requirements
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC 19896-2:2018
IT security techniques — Competence requirements for information security testers and evaluators — Part 2: Knowledge, skills and effectiveness requirements for ISO/IEC 19790 testers
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC 19896-3:2018
IT security techniques — Competence requirements for information security testers and evaluators — Part 3: Knowledge, skills and effectiveness requirements for ISO/IEC 15408 evaluators
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC CD 19989-2
Information technology — Security techniques — Criteria and methodology for security evaluation of biometric systems — Part 2: Biometric recognition performance
30.20 ISO/IEC JTC 1/SC 27
ISO/IEC CD 19989-3.2
Information technology — Security techniques — Criteria and methodology for security evaluation of biometric systems — Part 3: Presentation attack detection
30.60 ISO/IEC JTC 1/SC 27
ISO/IEC DIS 19989-1
Information technology — Security techniques — Criteria and methodology for security evaluation of biometric systems — Part 1: Framework
40.20 ISO/IEC JTC 1/SC 27
ISO/IEC TR 20004:2012
Information technology — Security techniques — Refining software vulnerability analysis under ISO/IEC 15408 and ISO/IEC 18045
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC TR 20004:2015
Information technology — Security techniques — Refining software vulnerability analysis under ISO/IEC 15408 and ISO/IEC 18045
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC 20008-1:2013
Information technology — Security techniques — Anonymous digital signatures — Part 1: General
90.93 ISO/IEC JTC 1/SC 27
ISO/IEC 20008-2:2013
Information technology — Security techniques — Anonymous digital signatures — Part 2: Mechanisms using a group public key
90.93 ISO/IEC JTC 1/SC 27
ISO/IEC WD 20008-2
Information technology — Security techniques — Anonymous digital signatures — Part 2: Mechanisms using a group public key
20.98 ISO/IEC JTC 1/SC 27
ISO/IEC 20009-1:2013
Information technology — Security techniques — Anonymous entity authentication — Part 1: General
90.93 ISO/IEC JTC 1/SC 27
ISO/IEC 20009-2:2013
Information technology — Security techniques — Anonymous entity authentication — Part 2: Mechanisms based on signatures using a group public key
90.93 ISO/IEC JTC 1/SC 27
ISO/IEC 20009-4:2017
Information technology — Security techniques — Anonymous entity authentication — Part 4: Mechanisms based on weak secrets
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC CD 20009-3
Information technology — Security techniques — Anonymous entity authentication — Part 3: Mechanisms based on blind signatures concepts
30.98 ISO/IEC JTC 1/SC 27
ISO/IEC CD 20009-3
Information security — Anonymous entity authentication — Part 3: Mechanisms based on blind signatures
30.60 ISO/IEC JTC 1/SC 27
ISO/IEC DIS 20085-2
IT Security techniques — Test tool requirements and test tool calibration methods for use in testing non-invasive attack mitigation techniques in cryptographic modules — Part 2: Test calibration methods and apparatus
40.60 ISO/IEC JTC 1/SC 27
ISO/IEC PRF 20085-1
IT Security techniques — Test tool requirements and test tool calibration methods for use in testing non-invasive attack mitigation techniques in cryptographic modules — Part 1: Test tools and techniques
50.20 ISO/IEC JTC 1/SC 27
ISO/IEC 20243-1:2018
Information technology — Open Trusted Technology ProviderTM Standard (O-TTPS) — Mitigating maliciously tainted and counterfeit products — Part 1: Requirements and recommendations
60.60 ISO/IEC JTC 1
ISO/IEC 20243-2:2018
Information technology — Open Trusted Technology ProviderTM Standard (O-TTPS) — Mitigating maliciously tainted and counterfeit products — Part 2: Assessment procedures for the O-TTPS and ISO/IEC 20243-1:2018
60.60 ISO/IEC JTC 1
ISO/IEC 20243:2015
Information Technology — Open Trusted Technology ProviderTM Standard (O-TTPS) — Mitigating maliciously tainted and counterfeit products
95.99 ISO/IEC JTC 1
ISO/IEC TS 20540:2018
Information technology — Security techniques — Testing cryptographic modules in their operational environment
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC 20543
Information technology — Security techniques — Test and analysis methods for random bit generators within ISO/IEC 19790 and ISO/IEC 15408
60.00 ISO/IEC JTC 1/SC 27
ISO/IEC 20648:2016
Information technology — TLS specification for storage systems
60.60 ISO/IEC JTC 1
ISO/IEC 20889:2018
Privacy enhancing data de-identification terminology and classification of techniques
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC DIS 20897-1
Security requirements and test methods for physically unclonable functions for generating non-stored security parameters — Part 1: Security requirements
40.20 ISO/IEC JTC 1/SC 27
ISO/TS 21177:2019
Intelligent transport systems — ITS station security services for secure session establishment and authentication between trusted devices
60.60 ISO/TC 204
ISO/IEC 21827:2002
Information technology — Systems Security Engineering — Capability Maturity Model (SSE-CMM®)
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 21827:2008
