Filtrar :
Norma o proyecto bajo la responsabilidad directa de ISO/IEC JTC 1/SC 27 Secretaría Etapa ICS
Information security — Secure multiparty computation — Part 1: General
60.60
Information security — Secure multiparty computation — Part 2: Mechanisms based on secret sharing
60.60
Information security — Secure multiparty computation — Part 3: Part 3: Mechanisms based on garbled circuits
20.00
Information technology — Security and privacy — Data provenance
30.20
Cybersecurity – Security frameworks and use cases for cyber physical systems
20.00
Information security, cybersecurity and privacy protection — Security requirements and evaluation activities for connected vehicle devices
20.98
Information security, cybersecurity and privacy protection — Hardware monitoring technology for hardware security assessment
60.60
Cybersecurity — Multi-party coordinated vulnerability disclosure and handling
60.60
Cybersecurity — Security considerations throughout the product life cycle
60.60
Information technology — Security techniques — Check character systems
90.93
Information processing — Modes of operation for a 64-bit block cipher algorithm
95.99
Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Patch Management Extension for the ISO/IEC 15408 series and ISO/IEC 18045
60.60
Information technology — Security techniques — Digital signature schemes giving message recovery — Part 2: Mechanisms using a hash-function
95.99
Information technology — Security techniques — Digital signature schemes giving message recovery — Part 2: Integer factorization based mechanisms
95.99
Information technology — Security techniques — Digital signature schemes giving message recovery — Part 2: Integer factorization based mechanisms — Amendment 1
95.99
Information technology — Security techniques — Digital signature schemes giving message recovery — Part 2: Integer factorization based mechanisms
90.93
Information technology — Security techniques — Digital signature schemes giving message recovery — Part 3: Discrete logarithm based mechanisms
95.99
Information technology — Security techniques — Digital signature schemes giving message recovery — Part 3: Discrete logarithm based mechanisms
90.93
Information technology — Security techniques — Digital signature scheme giving message recovery
95.99
Information technology — Security techniques — Message Authentication Codes (MACs) — Part 1: Mechanisms using a block cipher
95.99
Information technology — Security techniques — Message Authentication Codes (MACs) — Part 1: Mechanisms using a block cipher
90.93
Information technology — Security techniques — Message Authentication Codes (MACs) — Part 1: Mechanisms using a block cipher — Amendment 1
60.60
Information technology — Security techniques — Message Authentication Codes (MACs) — Part 2: Mechanisms using a dedicated hash-function
95.99
Information technology — Security techniques — Message Authentication Codes (MACs) — Part 2: Mechanisms using a dedicated hash-function
95.99
Information security — Message authentication codes (MACs) — Part 2: Mechanisms using a dedicated hash-function
60.60
Information security — Message authentication codes (MACs) — Part 2: Mechanisms using a dedicated hash-function — Technical Corrigendum 1
60.60
Information technology — Security techniques — Message Authentication Codes (MACs) — Part 3: Mechanisms using a universal hash-function
90.93
Information technology — Security techniques — Message Authentication Codes (MACs) — Part 3: Mechanisms using a universal hash-function — Amendment 1
60.60
Data cryptographic techniques — Data integrity mechanism using a cryptographic check function employing a block cipher algorithm
95.99
Information technology — Security techniques — Data integrity mechanism using a cryptographic check function employing a block cipher algorithm
95.99
Information technology — Security techniques — Entity authentication mechanisms — Part 1: General model
95.99
Information technology — Security techniques — Entity authentication — Part 1: General
95.99
Information technology — Security techniques — Entity authentication — Part 1: General
90.93
Information technology — Security techniques — Entity authentication — Part 2: Mechanisms using symmetric encipherment algorithms
95.99
Information technology — Security techniques — Entity authentication — Part 2: Mechanisms using symmetric encipherment algorithms
95.99
Information technology — Security techniques — Entity authentication — Part 2: Mechanisms using symmetric encipherment algorithms — Technical Corrigendum 1
95.99
Information technology — Security techniques — Entity authentication — Part 2: Mechanisms using symmetric encipherment algorithms
95.99
Information technology — Security techniques — Entity authentication — Part 2: Mechanisms using symmetric encipherment algorithms — Technical Corrigendum 1
95.99
Information technology — Security techniques — Entity authentication — Part 2: Mechanisms using symmetric encipherment algorithms — Technical Corrigendum 2
95.99
Information technology — Security techniques — Entity authentication — Part 2: Mechanisms using symmetric encipherment algorithms — Technical Corrigendum 3
95.99
IT Security techniques — Entity authentication — Part 2: Mechanisms using authenticated encryption
90.93
Information technology — Security techniques — Entity authentication mechanisms — Part 3: Entity authentication using a public key algorithm
95.99
Information technology — Security techniques — Entity authentication — Part 3: Mechanisms using digital signature techniques
95.99
Information technology — Security techniques — Entity authentication — Part 3: Mechanisms using digital signature techniques — Amendment 1: .
