Search
Drupal Primary tabs
You may search by ICS code, document number, title, or keyword.
Search results
Showing items 31 through 40 of 525.
-
ISO/IEC 20008-2:2013/AMD2:2023
Amendment 2 - Information technology - Security techniques - Anonymous digital signatures - Part 2: Mechanisms using a group public keyiec (not verified)
-
ISO/IEC 11770-4:2017/AMD2:2021
Amendment 2 - Information technology - Security techniques - Key management - Part 4: Mechanisms based on weak secrets - Leakage-resilient password-authenticated key agreement with additional stored secretsiec (not verified)
-
ISO/IEC 14888-3:2006/AMD2:2012
Amendment 2 - Information technology -- Security techniques -- Digital signatures with appendix -- Part 3: Discrete logarithm based mechanisms - Optimizing hash inputsiec (not verified)
-
ISO/IEC 27011:2016/COR1:2018
Corrigendum 1 - Information technology - Security techniques - Code of practice for information security controls based on ISO/IEC 27002 for telecommunications organizationsiec (not verified)
-
ISO/IEC 14888-2:2008/COR1:2015
Corrigendum 1 - Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanismsiec (not verified)
-
ISO/IEC 11770-3:2015/COR1:2016
Corrigendum 1 - Information technology - Security techniques - Key management - Part 3: Mechanisms using asymmetric techniquesiec (not verified)
-
ISO/IEC 18031:2005/COR1:2009
Corrigendum 1 - Information technology - Security techniques - Random bit generationiec (not verified)
-
ISO/IEC 19790:2012/COR1:2015
Corrigendum 1 - Information technology - Security techniques - Security requirements for cryptographic modulesiec (not verified)
-
ISO/IEC 24759:2014/COR1:2015
Corrigendum 1 - Information technology - Security techniques - Test requirements for cryptographic modulesiec (not verified)
-
ISO/IEC 27034-1:2011/COR1:2014
Corrigendum 1 - Information technology -- Security techniques -- Application security -- Part 1: Overview and conceptsiec (not verified)