Know Your Standard Standards under Mandatory Certification Group Wise Classification Ministry/Department Wise Classification
Total Standards : 114
Revised Standards
New Standards
S.No | IS Number | IS Title | Amendment | Reaffirmation Year | Document | Action |
---|---|---|---|---|---|---|
1 |
IS/ISO/IEC/TR 27039 : 2015 Reviewed In : 2024 ISO/IEC 27039:2015 |
Information Technology - Security Techniques - Selection, Deployment and Operations of Intrusion Detection Systems ( IDPS ) | 0 | Jun, 2024 | Buy | |
2 |
IS/ISO/IEC 11770-1 : 2010 Reviewed In : 2023 ISO/IEC 11770-1:2010 |
Information technology - Security techniques - Key management: Part 1 framework | 0 | Mar, 2023 | Buy | |
3 |
IS/ISO/IEC 11770-2 : 2018 Reviewed In : 2023 ISO/IEC 11770-2:2018 (First Revision) |
IT Security Techniques — Key Management Part 2 Mechanisms Using Symmetric Techniques ( First Revision ) | 0 | Sep, 2023 | Buy | |
4 |
IS/ISO/IEC 11770-3 : 2021 ISO 4628-10 : 2024 ISO 4628-10 : 2024 (Second Revision) |
Information security Key management Part 3: Mechanisms using asymmetric techniques Second Revision | 0 | ---- | Buy | |
5 |
IS/ISO/IEC 11770-4 : 2017 Reviewed In : 2022 ISO/IEC 11770-4:2017 (First Revision) |
Information technology - Security techniques - Key management: Part 4 mechanisms based on weak: Secrets (First Revision) | 2 | May, 2022 | Buy | |
6 |
IS/ISO/IEC 11770-5 : 2020 ISO 21561-2:2016 ISO 21561-2:2016 (First Revision) |
INFORMATION SECURITY KEY MANAGEMENT PART 5: GROUP KEY MANAGEMENT (First Revision) | 0 | ---- | Buy | |
7 |
IS/ISO/IEC 11770-6 : 2016 Reviewed In : 2023 ISO/IEC 11770-6:2016 |
Information Technology - Security Techniques - Key Management Part 6 Key Derivation | 0 | Jan, 2023 | Buy | |
8 |
IS/ISO/IEC 11770-7 : 2021 12123 12123 |
Information security Key management Part 7: Cross-domain password-based authenticated key exchange | 0 | ---- | Buy | |
9 |
IS/ISO/IEC 14888-1 : 2008 Reviewed In : 2022 ISO/IEC 14888-1:2008 |
Information technology - Security techniques - Digital signatures with appendix: Part 1 general | 0 | Jun, 2022 | Buy | |
10 |
IS/ISO/IEC 14888-2 : 2008 Reviewed In : 2022 ISO/IEC 14888-2:2008 |
Information technology - Security techniques - digital signatures with appendix: Part 2 integer factorization based mechanisms | 1 | May, 2022 | Buy | |
11 |
IS/ISO/IEC 14888-3 : 2018 Reviewed In : 2023 ISO/IEC 14888-3:2018 (First Revision) |
IT Security Techniques — Digital Signatures with Appendix Part 3 Discrete Logarithm Based Mechanisms ( First Revision ) | 0 | Jan, 2023 | Buy | |
12 |
IS 14990 (Part 1) : 2024 (Third Revision) |
Information Security Cybersecurity and Privacy Protection Evaluation Criteria for IT Security Part 1: Introduction and General Model Third Revision | 0 | ---- | Buy | |
13 |
IS 14990 (Part 2) : 2024 (Third Revision) |
Information security cybersecurity and privacy protection Evaluation criteria for IT security Part 2: Security functional components Third Revision | 0 | ---- | Buy | |
14 |
IS 14990 (Part 3) : 2024 (Third Revision) |
Information Security Cybersecurity and Privacy Protection Evaluation Criteria for IT Security Part 3: Security Assurance Components Third Revision | 0 | ---- | Buy | |
15 |
IS 14990 (Part 4) : 2024 |
Information Security Cybersecurity and Privacy Protection Evaluation Criteria for IT Security Part 4: Framework for the Specification of Evaluation Methods and Activities | 0 | ---- | Buy | |
16 |
IS 14990 (Part 5) : 2024 |
Information Security Cybersecurity and Privacy Protection Evaluation Criteria for IT Security Part 5: Pre-defined Packages of Security Requirements | 0 | ---- | Buy | |
17 |
IS 15116 : 2018 ISO/IEC 10116:2017 Reviewed In : 2021 ISO/IEC 10116:2017 (Second Revision) |
Information technology - Security techniques - Modes of operation for an n - Bit block cipher (Second Revision) | 1 | Sep, 2021 | Buy | |
18 |