95.99
Information technology — Security techniques — Entity authentication — Part 3: Mechanisms using digital signature techniques — Technical Corrigendum 1
95.99
Information technology — Security techniques — Entity authentication — Part 3: Mechanisms using digital signature techniques — Technical Corrigendum 2
95.99
IT Security techniques — Entity authentication — Part 3: Mechanisms using digital signature techniques
90.93
Information technology — Security techniques — Entity authentication — Part 4: Mechanisms using a cryptographic check function
95.99
Information technology — Security techniques — Entity authentication — Part 4: Mechanisms using a cryptographic check function
90.93
Information technology — Security techniques — Entity authentication — Part 4: Mechanisms using a cryptographic check function — Technical Corrigendum 1
60.60
Information technology — Security techniques — Entity authentication — Part 4: Mechanisms using a cryptographic check function — Technical Corrigendum 2
60.60
Information technology — Security techniques — Entity authentication — Part 5: Mechanisms using zero knowledge techniques
95.99
Information technology — Security techniques — Entity authentication — Part 5: Mechanisms using zero-knowledge techniques
95.99
Information technology — Security techniques — Entity authentication — Part 5: Mechanisms using zero-knowledge techniques
90.92
Information technology — Security techniques — Entity authentication — Part 5: Mechanisms using zero-knowledge techniques
20.00
Information technology — Security techniques — Entity authentication — Part 6: Mechanisms using manual data transfer
95.99
Information technology — Security techniques — Entity authentication — Part 6: Mechanisms using manual data transfer — Technical Corrigendum 1
95.99
Information technology — Security techniques — Entity authentication — Part 6: Mechanisms using manual data transfer
90.93
Data cryptographic techniques — Procedures for the registration of cryptographic algorithms
95.99
Information technology — Security techniques — Procedures for the registration of cryptographic algorithms
95.99
Information technology — Modes of operation for an n-bit block cipher algorithm
95.99
Information technology — Security techniques — Modes of operation for an n-bit block cipher
95.99
Information technology — Security techniques — Modes of operation for an n-bit block cipher
95.99
Information technology — Security techniques — Modes of operation for an n-bit block cipher — Technical Corrigendum 1
95.99
Information technology — Security techniques — Modes of operation for an n-bit block cipher
90.93
Information technology — Security techniques — Modes of operation for an n-bit block cipher — Amendment 1: CTR-ACPKM mode of operation
60.60
Information technology — Security techniques — Hash-functions — Part 1: General
95.99
Information technology — Security techniques — Hash-functions — Part 1: General
95.99
Information technology — Security techniques — Hash-functions — Part 1: General
90.93
Information technology — Security techniques — Hash-functions — Part 1: General — Amendment 1: Padding methods for sponge functions
60.60
Information technology — Security techniques — Hash-functions — Part 2: Hash-functions using an n-bit block cipher algorithm
95.99
Information technology — Security techniques — Hash-functions — Part 2: Hash-functions using an n-bit block cipher
95.99
Information technology — Security techniques — Hash-functions — Part 2: Hash-functions using an n-bit block cipher — Technical Corrigendum 1
95.99
Information technology — Security techniques — Hash-functions — Part 2: Hash-functions using an n-bit block cipher — Technical Corrigendum 2
95.99
Information technology — Security techniques — Hash-functions — Part 2: Hash-functions using an n-bit block cipher
90.93
Information technology — Security techniques — Hash-functions — Part 2: Hash-functions using an n-bit block cipher — Technical Corrigendum 1
60.60
Information technology — Security techniques — Hash-functions — Part 3: Dedicated hash-functions
95.99
Information technology — Security techniques — Hash-functions — Part 3: Dedicated hash-functions
95.99
Information technology — Security techniques — Hash-functions — Part 3: Dedicated hash-functions
95.99
Information technology — Security techniques — Hash-functions — Part 3: Dedicated hash-functions — Amendment 1: Dedicated Hash-Function 8 (SHA-224)
95.99
Information technology — Security techniques — Hash-functions — Part 3: Dedicated hash-functions — Technical Corrigendum 1
95.99
IT Security techniques — Hash-functions — Part 3: Dedicated hash-functions
90.93
Information technology — Security techniques — Hash-functions — Part 4: Hash-functions using modular arithmetic
90.93
Information technology — Security techniques — Hash-functions — Part 4: Hash-functions using modular arithmetic — Amendment 1: Object identifiers
60.60
Information technology — Security techniques — Hash-functions — Part 4: Hash-functions using modular arithmetic — Technical Corrigendum 1
60.60
Information technology — Data usage — Personal information factor (PIF) in data related to real persons
20.20
Information technology — Security techniques — Key management — Part 1: Framework
95.99
Information technology — Security techniques — Key management — Part 1: Framework
90.93
Information technology — Security techniques — Key management — Part 2: Mechanisms using symmetric techniques
95.99
Information technology — Security techniques — Key management — Part 2: Mechanisms using symmetric techniques — Technical Corrigendum 1
95.99
Information technology — Security techniques — Key management — Part 2: Mechanisms using symmetric techniques
95.99
Information technology — Security techniques — Key management — Part 2: Mechanisms using symmetric techniques — Technical Corrigendum 1
95.99
IT Security techniques — Key management — Part 2: Mechanisms using symmetric techniques
90.93
Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques
95.99
Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques
95.99
Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques — Technical Corrigendum 1
95.99
Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques
95.99
Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques — Amendment 1: Blinded Diffie-Hellman key agreement
95.99
Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques — Technical Corrigendum 1
95.99
Information security — Key management — Part 3: Mechanisms using asymmetric techniques
60.60
Information security — Key management — Part 3: Mechanisms using asymmetric techniques — Amendment 1: TFNS identity-based key agreement
50.00
Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets
95.99
Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets — Technical Corrigendum 1
95.99
Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets
90.92
Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets — Amendment 1: Unbalanced Password-Authenticated Key Agreement with Identity-Based Cryptosystems (UPAKA-IBC)
60.60
Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets — Amendment 2: Leakage-resilient password-authenticated key agreement with additional stored secrets
60.60
Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets
20.60
Information technology — Security techniques — Key management — Part 5: Group key management
95.99
Information security — Key management — Part 5: Group key management
60.60
Information technology — Security techniques — Key management — Part 6: Key derivation
90.93
Information security — Key management — Part 7: Cross-domain password-based authenticated key exchange
60.60
Information technology — Security techniques — Part 8: Password-based key derivation
20.00
Information technology — Security techniques — Management of information and communications technology security — Part 1: Concepts and models for information and communications technology security management