Information technology — Security techniques — Systems Security Engineering — Capability Maturity Model® (SSE-CMM®)
90.20 ISO/IEC JTC 1/SC 27
ISO/IEC 21878:2018
Information technology — Security techniques — Security guidelines for design and implementation of virtualized servers
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC 21964-1:2018
Information technology — Destruction of data carriers — Part 1: Principles and definitions
60.60 ISO/IEC JTC 1
ISO/IEC 21964-2:2018
Information technology — Destruction of data carriers — Part 2: Requirements for equipment for destruction of data carriers
60.60 ISO/IEC JTC 1
ISO/IEC 21964-3:2018
Information technology — Destruction of data carriers — Part 3: Process of destruction of data carriers
60.60 ISO/IEC JTC 1
ISO/DIS 22739
Blockchain and distributed ledger technologies — Terminology
40.00 ISO/TC 307
ISO/DTR 23244
Blockchain and distributed ledger technologies — Privacy and personally identifiable information protection considerations
30.60 ISO/TC 307
ISO/DTR 23245
Blockchain and distributed ledger technologies — Security risks, threats and vulnerabilities
30.60 ISO/TC 307
ISO/CD 23257
Blockchain and distributed ledger technologies — Reference architecture
30.20 ISO/TC 307
ISO/IEC CD 23264-1
Information Technology — Security Techniques — Redaction of Authentic Data — Part 1: General
30.20 ISO/IEC JTC 1/SC 27
ISO/TR 23455
Blockchain and distributed ledger technologies — Overview of and interactions between smart contracts in blockchain and distributed ledger technology systems
60.00 ISO/TC 307
ISO/IEC PDTR 24485
Information technology — Security techniques — Security properties, test and evaluation guidance for white box cryptography
30.60 ISO/IEC JTC 1/SC 27
ISO/IEC 24745:2011
Information technology — Security techniques — Biometric information protection
90.92 ISO/IEC JTC 1/SC 27
ISO/IEC WD 24745
Information technology — Security techniques — Biometric information protection
20.60 ISO/IEC JTC 1/SC 27
ISO/IEC 24759:2008
Information technology — Security techniques — Test requirements for cryptographic modules
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 24759:2014
Information technology — Security techniques — Test requirements for cryptographic modules
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 24759:2014/Cor 1:2015
Information technology — Security techniques — Test requirements for cryptographic modules — Technical Corrigendum 1
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 24759:2017
Information technology — Security techniques — Test requirements for cryptographic modules
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC 24760-1:2011
Information technology — Security techniques — A framework for identity management — Part 1: Terminology and concepts
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 24760-1:2011/FDAmd 1
Information technology — Security techniques — A framework for identity management — Part 1: Terminology and concepts — Amendment 1: Additional terminology and concepts
50.98 ISO/IEC JTC 1/SC 27
ISO/IEC 24760-1:2019
IT Security and Privacy — A framework for identity management — Part 1: Terminology and concepts
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC 24760-2:2015
Information technology — Security techniques — A framework for identity management — Part 2: Reference architecture and requirements
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC 24760-3:2016
Information technology — Security techniques — A framework for identity management — Part 3: Practice
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC 24761
Information technology — Security techniques — Authentication context for biometrics
60.00 ISO/IEC JTC 1/SC 27
ISO/IEC 24761:2009
Information technology — Security techniques — Authentication context for biometrics
90.92 ISO/IEC JTC 1/SC 27
ISO/IEC 24761:2009/Cor 1:2013
Information technology — Security techniques — Authentication context for biometrics — Technical Corrigendum 1
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC 24762:2008
Information technology — Security techniques — Guidelines for information and communications technology disaster recovery services
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 27000:2009
Information technology — Security techniques — Information security management systems — Overview and vocabulary
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 27000:2012
Information technology — Security techniques — Information security management systems — Overview and vocabulary
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 27000:2014
Information technology — Security techniques — Information security management systems — Overview and vocabulary
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 27000:2016
Information technology — Security techniques — Information security management systems — Overview and vocabulary
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 27000:2018
Information technology — Security techniques — Information security management systems — Overview and vocabulary
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC 27001:2005
Information technology — Security techniques — Information security management systems — Requirements
