Search
Drupal Primary tabs
You may search by ICS code, document number, title, or keyword.
Search results
Showing items 51 through 60 of 522.
-
ISO/IEC 9798-6:2005/COR1:2009
Corrigendum 1 - Information technology -- Security techniques -- Entity authentication -- Part 6: Mechanisms using manual data transfer -iec (not verified)
-
ISO/IEC 10118-2:2010/COR1:2011
Corrigendum 1 - Information technology -- Security techniques -- Hash-functions -- Part 2: Hash-functions using an n-bit block cipher -iec (not verified)
-
ISO/IEC 10118-3:2004/COR1:2011
Corrigendum 1 - Information technology -- Security techniques -- Hash-functions -- Part 3: Dedicated hash-functions -iec (not verified)
-
ISO/IEC 10118-4:1998/COR1:2014
Corrigendum 1 - Information technology -- Security techniques -- Hash-functions -- Part 4: Hash-functions using modular arithmeticiec (not verified)
-
ISO/IEC 27001:2013/COR1:2014
Corrigendum 1 - Information technology -- Security techniques -- Information security management systems -- Requirementsiec (not verified)
-
ISO/IEC 11770-2:2008/COR1:2009
Corrigendum 1 - Information technology -- Security techniques -- Key management -- Part 2: Mechanisms using symmetric techniques -iec (not verified)
-
ISO/IEC 11770-3:2008/COR1:2009
Corrigendum 1 - Information technology -- Security techniques -- Key management -- Part 3: Mechanisms using asymmetric techniques -iec (not verified)
-
ISO/IEC 11770-4:2006/COR1:2009
Corrigendum 1 - Information technology -- Security techniques -- Key management -- Part 4: Mechanisms based on weak secrets -iec (not verified)
-
ISO/IEC 10116:2006/COR1:2008
Corrigendum 1 - Information technology -- Security techniques -- Modes of operation for an n-bit block cipher -iec (not verified)
-
ISO/IEC 13888-2:2010/COR1:2012
Corrigendum 1 - Information technology -- Security techniques -- Non-repudiation -- Part 2: Mechanisms using symmetric techniques -iec (not verified)