95.99
Information technology — Guidelines for the management of IT Security — Part 1: Concepts and models for IT Security
95.99
Information technology — Guidelines for the management of IT Security — Part 2: Managing and planning IT Security
95.99
Information technology — Guidelines for the management of IT Security — Part 3: Techniques for the management of IT Security
95.99
Information technology — Guidelines for the management of IT Security — Part 4: Selection of safeguards
95.99
Information technology — Guidelines for the management of IT Security — Part 5: Management guidance on network security
95.99
Information technology — Security techniques — Non-repudiation — Part 1: General
95.99
IT security techniques — Non-repudiation — Part 1: General
95.99
Information technology — Security techniques — Non-repudiation — Part 1: General
95.99
Information security — Non-repudiation — Part 1: General
60.60
Information technology — Security techniques — Non-repudiation — Part 2: Mechanisms using symmetric techniques
95.99
Information technology — Security techniques — Non-repudiation — Part 2: Mechanisms using symmetric techniques
90.93
Information technology — Security techniques — Non-repudiation — Part 2: Mechanisms using symmetric techniques — Technical Corrigendum 1
60.60
Information technology — Security techniques — Non-repudiation — Part 3: Mechanisms using asymmetric techniques
95.99
Information technology — Security techniques — Non-repudiation — Part 3: Mechanisms using asymmetric techniques
95.99
Information security — Non-repudiation — Part 3: Mechanisms using asymmetric techniques
60.60
Information technology — Security techniques — Guidelines for the use and management of Trusted Third Party services
90.93
Information technology — Security techniques — Digital signatures with appendix — Part 1: General
95.99
Information technology — Security techniques — Digital signatures with appendix — Part 1: General
90.20
Information technology — Security techniques — Digital signatures with appendix — Part 2: Identity-based mechanisms
95.99
Information technology — Security techniques — Digital signatures with appendix — Part 2: Integer factorization based mechanisms
90.20
Information technology — Security techniques — Digital signatures with appendix — Part 2: Integer factorization based mechanisms — Technical Corrigendum 1: To ISO/IEC 14888-2:2008
60.60
Information technology — Security techniques — Digital signatures with appendix — Part 3: Certificate-based mechanisms
95.99
Information technology — Security techniques — Digital signatures with appendix — Part 3: Certificate-based mechanisms — Technical Corrigendum 1
95.99
Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms
95.99
Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms — Amendment 1: Elliptic Curve Russian Digital Signature Algorithm, Schnorr Digital Signature Algorithm, Elliptic Curve Schnorr Digital Signature Algorithm, and Elliptic Curve Full Schnorr Digital Signature Algorithm
95.99
Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms — Technical Corrigendum 1
95.99
Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms — Amendment 2: Optimizing hash inputs
95.99
Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms — Technical Corrigendum 2
95.99
Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms
95.99
IT Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms
90.93
IT Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms — Amendment 1
20.00
Information security — Digital signatures with appendix — Part 4: Stateful hash-based mechanisms
60.60
Information technology - Security techniques - Protection Profile registration procedures
95.99
Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model
95.99
Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model
95.99
Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model
95.99
Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 1: Introduction and general model
90.92
Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 1: Introduction and general model
40.60
Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional requirements
95.99
Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional requirements
95.99
Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional components
95.99
Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 2: Security functional components
90.92
Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 2: Security functional components
40.60
Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance requirements
95.99
Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance requirements
95.99
Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance components
95.99
Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 3: Security assurance components
90.92
Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 3: Security assurance components
40.60
Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 4: Framework for the specification of evaluation methods and activities
90.92
Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 4: Framework for the specification of evaluation methods and activities
40.60
Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 5: Pre-defined packages of security requirements
90.92
Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 5: Pre-defined packages of security requirements
40.60
Information technology — Security techniques — A framework for IT security assurance — Part 1: Overview and framework
95.99
Information technology — Security techniques — Security assurance framework — Part 1: Introduction and concepts
90.93
Information technology — Security techniques — A framework for IT security assurance — Part 2: Assurance methods
95.99
Information technology — Security techniques — Security assurance framework — Part 2: Analysis
90.93
Information technology — Security techniques — A framework for IT security assurance — Part 3: Analysis of assurance methods
95.99
Information technology — Security techniques — Guide for the production of Protection Profiles and Security Targets
95.99
Information technology — Security techniques — Guide for the production of Protection Profiles and Security Targets
95.99
Information technology — Security techniques — Guidance for the production of protection profiles and security targets
60.60
Information technology — Security techniques — Security information objects for access control
90.60
Information technology — Security techniques — Specification of TTP services to support the application of digital signatures
90.60
Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 1: General
95.99
Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 1: General
95.99
Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 1: General — Technical Corrigendum 1
95.99
Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 1: General — Technical Corrigendum 2
95.99
Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 1: General
90.93
Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 2: Digital signatures
95.99
Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 3: Key establishment
95.99
Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 4: Digital signatures giving message recovery
95.99
Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 5: Elliptic curve generation
95.99
Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 5: Elliptic curve generation — Technical Corrigendum 1
95.99
Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 5: Elliptic curve generation
95.99
Information security — Cryptographic techniques based on elliptic curves — Part 5: Elliptic curve generation
60.60
Information technology — Security techniques — IT intrusion detection framework
95.99
Information technology — Code of practice for information security management
95.99
Information technology — Security techniques — Code of practice for information security management