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 27001:2013
Information technology — Security techniques — Information security management systems — Requirements
90.93 ISO/IEC JTC 1/SC 27
ISO/IEC 27001:2013/Cor 1:2014
Information technology — Security techniques — Information security management systems — Requirements — Technical Corrigendum 1
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC 27001:2013/Cor 2:2015
Information technology — Security techniques — Information security management systems — Requirements — Technical Corrigendum 2
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC 27002:2005
Information technology — Security techniques — Code of practice for information security management
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 27002:2013
Information technology — Security techniques — Code of practice for information security controls
90.92 ISO/IEC JTC 1/SC 27
ISO/IEC 27002:2013/Cor 1:2014
Information technology — Security techniques — Code of practice for information security controls — Technical Corrigendum 1
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC 27002:2013/Cor 2:2015
Information technology — Security techniques — Code of practice for information security controls — Technical Corrigendum 2
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC WD 27002
Information security controls
20.60 ISO/IEC JTC 1/SC 27
ISO/IEC 27003:2010
Information technology — Security techniques — Information security management system implementation guidance
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 27003:2017
Information technology — Security techniques — Information security management systems — Guidance
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC 27004:2009
Information technology — Security techniques — Information security management — Measurement
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 27004:2016
Information technology — Security techniques — Information security management — Monitoring, measurement, analysis and evaluation
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC 27005:2008
Information technology — Security techniques — Information security risk management
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 27005:2011
Information technology — Security techniques — Information security risk management
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 27005:2018
Information technology — Security techniques — Information security risk management
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC 27006:2007
Information technology — Security techniques — Requirements for bodies providing audit and certification of information security management systems
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 27006:2011
Information technology — Security techniques — Requirements for bodies providing audit and certification of information security management systems
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 27006:2015
Information technology — Security techniques — Requirements for bodies providing audit and certification of information security management systems
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC 27006:2015/DAmd 1
Information technology — Security techniques — Requirements for bodies providing audit and certification of information security management systems — Amendment 1
40.20 ISO/IEC JTC 1/SC 27
ISO/IEC 27007:2011
Information technology — Security techniques — Guidelines for information security management systems auditing
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 27007:2017
Information technology — Security techniques — Guidelines for information security management systems auditing
90.92 ISO/IEC JTC 1/SC 27
ISO/IEC DIS 27007
Information technology — Security techniques — Guidelines for information security management systems auditing
40.60 ISO/IEC JTC 1/SC 27
ISO/IEC TR 27008:2011
Information technology — Security techniques — Guidelines for auditors on information security controls
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC TS 27008:2019
Information technology — Security techniques — Guidelines for the assessment of information security controls
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC 27009:2016
Information technology — Security techniques — Sector-specific application of ISO/IEC 27001 — Requirements
90.92 ISO/IEC JTC 1/SC 27
ISO/IEC DIS 27009
Information technology — Security techniques — Sector-specific application of ISO/IEC 27001 — Requirements
40.60 ISO/IEC JTC 1/SC 27
ISO/IEC 27010:2012
Information technology — Security techniques — Information security management for inter-sector and inter-organizational communications
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 27010:2015
Information technology — Security techniques — Information security management for inter-sector and inter-organizational communications
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC 27011:2008
Information technology — Security techniques — Information security management guidelines for telecommunications organizations based on ISO/IEC 27002
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 27011:2016