IS/ISO/IEC/TR 15446 : 2017 Reviewed In : 2022 ISO/IEC TR 15446:2017 |
Information technology - Security techniques - Guidance for the production of protection profiles and Security targets | 0 | May, 2022 | Buy | |
19 |
IS 15580 : 2012 ISO/IEC 21827:2008 Reviewed In : 2021 ISO/IEC 21827:2008 (First Revision) |
Information technology - Security techniques - Systems: Security engineering - Capability maturity model® (SSE - CMM®) (First Revision) | 0 | Oct, 2021 | Buy | |
20 |
IS 15671 : 2024 (Second Revision) |
Information Security Cybersecurity and Privacy Protection Evaluation Criteria for IT Security Methodology for IT Security Evaluation Second Revision | 0 | ---- | Buy | |
21 |
IS/ISO/IEC 15946-1 : 2016 Reviewed In : 2024 ISO/IEC 15946 -1 : 2016 |
Information Technology - Security Techniques - Cryptographic Techniques Based on Elliptic Curves Part 1 General | 0 | Jun, 2024 | Buy | |
22 |
IS 17428 (Part 1) : 2020 Reviewed In : 2023 |
Data Privacy Assurance Part 1 Engineering and Management Requirements | 0 | Dec, 2023 | Download | |
23 |
IS 17428 (Part 2) : 2020 Reviewed In : 2023 |
Data Privacy Assurance Part 2 Engineering and Management Guidelines | 0 | Dec, 2023 | Download | |
24 |
IS 17737 (Part 1) : 2021 ISO 14243-3:2014 ISO 14243-3:2014 |
Mobile Device Security Part 1 Overview | 0 | ---- | Buy | |
25 |
IS 17737 (Part 2) : 2021 ISO 16827 : 2012 ISO 16827 : 2012 |
Mobile Device Security Part 2 Security Requirements | 0 | ---- | Buy | |
26 |
IS 17737 (Part 3) : 2021 IEC 60834-1: 1999 |
Mobile Device Security Part 3 Security levels | 0 | ---- | Buy | |
27 |
IS 17737 (Part 4) : 2021 ISO/TS 11059 : 2009 ISO/TS 11059 : 2009 |
Mobile Device Security Part 4 Assessment and Evaluation | 0 | ---- | Buy | |
28 |
IS/ISO/IEC 18014-1 : 2008 Reviewed In : 2024 ISO/IEC 18014-1 : 2008 |
Information Technology- Security Techniques- Time Stamping Services Part 1 Framework | 0 | Feb, 2024 | Buy | |
29 |
IS/ISO/IEC 18014-2 : 2021 ISO 18692-5:2024 ISO 18692-5:2024 (First Revision) |
Information security Time- stamping services Part 2: Mechanisms producing independent tokens | 0 | ---- | Buy | |
30 |
IS/ISO/IEC 18014-3 : 2009 Reviewed In : 2024 ISO/IEC 18014-3:2009 |
Information technology - Security techniques - Time - Stamping services: Part 3 mechanisms producing linked tokens | 0 | Feb, 2024 | Buy | |
31 |
IS/ISO/IEC 18014-4 : 2015 Reviewed In : 2022 ISO/IEC 18014-4 : 2015 |
Information Technology - Security Techniques - Time-Stamping Services Part 4 Traceability of Time Sources | 0 | May, 2022 | Buy | |
32 |
IS/ISO/IEC 18031 : 2011 Reviewed In : 2024 ISO/IEC 18031:2011 |
Information technology - Security techniques - Random bit generation | 1 | Jul, 2024 | Buy | |
33 |
IS/ISO/IEC 18033-1 : 2021 ISO/TS 19837:2018 (First Revision) |
Information security Encryption algorithms Part 1: General First Revision | 0 | ---- | Buy | |
34 |
IS/ISO/IEC 18033-2 : 2006 Reviewed In : 2024 18033-2:2006 |
Information Technology - Security Techniques - Encryption Algorithms Part 2 Asymmetric Ciphers | 1 | Jun, 2024 | Buy | |
35 |
IS/ISO/IEC 18033-3 : 2010 Reviewed In : 2024 ISO/IEC 18033-3 : 2010 |
Information Technology-Security Techniques - Encryption Algorithms Part 3 Block Ciphers | 1 | Jun, 2024 | Buy | |
36 |
IS/ISO/IEC 18033-4 : 2011 Reviewed In : 2022 ISO/IEC 18033-4:2011 |
Information technology - Security techniques - encryption algorithms: Part 4 stream ciphers | 1 | May, 2022 | Buy | |
37 |
IS/ISO/IEC 18033-5 : 2015 Reviewed In : 2022 ISO/IEC 18033-5:2015 |
Information technology - Security techniques - Encryption algorithms: Part 5 identity - Based ciphers | 1 | May, 2022 | Buy | |
38 |
IS/ISO/IEC 19790 : 2012 ISO/TS 30423: 2021 |
INFORMATION TECHNOLOGY SECURITY TECHNIQUES SECURITY REQUIREMENTS FOR CRYPTOGRAPHIC MODULES | 0 | ---- | Buy | |
39 |
IS/ISO/IEC 19792 : 2009 IEC 60068-1:2013 |
Information Technology Security techniques Security evaluation of biometrics | 0 | ---- | Buy | |