95.99
Information technology — Security techniques — Code of practice for information security management — Technical Corrigendum 1
95.99
Information technology — Security techniques — Testing methods for the mitigation of non-invasive attack classes against cryptographic modules
95.99
Information technology — Security techniques — Testing methods for the mitigation of non-invasive attack classes against cryptographic modules
60.60
Information technology — Security techniques — Telebiometric authentication framework using biometric hardware security module
90.93
Information technology — Security techniques — Time-stamping services — Part 1: Framework
95.99
Information technology — Security techniques — Time-stamping services — Part 1: Framework
90.93
Information technology — Security techniques — Time-stamping services — Part 1: Framework — Amendment 1
40.60
Information technology — Security techniques — Time-stamping services — Part 2: Mechanisms producing independent tokens
95.99
Information technology — Security techniques — Time-stamping services — Part 2: Mechanisms producing independent tokens
95.99
Information security — Time-stamping services — Part 2: Mechanisms producing independent tokens
60.60
Information security — Time-stamping services — Part 2: Mechanisms producing independent tokens — Technical Corrigendum 1
60.60
Information technology — Security techniques — Time-stamping services — Part 3: Mechanisms producing linked tokens
95.99
Information technology — Security techniques — Time-stamping services — Part 3: Mechanisms producing linked tokens
90.93
Information technology — Security techniques — Time-stamping services — Part 4: Traceability of time sources
90.93
Information technology — Security techniques — IT network security — Part 1: Network security management
95.99
Information technology — Security techniques — IT network security — Part 2: Network security architecture
95.99
Information technology — Security techniques — IT network security — Part 3: Securing communications between networks using security gateways
95.99
Information technology — Security techniques — IT network security — Part 4: Securing remote access
95.99
Information technology — Security techniques — IT network security — Part 5: Securing communications across networks using virtual private networks
95.99
Information technology — Security techniques — Random bit generation
95.99
Information technology — Security techniques — Random bit generation — Technical Corrigendum 1
95.99
Information technology — Security techniques — Random bit generation
90.92
Information technology — Security techniques — Random bit generation — Amendment 1: Deterministic random bit generation
60.60
Information technology — Security techniques — Random bit generation — Technical Corrigendum 1
60.60
Information technology — Security techniques — Random bit generation
50.00
Information technology — Security techniques — Prime number generation
95.99
Information security — Prime number generation
60.60
Information technology — Security techniques — Encryption algorithms — Part 1: General
95.99
Information technology — Security techniques — Encryption algorithms — Part 1: General — Amendment 1
95.99
Information technology — Security techniques — Encryption algorithms — Part 1: General
95.99
Information security — Encryption algorithms — Part 1: General
60.60
Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers
90.93
Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers — Amendment 1: FACE
60.60
Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers — Amendment 2
30.60
Information technology — Security techniques — Encryption algorithms — Part 3: Block ciphers
95.99
Information technology — Security techniques — Encryption algorithms — Part 3: Block ciphers — Technical Corrigendum 1
95.99
Information technology — Security techniques — Encryption algorithms — Part 3: Block ciphers — Technical Corrigendum 2
95.99
Information technology — Security techniques — Encryption algorithms — Part 3: Block ciphers — Technical Corrigendum 3: .
95.99
Information technology — Security techniques — Encryption algorithms — Part 3: Block ciphers
90.93
Information technology — Security techniques — Encryption algorithms — Part 3: Block ciphers — Amendment 1: SM4
60.60
Information technology — Security techniques — Encryption algorithms — Part 4: Stream ciphers
95.99
Information technology — Security techniques — Encryption algorithms — Part 4: Stream ciphers — Amendment 1: Rabbit and Decim
95.99
Information technology — Security techniques — Encryption algorithms — Part 4: Stream ciphers
90.93
Information technology — Security techniques — Encryption algorithms — Part 4: Stream ciphers — Amendment 1: ZUC
60.60
Information technology — Security techniques — Encryption algorithms — Part 5: Identity-based ciphers
90.93
Information technology — Security techniques — Encryption algorithms — Part 5: Identity-based ciphers — Amendment 1: SM9 mechanism
60.60
IT Security techniques — Encryption algorithms — Part 6: Homomorphic encryption
90.93
Information security — Encryption algorithms — Part 7: Tweakable block ciphers
60.60
Information security — Encryption algorithms — Part 7: Tweakable block ciphers — Amendment 1
10.99
Information technology — Security techniques — Selection, deployment and operations of intrusion detection systems
95.99
Information technology — Security techniques — Information security incident management
95.99
Information technology — Security techniques — Methodology for IT security evaluation
95.99
Information technology — Security techniques — Methodology for IT security evaluation
95.99
Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Methodology for IT security evaluation
90.92
Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Methodology for IT security evaluation
40.60
Information technology — Security techniques — Cryptographic algorithms and security mechanisms conformance testing
90.92
Information technology — Security techniques — Blind digital signatures — Part 1: General
90.93
Information technology — Security techniques — Blind digital signatures — Part 2: Discrete logarithm based mechanisms
90.93
Cloud computing — Service level agreement (SLA) framework — Part 4: Components of security and of protection of PII
90.92
Information technology — Security techniques — Catalogue of architectural and design principles for secure products, systems and applications
90.93
Information technology — Security techniques — Secret sharing — Part 1: General
90.93
Information technology — Security techniques — Secret sharing — Part 2: Fundamental mechanisms
90.93
Guidance for developing security and privacy functional requirements based on ISO/IEC 15408
90.93
Information technology — Security techniques — Authenticated encryption
95.99
Information technology — Security techniques — Authenticated encryption — Technical Corrigendum 1
95.99
Information security — Authenticated encryption
60.60
Information technology — Security techniques — Security requirements for cryptographic modules
95.99
Information technology — Security techniques — Security requirements for cryptographic modules — Technical Corrigendum 1
95.99
Information technology — Security techniques — Security requirements for cryptographic modules
90.92
Information technology — Security techniques — Security requirements for cryptographic modules — Technical Corrigendum 1
95.99
Information security, cybersecurity and privacy protection — Security requirements for cryptographic modules
50.20
Information technology — Security techniques — Security assessment of operational systems
95.99
Information technology — Security techniques — Security assessment of operational systems
90.93
Information technology — Security techniques — Security evaluation of biometrics
90.92
Information security, cybersecurity and privacy protection — General principles of security evaluation of biometric systems
