• Showing  1 to  10 of  628 

    Filters:

    Category

    • IT Security
    Product Logo   

    ISO/IEC 24761:2019

    Information technology — Security techniques — Authentication context for biometrics

    International Organization for Standardization

    Product Logo   

    ISO/IEC 20085-1 : 2019

    IT Security techniques — Test tool requirements and test tool calibration methods for use in testing non-invasive attack mitigation techniques in cryptographic modules — Part 1:Test tools and techniques

    International Organization for Standardization

    Product Logo   

    ISO/IEC 29192-6:2019

    Information technology — Lightweight cryptography — Part 6: Message authentication codes (MACs)

    International Organization for Standardization

    Product Logo   

    ISO/IEC 27102 : 2019

    Information security management — Guidelines for cyber-insurance

    International Organization for Standardization

    Product Logo   

    ISO/IEC 27701:2019

    Security techniques — Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management — Requirements and guidelines

    International Organization for Standardization

    Product Logo   

    ISO/IEC 29192-7:2019

    Information security — Lightweight cryptography — Part 7:Broadcast authentication protocols

    International Organization for Standardization

    Product Logo   

    ISO/IEC 9798-2 : 2019

    IT Security techniques — Entity authentication — Part 2:Mechanisms using authenticated encryption

    International Organization for Standardization

    Product Logo   

    ISO/IEC 18033-6 : 2019

    IT Security techniques — Encryption algorithms — Part 6:Homomorphic encryption

    International Organization for Standardization

    Product Logo   

    ISO/IEC 24760-1:2019

    IT Security and Privacy -- A framework for identity management -- Part 1: Terminology and concepts  

    International Organization for Standardization

    Product Logo   

    ISO/IEC 10118-3:2018

    IT Security techniques — Hash-functions — Part 3: Dedicated hash-functions

    International Organization for Standardization

    1 2 3 4 5 6 7 8 9 10 >