Information technology — Security techniques — Code of practice for Information security controls based on ISO/IEC 27002 for telecommunications organizations
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC 27011:2016/Cor 1:2018
Information technology — Security techniques — Code of practice for Information security controls based on ISO/IEC 27002 for telecommunications organizations — Technical Corrigendum 1
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC 27013:2012
Information technology — Security techniques — Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 27013:2015
Information technology — Security techniques — Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1
90.92 ISO/IEC JTC 1/SC 27
ISO/IEC AWI 27013
Information technology — Security techniques — Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1
20.00 ISO/IEC JTC 1/SC 27
ISO/IEC 27014:2013
Information technology — Security techniques — Governance of information security
90.92 ISO/IEC JTC 1/SC 27
ISO/IEC CD 27014
Information technology — Security techniques — Governance of information security
30.60 ISO/IEC JTC 1/SC 27
ISO/IEC TR 27015:2012
Information technology — Security techniques — Information security management guidelines for financial services
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC TR 27016:2014
Information technology — Security techniques — Information security management — Organizational economics
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC 27017:2015
Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC 27018:2014
Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 27018:2019
Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC TR 27019:2013
Information technology — Security techniques — Information security management guidelines based on ISO/IEC 27002 for process control systems specific to the energy utility industry
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 27021:2017
Information technology — Security techniques — Competence requirements for information security management systems professionals
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC 27021:2017/PDAM 1
Information technology — Security techniques — Competence requirements for information security management systems professionals — Amendment 1
30.60 ISO/IEC JTC 1/SC 27
ISO/IEC TR 27023:2015
Information technology — Security techniques — Mapping the revised editions of ISO/IEC 27001 and ISO/IEC 27002
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC 27031:2011
Information technology — Security techniques — Guidelines for information and communication technology readiness for business continuity
90.92 ISO/IEC JTC 1/SC 27
ISO/IEC WD 27031
Information technology — Guidelines for ICT readiness for business continuity
20.20 ISO/IEC JTC 1/SC 27
ISO/IEC 27032:2012
Information technology — Security techniques — Guidelines for cybersecurity
90.93 ISO/IEC JTC 1/SC 27
ISO/IEC WD 27032
IT Security Techniques — Cybersecurity — Guidelines for Internet Security
20.60 ISO/IEC JTC 1/SC 27
ISO/IEC 27033-1:2009
Information technology — Security techniques — Network security — Part 1: Overview and concepts
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 27033-1:2015
Information technology — Security techniques — Network security — Part 1: Overview and concepts
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC 27033-2:2012
Information technology — Security techniques — Network security — Part 2: Guidelines for the design and implementation of network security
90.93 ISO/IEC JTC 1/SC 27
ISO/IEC 27033-3:2010
Information technology — Security techniques — Network security — Part 3: Reference networking scenarios — Threats, design techniques and control issues
90.93 ISO/IEC JTC 1/SC 27
ISO/IEC 27033-4:2014
Information technology — Security techniques — Network security — Part 4: Securing communications between networks using security gateways
90.60 ISO/IEC JTC 1/SC 27
ISO/IEC 27033-5:2013
Information technology — Security techniques — Network security — Part 5: Securing communications across networks using Virtual Private Networks (VPNs)
90.93 ISO/IEC JTC 1/SC 27
ISO/IEC 27033-6:2016
Information technology — Security techniques — Network security — Part 6: Securing wireless IP network access
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC 27034-1:2011
Information technology — Security techniques — Application security — Part 1: Overview and concepts
90.93 ISO/IEC JTC 1/SC 27
ISO/IEC 27034-1:2011/Cor 1:2014
Information technology — Security techniques — Application security — Part 1: Overview and concepts — Technical Corrigendum 1
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC 27034-2:2015
Information technology — Security techniques — Application security — Part 2: Organization normative framework
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC 27034-3:2018
Information technology — Application security — Part 3: Application security management process
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC 27034-5:2017
Information technology — Security techniques — Application security — Part 5: Protocols and application security controls data structure
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC 27034-6:2016
Information technology — Security techniques — Application security — Part 6: Case studies