40.60
IT security techniques — Competence requirements for information security testers and evaluators — Part 1: Introduction, concepts and general requirements
90.92
Information security, cybersecurity and privacy protection — Requirements for the competence of IT security conformance assessment body personnel — Part 1: Overview and concepts
40.20
IT security techniques — Competence requirements for information security testers and evaluators — Part 2: Knowledge, skills and effectiveness requirements for ISO/IEC 19790 testers
90.92
Information security, cybersecurity and privacy protection — Requirements for the competence of IT security conformance assessment body personnel — Part 2: Knowledge and skills requirements for ISO/IEC 19790 testers and validators
40.20
IT security techniques — Competence requirements for information security testers and evaluators — Part 3: Knowledge, skills and effectiveness requirements for ISO/IEC 15408 evaluators
90.92
Information security, cybersecurity and privacy protection — Requirements for the competence of IT security conformance assessment body personnel — Part 3: Knowledge and skills requirements for ISO/IEC 15408 evaluators and certifiers
40.00
Information security — Criteria and methodology for security evaluation of biometric systems — Part 1: Framework
90.92
Information security — Criteria and methodology for security evaluation of biometric systems — Part 1: Framework
20.60
Information security — Criteria and methodology for security evaluation of biometric systems — Part 2: Biometric recognition performance
60.60
Information security — Criteria and methodology for security evaluation of biometric systems — Part 3: Presentation attack detection
60.60
Information technology — Security techniques — Refining software vulnerability analysis under ISO/IEC 15408 and ISO/IEC 18045
95.99
Information technology — Security techniques — Refining software vulnerability analysis under ISO/IEC 15408 and ISO/IEC 18045
60.60
Information technology — Security techniques — Anonymous digital signatures — Part 1: General
90.93
Information technology — Security techniques — Anonymous digital signatures — Part 2: Mechanisms using a group public key
90.93
Information technology — Security techniques — Anonymous digital signatures — Part 2: Mechanisms using a group public key — Amendment 1
60.60
Information technology — Security techniques — Anonymous digital signatures — Part 2: Mechanisms using a group public key — Amendment 2
60.60
Information security — Anonymous digital signatures — Part 3: Mechanisms using multiple public keys
60.60
Information technology — Security techniques — Anonymous entity authentication — Part 1: General
90.93
Information technology — Security techniques — Anonymous entity authentication — Part 2: Mechanisms based on signatures using a group public key
90.93
Information security — Anonymous entity authentication — Part 3: Mechanisms based on blind signatures
60.60
Information technology — Security techniques — Anonymous entity authentication — Part 4: Mechanisms based on weak secrets
90.93
Information technology — Security techniques — Anonymous entity authentication — Part 4: Mechanisms based on weak secrets — Amendment 1
30.20
IT Security techniques — Test tool requirements and test tool calibration methods for use in testing non-invasive attack mitigation techniques in cryptographic modules — Part 1: Test tools and techniques
90.20
IT Security techniques — Test tool requirements and test tool calibration methods for use in testing non-invasive attack mitigation techniques in cryptographic modules — Part 2: Test calibration methods and apparatus
60.60
Information technology — Security techniques — Testing cryptographic modules in their operational environment
90.92
Information security, cybersecurity and privacy protection — Testing cryptographic modules in their field
30.99
Information technology — Security techniques — Test and analysis methods for random bit generators within ISO/IEC 19790 and ISO/IEC 15408
90.20
Information technology — Big data reference architecture — Part 4: Security and privacy
60.60
Privacy enhancing data de-identification terminology and classification of techniques
90.93
Information security, cybersecurity and privacy protection — Physically unclonable functions — Part 1: Security requirements
60.60
Information security, cybersecurity and privacy protection — Physically unclonable functions — Part 2: Test and evaluation methods
60.60
Information technology — Systems Security Engineering — Capability Maturity Model (SSE-CMM®)
95.99
Information technology — Security techniques — Systems Security Engineering — Capability Maturity Model® (SSE-CMM®)
90.93
Information technology — Security techniques — Security guidelines for design and implementation of virtualized servers
90.60
Information security, cybersecurity and privacy protection — New concepts and changes in ISO/IEC 15408:2022 and ISO/IEC 18045:2022
60.60
Information security — Redaction of authentic data — Part 1: General
60.60
Information security — Redaction of authentic data — Part 2: Redactable signature schemes based on asymmetric mechanisms
60.60
Information security, cybersecurity and privacy protection — Requirements for the competence of IT security testing and evaluation laboratories — Part 1: Evaluation for ISO/IEC 15408
90.20
Information security, cybersecurity and privacy protection — Requirements for the competence of IT security testing and evaluation laboratories — Part 2: Testing for ISO/IEC 19790
90.20
Information security — Security requirements, test and evaluation methods for quantum key distribution — Part 1: Requirements
60.60
Information security — Security requirements, test and evaluation methods for quantum key distribution — Part 2: Evaluation and testing methods
60.60
Cybersecurity — Security reference model for industrial internet platform (SRM- IIP)
60.60
Information security, cybersecurity and privacy protection — Ontology building blocks for security and risk assessment
60.60
Information security, cybersecurity and privacy protection — Security techniques — Security properties and best practices for test and evaluation of white box cryptography
60.60
Information technology — Security techniques — Biometric information protection
95.99
Information security, cybersecurity and privacy protection — Biometric information protection
60.60
Information technology — Security techniques — Test requirements for cryptographic modules
95.99
Information technology — Security techniques — Test requirements for cryptographic modules
95.99
Information technology — Security techniques — Test requirements for cryptographic modules — Technical Corrigendum 1
95.99
Information technology — Security techniques — Test requirements for cryptographic modules
90.92
Information security, cybersecurity and privacy protection — Test requirements for cryptographic modules
50.20
Information technology — Security techniques — A framework for identity management — Part 1: Terminology and concepts
95.99
IT Security and Privacy — A framework for identity management — Part 1: Terminology and concepts
90.92
IT Security and Privacy — A framework for identity management — Part 1: Terminology and concepts — Amendment 1
60.60
IT Security and Privacy — A framework for identity management — Part 1: Terminology and concepts
50.00
Information technology — Security techniques — A framework for identity management — Part 2: Reference architecture and requirements
90.92
IT Security and Privacy — A framework for identity management — Part 2: Reference architecture and requirements
50.00
Information technology — Security techniques — A framework for identity management — Part 3: Practice
90.92
Information technology — Security techniques — A framework for identity management — Part 3: Practice — Amendment 1: Identity Information Lifecycle processes
60.60
