Search
Drupal Primary tabs
You may search by ICS code, document number, title, or keyword.
Search results
Showing items 1 through 10 of 438.
-
ISO/IEC 19989-1:2020
Information security - Criteria and methodology for security evaluation of biometric systems - Part 1: Frameworkiec (not verified)
-
ISO/IEC 13888-1:2020
Information security - Non-repudiation - Part 1: Generaliec (not verified)
-
ISO/IEC 18033-4:2011/AMD1:2020
Amendment 1 - Information technology - Security techniques - Encryption algorithms - Part 4: Stream ciphers - ZUCiec (not verified)
-
ISO/IEC 9797-3:2011/AMD1:2020
Amendment 1 - Information technology - Security techniques - Message Authentication Codes (MACs) - Part 3: Mechanisms using a universal hash-functioniec (not verified)
-
ISO/IEC 27050-1:2019
Information technology - Electronic discovery - Part 1: Overview and conceptsiec (not verified)
-
ISO/IEC 20085-1:2019
IT Security techniques - Test tool requirements and test tool calibration methods for use in testing non-invasive attack mitigation techniques in cryptographic modules - Part 1: Test tools and techniquesiec (not verified)
-
ISO/IEC 11770-4:2017/AMD1:2019
Amendment 1 - Information technology - Security techniques - Key management - Part 4: Mechanisms based on weak secrets - Unbalanced Password-Authenticated Key Agreement with Identity-Based Cryptosystems (UPAKA-IBC)iec (not verified)
-
ISO/IEC 27011:2016/COR1:2018
Corrigendum 1 - Information technology - Security techniques - Code of practice for information security controls based on ISO/IEC 27002 for telecommunications organizationsiec (not verified)
-
ISO/IEC 21964-1:2018
Information technology - Destruction of data carriers - Part 1: Principles and definitionsiec (not verified)
-
ISO/IEC TS 27034-5-1:2018
Information technology - Application security - Part 5-1: Protocols and application security controls data structure, XML schemasiec (not verified)