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC 27034-7:2018
Information technology — Application security — Part 7: Assurance prediction framework
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC CD 27034-4
Information technology — Application security — Part 4: Validation and verification
30.60 ISO/IEC JTC 1/SC 27
ISO/IEC TS 27034-5-1:2018
Information technology — Application security — Part 5-1: Protocols and application security controls data structure, XML schemas
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC 27035-1:2016
Information technology — Security techniques — Information security incident management — Part 1: Principles of incident management
90.92 ISO/IEC JTC 1/SC 27
ISO/IEC 27035-2:2016
Information technology — Security techniques — Information security incident management — Part 2: Guidelines to plan and prepare for incident response
90.92 ISO/IEC JTC 1/SC 27
ISO/IEC 27035:2011
Information technology — Security techniques — Information security incident management
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC CD 27035-3
Information technology — Information security incident management — Part 3: Guidelines for ICT incident response operations
30.60 ISO/IEC JTC 1/SC 27
ISO/IEC WD 27035-1
Information technology — Security techniques — Information security incident management — Part 1: Principles of incident management
20.20 ISO/IEC JTC 1/SC 27
ISO/IEC WD 27035-2
Information technology — Security techniques — Information security incident management — Part 2: Guidelines to plan and prepare for incident management
20.20 ISO/IEC JTC 1/SC 27
ISO/IEC 27036-1:2014
Information technology — Security techniques — Information security for supplier relationships — Part 1: Overview and concepts
90.60 ISO/IEC JTC 1/SC 27
ISO/IEC 27036-2:2014
Information technology — Security techniques — Information security for supplier relationships — Part 2: Requirements
90.20 ISO/IEC JTC 1/SC 27
ISO/IEC 27036-3:2013
Information technology — Security techniques — Information security for supplier relationships — Part 3: Guidelines for information and communication technology supply chain security
90.93 ISO/IEC JTC 1/SC 27
ISO/IEC 27036-4:2016
Information technology — Security techniques — Information security for supplier relationships — Part 4: Guidelines for security of cloud services
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC 27037:2012
Information technology — Security techniques — Guidelines for identification, collection, acquisition and preservation of digital evidence
90.93 ISO/IEC JTC 1/SC 27
ISO/IEC 27038:2014
Information technology — Security techniques — Specification for digital redaction
90.60 ISO/IEC JTC 1/SC 27
ISO/IEC 27039:2015
Information technology — Security techniques — Selection, deployment and operations of intrusion detection and prevention systems (IDPS)
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC 27040:2015
Information technology — Security techniques — Storage security
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC 27041:2015
Information technology — Security techniques — Guidance on assuring suitability and adequacy of incident investigative method
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC 27042:2015
Information technology — Security techniques — Guidelines for the analysis and interpretation of digital evidence
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC 27043:2015
Information technology — Security techniques — Incident investigation principles and processes
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC 27050-1:2016
Information technology — Security techniques — Electronic discovery — Part 1: Overview and concepts
90.92 ISO/IEC JTC 1/SC 27
ISO/IEC 27050-2:2018
Information technology — Electronic discovery — Part 2: Guidance for governance and management of electronic discovery
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC 27050-3:2017
Information technology — Security techniques — Electronic discovery — Part 3: Code of practice for electronic discovery
90.92 ISO/IEC JTC 1/SC 27
ISO/IEC CD 27050-4
Information technology — Security techniques — Electronic discovery — Part 4: Technical readiness
30.60 ISO/IEC JTC 1/SC 27
ISO/IEC FDIS 27050-1
Information technology — Electronic discovery — Part 1: Overview and concepts
50.20 ISO/IEC JTC 1/SC 27
ISO/IEC FDIS 27050-3
Information technology — Electronic discovery — Part 3: Code of practice for electronic discovery
50.00 ISO/IEC JTC 1/SC 27
ISO/IEC 27102:2019
Information security management — Guidelines for cyber-insurance
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC TR 27103:2018
Information technology — Security techniques — Cybersecurity and ISO and IEC Standards
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC TR 27550:2019
Information technology — Security techniques — Privacy engineering for system life cycle processes
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC CD 27551
Information technology — Security techniques — Requirements for attribute-based unlinkable entity authentication
30.20 ISO/IEC JTC 1/SC 27
ISO/IEC PDTS 27570
Information Technology — Security Techniques — Privacy guidelines for Smart Cities