IT Security and Privacy — A framework for identity management — Part 3: Practice
50.00
IT Security and Privacy — A framework for identity management — Part 4: Authenticators, Credentials and Authentication
20.60
Information technology — Security techniques — Authentication context for biometrics
95.99
Information technology — Security techniques — Authentication context for biometrics — Technical Corrigendum 1
95.99
Information technology — Security techniques — Authentication context for biometrics
90.20
Information technology — Security techniques — Guidelines for information and communications technology disaster recovery services
95.99
Cybersecurity — Confidential computing — Part 1: Overview and concepts
20.00
Information Security — Oblivious Transfer
20.00
Information technology — Security techniques — Information security management systems — Overview and vocabulary
95.99
Information technology — Security techniques — Information security management systems — Overview and vocabulary
95.99
Information technology — Security techniques — Information security management systems — Overview and vocabulary
95.99
Information technology — Security techniques — Information security management systems — Overview and vocabulary
95.99
Information technology — Security techniques — Information security management systems — Overview and vocabulary
90.92
Information technology — Security techniques — Information security management systems — Overview and vocabulary
30.60
Information technology — Security techniques — Information security management systems — Requirements
95.99
Information technology — Security techniques — Information security management systems — Requirements
95.99
Information technology — Security techniques — Information security management systems — Requirements — Technical Corrigendum 1
95.99
Information technology — Security techniques — Information security management systems — Requirements — Technical Corrigendum 2
95.99
Information security, cybersecurity and privacy protection — Information security management systems — Requirements
60.60
Information security, cybersecurity and privacy protection — Information security management systems — Requirements — Amendment 1: Climate action changes
60.60
Information technology — Security techniques — Code of practice for information security management
95.99
Information technology — Security techniques — Code of practice for information security controls
95.99
Information technology — Security techniques — Code of practice for information security controls — Technical Corrigendum 1
95.99
Information technology — Security techniques — Code of practice for information security controls — Technical Corrigendum 2
95.99
Information security, cybersecurity and privacy protection — Information security controls
60.60
Information technology — Security techniques — Information security management system implementation guidance
95.99
Information technology — Security techniques — Information security management systems — Guidance
90.92
Information technology — Security techniques — Information security management systems — Guidance
20.00
Information technology — Security techniques — Information security management — Measurement
95.99
Information technology — Security techniques — Information security management — Monitoring, measurement, analysis and evaluation
90.60
Information technology — Security techniques — Information security management — Monitoring, measurement, analysis and evaluation
20.20
Information technology — Security techniques — Information security risk management
95.99
Information technology — Security techniques — Information security risk management
95.99
Information technology — Security techniques — Information security risk management
95.99
Information security, cybersecurity and privacy protection — Guidance on managing information security risks
60.60
Information security, cybersecurity and privacy protection — Requirements for bodies providing audit and certification of information security management systems — Part 1: General
60.60
Requirements for bodies providing audit and certification of information security management systems — Part 2: Privacy information management systems
90.92
Information technology — Security techniques — Requirements for bodies providing audit and certification of information security management systems
95.99
Information technology — Security techniques — Requirements for bodies providing audit and certification of information security management systems
95.99
Information technology — Security techniques — Requirements for bodies providing audit and certification of information security management systems
95.99
Information technology — Security techniques — Requirements for bodies providing audit and certification of information security management systems — Amendment 1
95.99
Information technology — Security techniques — Guidelines for information security management systems auditing
95.99
Information technology — Security techniques — Guidelines for information security management systems auditing
95.99
Information security, cybersecurity and privacy protection — Guidelines for information security management systems auditing
60.60
Information technology — Security techniques — Guidelines for auditors on information security controls
95.99
Information technology — Security techniques — Guidelines for the assessment of information security controls
90.92
Information technology — Security techniques — Guidelines for the assessment of information security controls
30.20
Information technology — Security techniques — Sector-specific application of ISO/IEC 27001 — Requirements
95.99
Information security, cybersecurity and privacy protection — Sector-specific application of ISO/IEC 27001 — Requirements
95.99
Information technology — Security techniques — Information security management for inter-sector and inter-organizational communications
95.99
Information technology — Security techniques — Information security management for inter-sector and inter-organizational communications
90.93
Information technology — Security techniques — Information security management guidelines for telecommunications organizations based on ISO/IEC 27002
95.99
Information technology — Security techniques — Code of practice for Information security controls based on ISO/IEC 27002 for telecommunications organizations
95.99
Information technology — Security techniques — Code of practice for Information security controls based on ISO/IEC 27002 for telecommunications organizations — Technical Corrigendum 1
95.99
Information security, cybersecurity and privacy protection — Information security controls based on ISO/IEC 27002 for telecommunications organizations
60.60
Information technology — Security techniques — Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1
95.99
Information technology — Security techniques — Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1
95.99
Information security, cybersecurity and privacy protection — Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1
60.60
Information security, cybersecurity and privacy protection — Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1 — Amendment 1
60.00
Information technology — Security techniques — Governance of information security
95.99
Information security, cybersecurity and privacy protection — Governance of information security
60.60
Information technology — Security techniques — Information security management guidelines for financial services
95.99
Information technology — Security techniques — Information security management — Organizational economics
60.60
Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services
90.93
Information security, cybersecurity and privacy protection — Information security controls based on ISO/IEC 27002 for cloud services
40.00
Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors
95.99
Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors
90.92
Information security, cybersecurity and privacy protection – Guidelines for protection of personally identifiable information (PII) in public clouds acting as PII processors
40.60
Information technology — Security techniques — Information security controls for the energy utility industry
95.99
Information technology — Security techniques — Information security management guidelines based on ISO/IEC 27002 for process control systems specific to the energy utility industry
95.99
Information security, cybersecurity and privacy protection — Information security controls for the energy utility industry
60.60
Information technology — Security techniques — Competence requirements for information security management systems professionals
90.60
Information technology — Security techniques — Competence requirements for information security management systems professionals — Amendment 1: Addition of ISO/IEC 27001:2013 clauses or subclauses to competence requirements
60.60
Information technology — Guidance on information security management system processes
60.60
Information technology — Security techniques — Mapping the revised editions of ISO/IEC 27001 and ISO/IEC 27002
95.99
Information security, cybersecurity and privacy protection — Government and regulatory use of ISO/IEC 27001, ISO/IEC 27002 and other information security standards
20.00
Information security, cyber security and privacy protection — Guidance on ISO/IEC 27002 attributes
40.00
Information technology — Security techniques — Guidelines for information and communication technology readiness for business continuity
90.92
Cybersecurity — Information and communication technology readiness for business continuity
60.00
Information technology — Security techniques — Guidelines for cybersecurity
95.99
Cybersecurity — Guidelines for Internet security
60.60
Information technology — Security techniques — Network security — Part 1: Overview and concepts
95.99
Information technology — Security techniques — Network security — Part 1: Overview and concepts
90.93
Information technology — Security techniques — Network security — Part 2: Guidelines for the design and implementation of network security
90.60
Information technology — Security techniques — Network security — Part 3: Reference networking scenarios — Threats, design techniques and control issues
90.60
Information technology — Security techniques — Network security — Part 4: Securing communications between networks using security gateways
90.20
Information technology — Security techniques — Network security — Part 5: Securing communications across networks using Virtual Private Networks (VPNs)
90.60
Information technology — Security techniques — Network security — Part 6: Securing wireless IP network access
90.93
Information technology – Network security — Part 7: Guidelines for network virtualization security
60.60
Information technology — Security techniques — Application security — Part 1: Overview and concepts
90.93
Information technology — Security techniques — Application security — Part 1: Overview and concepts — Technical Corrigendum 1
60.60
Information technology — Security techniques — Application security — Part 2: Organization normative framework
90.93
Information technology — Application security — Part 3: Application security management process
90.93
Information technology — Security techniques — Application security — Part 5: Protocols and application security controls data structure
90.93
Information technology — Security techniques — Application security — Part 6: Case studies
90.93
Information technology — Application security — Part 7: Assurance prediction framework
90.93
Information technology — Application security — Part 5-1: Protocols and application security controls data structure, XML schemas
90.20
Information technology — Security techniques — Information security incident management — Part 1: Principles of incident management
95.99
Information technology — Information security incident management — Part 1: Principles and process
60.60
Information technology — Security techniques — Information security incident management — Part 2: Guidelines to plan and prepare for incident response
95.99
Information technology — Information security incident management — Part 2: Guidelines to plan and prepare for incident response
60.60
Information technology — Information security incident management — Part 3: Guidelines for ICT incident response operations
60.60
Information technology — Information security incident management — Part 4: Coordination
60.60
Information technology — Security techniques — Information security incident management
95.99
Information technology — Security techniques — Information security for supplier relationships — Part 1: Overview and concepts
95.99
Cybersecurity — Supplier relationships — Part 1: Overview and concepts
60.60
Information technology — Security techniques — Information security for supplier relationships — Part 2: Requirements
95.99
Cybersecurity — Supplier relationships — Part 2: Requirements
60.60
Information technology — Security techniques — Information security for supplier relationships — Part 3: Guidelines for information and communication technology supply chain security
95.99
Cybersecurity — Supplier relationships — Part 3: Guidelines for hardware, software, and services supply chain security
60.60
Information technology — Security techniques — Information security for supplier relationships — Part 4: Guidelines for security of cloud services
90.93
Information technology — Security techniques — Guidelines for identification, collection, acquisition and preservation of digital evidence
90.60
Information technology — Security techniques — Specification for digital redaction
90.20
Information technology — Security techniques — Selection, deployment and operations of intrusion detection and prevention systems (IDPS)
90.93
Information technology — Security techniques — Storage security
95.99
Information technology — Security techniques — Storage security
60.60
Information technology — Security techniques — Guidance on assuring suitability and adequacy of incident investigative method
90.93
Information technology — Security techniques — Guidelines for the analysis and interpretation of digital evidence
90.93
Information technology — Security techniques — Incident investigation principles and processes
90.93
Information technology — Big data security and privacy — Guidelines for managing big data risks
20.00
Information technology — Security techniques — Electronic discovery — Part 1: Overview and concepts
95.99
Information technology — Electronic discovery — Part 1: Overview and concepts
90.20
Information technology — Electronic discovery — Part 2: Guidance for governance and management of electronic discovery
90.60
Information technology — Security techniques — Electronic discovery — Part 3: Code of practice for electronic discovery
95.99
Information technology — Electronic discovery — Part 3: Code of practice for electronic discovery
60.60
Information technology — Electronic discovery — Part 4: Technical readiness
60.60
Information technology — Security techniques — Requirements for establishing virtualized roots of trust
60.60
Cybersecurity — Security recommendations for establishing trusted connections between devices and services
60.60
Cybersecurity — Artificial Intelligence — Guidance for addressing security threats and failures in artificial intelligence systems
30.60
Cybersecurity and Privacy — Artificial Intelligence — Privacy protection
20.60
Information technology — Public key infrastructure — Practices and policy framework
60.60
Information technology — Cybersecurity — Overview and concepts
90.93
Information security management — Guidelines for cyber-insurance
90.60
Information technology — Security techniques — Cybersecurity and ISO and IEC Standards
90.92
Information technology — Security techniques — Cybersecurity and ISO and IEC Standards