30.60 ISO/IEC JTC 1/SC 27
ISO/IEC 27701:2019
Security techniques — Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management — Requirements and guidelines
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC TS 29003:2018
Information technology — Security techniques — Identity proofing
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC 29100:2011
Information technology — Security techniques — Privacy framework
90.93 ISO/IEC JTC 1/SC 27
ISO/IEC 29100:2011/Amd 1:2018
Information technology — Security techniques — Privacy framework — Amendment 1: Clarifications
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC 29101:2013
Information technology — Security techniques — Privacy architecture framework
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 29101:2018
Information technology — Security techniques — Privacy architecture framework
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC 29115:2013
Information technology — Security techniques — Entity authentication assurance framework
90.92 ISO/IEC JTC 1/SC 27
ISO/IEC WD 29115
Information technology — Security techniques — Entity authentication assurance framework
20.60 ISO/IEC JTC 1/SC 27
ISO/IEC 29128:2011
Information technology — Security techniques — Verification of cryptographic protocols
90.92 ISO/IEC JTC 1/SC 27
ISO/IEC WD 29128
Information technology — Security techniques — Verification of cryptographic protocols
20.20 ISO/IEC JTC 1/SC 27
ISO/IEC 29134:2017
Information technology — Security techniques — Guidelines for privacy impact assessment
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC 29146:2016
Information technology — Security techniques — A framework for access management
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC 29147:2014
Information technology — Security techniques — Vulnerability disclosure
95.99 ISO/IEC JTC 1/SC 27
ISO/IEC 29147:2018
Information technology — Security techniques — Vulnerability disclosure
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC TR 29149:2012
Information technology — Security techniques — Best practices for the provision and use of time-stamping services
90.93 ISO/IEC JTC 1/SC 27
ISO/IEC 29150:2011
Information technology — Security techniques — Signcryption
90.93 ISO/IEC JTC 1/SC 27
ISO/IEC 29150:2011/Cor 1:2014
Information technology — Security techniques — Signcryption — Technical Corrigendum 1
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC 29151:2017
Information technology — Security techniques — Code of practice for personally identifiable information protection
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC DIS 29184
Information technology — Online privacy notices and consent
40.20 ISO/IEC JTC 1/SC 27
ISO/IEC 29190:2015
Information technology — Security techniques — Privacy capability assessment model
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC 29191:2012
Information technology — Security techniques — Requirements for partially anonymous, partially unlinkable authentication.
90.93 ISO/IEC JTC 1/SC 27
ISO/IEC 29192-1:2012
Information technology — Security techniques — Lightweight cryptography — Part 1: General
90.93 ISO/IEC JTC 1/SC 27
ISO/IEC 29192-2:2012
Information technology — Security techniques — Lightweight cryptography — Part 2: Block ciphers
90.92 ISO/IEC JTC 1/SC 27
ISO/IEC 29192-2:2012/DAmd 1
Information technology — Security techniques — Lightweight cryptography — Part 2: Block ciphers — Amendment 1: LEA
40.98 ISO/IEC JTC 1/SC 27
ISO/IEC 29192-2:2012/PDAM 1
Information technology — Security techniques — Lightweight cryptography — Part 2: Block ciphers — Amendment 1
30.98 ISO/IEC JTC 1/SC 27
ISO/IEC 29192-3:2012
Information technology — Security techniques — Lightweight cryptography — Part 3: Stream ciphers
90.93 ISO/IEC JTC 1/SC 27
ISO/IEC 29192-4:2013
Information technology — Security techniques — Lightweight cryptography — Part 4: Mechanisms using asymmetric techniques
90.93 ISO/IEC JTC 1/SC 27
ISO/IEC 29192-4:2013/Amd 1:2016
Information technology — Security techniques — Lightweight cryptography — Part 4: Mechanisms using asymmetric techniques — Amendment 1
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC 29192-5:2016
Information technology — Security techniques — Lightweight cryptography — Part 5: Hash-functions
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC 29192-6:2019
Information technology — Lightweight cryptography — Part 6: Message authentication codes (MACs)
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC 29192-7:2019
Information security — Lightweight cryptography — Part 7: Broadcast authentication protocols
60.60 ISO/IEC JTC 1/SC 27
ISO/IEC FDIS 29192-2
IT security techniques — Lightweight cryptography — Part 2: Block ciphers
50.20 ISO/IEC JTC 1/SC 27
ISO/IEC TS 30104:2015
Information Technology — Security Techniques — Physical Security Attacks, Mitigation Techniques and Security Requirements
90.93 ISO/IEC JTC 1/SC 27
ISO/IEC 30111
Information technology — Security techniques — Vulnerability handling processes
60.00 ISO/IEC JTC 1/SC 27
ISO/IEC 30111:2013
Information technology — Security techniques — Vulnerability handling processes
90.92 ISO/IEC JTC 1/SC 27

No matching records found