30.99
Cybersecurity education and training
20.00
Information technology, cybersecurity and privacy protection — Cybersecurity framework development guidelines
90.60
Cybersecurity evaluation of complex systems — Introduction and framework overview
20.20
Cybersecurity — IoT security and privacy — Guidelines
60.60
Cybersecurity — IoT security and privacy — Device baseline requirements
60.60
Cybersecurity – IoT security and privacy – Guidelines for IoT-domotics
60.60
Cybersecurity — IoT security and privacy — Cybersecurity labelling framework for consumer IoT
40.00
Information technology — Security techniques — Privacy engineering for system life cycle processes
60.60
Information security, cybersecurity and privacy protection — Requirements for attribute-based unlinkable entity authentication
60.60
Information security, cybersecurity and privacy protection — Security and privacy requirements for authentication using biometrics on mobile devices — Part 1: Local modes
60.60
Information security, cybersecurity and privacy protection — Security and privacy requirements for authentication using biometrics on mobile devices — Part 2: Remote modes
40.60
Information security, cybersecurity and privacy protection — Application of ISO 31000 for assessment of identity-related risk
60.60
Information security, cybersecurity and privacy protection — Guidelines on personally identifiable information deletion
60.60
Information security, cybersecurity and privacy protection — User-centric privacy preferences management framework
60.60
Information security, cybersecurity and privacy protection — Application of ISO 31000:2018 for organizational privacy risk management
60.60
Information security, cybersecurity and privacy protection – Privacy enhancing data de-identification framework
60.60
Privacy technologies — Consent record information structure
60.60
Information security, cybersecurity and privacy protection — Privacy operationalisation model and method for engineering (POMME)
60.60
Information technology — Security techniques — Privacy guidelines for fintech services
60.00
Security and privacy in artificial intelligence use cases — Best practices
60.60
Privacy protection - Guidance on the use of models for privacy engineering
20.20
Information security, cybersecurity and privacy protection — Guidelines on privacy preservation based on zero knowledge proofs
40.00
Information technology, cybersecurity and privacy protection — Age assurance systems — Part 1: Framework
40.00
Information technology, cybersecurity and privacy protection — Age assurance systems — Part 3: Benchmarks for benchmarking analysis
20.60
Privacy protection — Privacy guidelines for smart cities
90.93
Security techniques — Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management — Requirements and guidelines
90.92
Information security, cybersecurity and privacy protection — Privacy information management systems — Requirements and guidance
40.60
Requirements for bodies providing audit and certification of privacy information management systems
50.00
Information security — Fully homomorphic encryption — Part 1: General
30.20
Fully homomorphic encryption — Part 2: Mechanisms for exact arithmetic on modular integers
20.00
Fully homomorphic encryption — Part 3: Mechanisms for arithmetic on approximate numbers
20.00
Information Security - Fully homomorphic encryption — Part 4: Mechanisms for arithmetic based on look-up table evaluation
30.20
Information technology — Security techniques — Identity proofing
90.20
Information technology — Security techniques — Privacy framework
95.99
Information technology — Security techniques — Privacy framework — Amendment 1: Clarifications
95.99
Information technology — Security techniques — Privacy framework
60.60
Information technology — Security techniques — Privacy architecture framework
95.99
Information technology — Security techniques — Privacy architecture framework
90.93
Information technology — Security techniques — Entity authentication assurance framework
90.92
Information security, cybersecurity and privacy protection – Entity authentication assurance framework
20.20
Information security, cybersecurity and privacy protection — Verification of cryptographic protocols — Part 1: Framework
60.60
Information security, cybersecurity and privacy protection — Verification of Cryptographic Protocols — Part 2: Evaluation Methods and Activities for Cryptographic Protocols
20.60
Information security — Verification of cryptographic protocols — Part 3: Part 3: Evaluation Methods and Activities for Protocol Implementation Verification
20.60
Information technology — Security techniques — Verification of cryptographic protocols
95.99
Information technology — Security techniques — Guidelines for privacy impact assessment
95.99
Information technology — Security techniques — Guidelines for privacy impact assessment
60.60
Information technology — Security techniques — A framework for access management
95.99
Information technology — Security techniques — A framework for access management — Amendment 1
95.99
Information technology — Security techniques — A framework for access management
60.60
Information technology — Security techniques — Vulnerability disclosure
95.99
Information technology — Security techniques — Vulnerability disclosure
90.93
Information technology — Security techniques — Best practices for the provision and use of time-stamping services
90.93
Information technology — Security techniques — Signcryption
90.93
Information technology — Security techniques — Signcryption — Technical Corrigendum 1
60.60
Information technology — Security techniques — Code of practice for personally identifiable information protection
90.92
Information security, cybersecurity and privacy protection – Controls and guidance for personally identifiable information protection
40.00
Information technology — Online privacy notices and consent
60.60
Information technology — Security techniques — Privacy capability assessment model
90.93
Information technology — Security techniques — Requirements for partially anonymous, partially unlinkable authentication.
90.93
Information technology — Security techniques — Lightweight cryptography — Part 1: General
90.60
Information technology — Security techniques — Lightweight cryptography — Part 1: General — Amendment 1
40.60
Information technology — Security techniques — Lightweight cryptography — Part 2: Block ciphers
95.99
Information security — Lightweight cryptography — Part 2: Block ciphers
90.20
Information technology — Security techniques — Lightweight cryptography — Part 3: Stream ciphers
90.93
Information technology — Security techniques — Lightweight cryptography — Part 4: Mechanisms using asymmetric techniques
90.93
Information technology — Security techniques — Lightweight cryptography — Part 4: Mechanisms using asymmetric techniques — Amendment 1
60.60
Information technology — Security techniques — Lightweight cryptography — Part 4: Mechanisms using asymmetric techniques — Amendment 2
20.20
Information technology — Security techniques — Lightweight cryptography — Part 5: Hash-functions
90.93
Information technology — Lightweight cryptography — Part 6: Message authentication codes (MACs)
90.60
Information security — Lightweight cryptography — Part 7: Broadcast authentication protocols
90.60
Information security — Lightweight cryptography — Part 8: Authenticated encryption
60.60
Information security — Lightweight cryptography — Part 8: Authenticated encryption — Amendment 1
20.20
Information Technology — Security Techniques — Physical Security Attacks, Mitigation Techniques and Security Requirements
90.93
Information technology — Security techniques — Vulnerability handling processes
95.99
Information technology — Security techniques — Vulnerability handling processes
90.20

No se ha encontrado ningún registro que coincida. Pruebe a cambiar los ajustes de filtro.