40 |
IS/ISO/IEC 19896-1 : 2018 Reviewed In : 2023 ISO/IEC 19896-1:2018 |
IT Security Techniques - Competence Requirements for Information Security Testers and Evaluators Part 1 Introduction, Concepts and General Requirements | 0 | Jan, 2023 | Buy | |
41 |
IS/ISO/IEC 19896-2 : 2018 Reviewed In : 2023 ISO/IEC 19896-2:2018 |
IT Security Techniques - Competence Requirements for Information Security Testers and Evaluators Part 2 Knowledge, Skills and Effectiveness Requirements for ISO / IEC 19790 Testers | 0 | Jan, 2023 | Buy | |
42 |
IS/ISO/IEC 19896-3 : 2018 Reviewed In : 2023 ISO/IEC 19896-3:2018 |
IT Security Techniques - Competence Requirements for Information Security Testers and Evaluators Part 3 Knowledge, Skills and Effectiveness Requirements for ISO/IEC 15408 Evaluators | 0 | Jan, 2023 | Buy | |
43 |
IS/ISO/IEC/TS 20540 : 2018 Reviewed In : 2023 ISO/IEC TS 20540:2018 |
Information Technology - Security Techniques - Testing Cryptographic Modules in their Operational Environment | 0 | Jan, 2023 | Buy | |
44 |
IS/ISO/IEC 20543 : 2019 |
Information technology Security techniques Test and analysis methods for random bit generators within ISOIEC 19790 and ISOIEC 15408 | 0 | ---- | Buy | |
45 |
IS/ISO/IEC 20547-4 : 2020 |
INFORMATION TECHNOLOGY BIG DATA REFERENCE ARCHITECTURE PART 4: SECURITY AND PRIVACY | 0 | ---- | Buy | |
46 |
IS/ISO/IEC 24745 : 2022 ISO 23527:2022 ISO 23527:2022 |
Information security cybersecurity and privacy protection Biometric information protection | 0 | ---- | Buy | |
47 |
IS/ISO/IEC 24759 : 2017 |
Information technology Security techniques Test requirements for cryptographic modules | 0 | ---- | Buy | |
48 |
IS/ISO/IEC 24761 : 2019 ISO 37000 |
Information technology Security techniques Authentication context for biometrics | 0 | ---- | Buy | |
49 |
IS/ISO/IEC 27000 : 2018 Reviewed In : 2022 ISO/IEC 27000:2018 (First Revision) |
Information technology - Security techniques - information: Security management systems - Overview and vocabulary (First Revision) | 0 | May, 2022 | Buy | |
50 |
IS/ISO/IEC 27001 : 2013 Reviewed In : 2022 ISO/IEC 27001:2013 (First Revision) |
Information Technologies - Security Techniques - information Security Managemet Systems - Requirements (First Revision) | 1 | Dec, 2022 | Buy | |
51 |
IS/ISO/IEC 27001 : 2022 ISO/IEC 27001:2022 (Second Revision) |
Information Security, Cybersecurity and Privacy Protection - Information Security Management Systems - Requirements (Second Revision) | 1 | ---- | Buy | |
52 |
IS/ISO/IEC 27002 : 2022 (Second Revision) |
Information security cybersecurity and privacy protection Information security controls | 0 | ---- | Buy | |
53 |
IS/ISO/IEC 27003 : 2017 Reviewed In : 2021 ISO/IEC 27003:2017 (First Revision) |
Information technology - Security techniques - Information: Security management systems - Guidance (First Revision) | 0 | Sep, 2021 | Buy | |
54 |
IS/ISO/IEC 27004 : 2016 Reviewed In : 2022 ISO/IEC 27004:2016 (First Revision) |
Information technology - Security techniques - Information: Security management - Monitoring, measurement, analysis and evaluation (First Revision) | 0 | May, 2022 | Buy | |
55 |
IS/ISO/IEC 27005 : 2022 (Third Revision) |
Information security cybersecurity and privacy protection Guidance on managing information security risks | 0 | ---- | Buy | |
56 |
IS/ISO/IEC 27006 : 2015 Reviewed In : 2024 ISO/IEC 27006 : 2015 (First Revision) |
Information technology - Security techniques - Requirements for bodies providing audit and Certification of Information Security Management systems (First Revision) | 1 | Jun, 2024 | Buy | |
57 |
IS/ISO/IEC 27007 : 2020 ISO 28564-3 : 2019 ISO 28564-3 : 2019 (First Revision) |
Information security cybersecurity and privacy protection Guidelines for information security management systems auditing | 0 | ---- | Buy | |
58 |
IS/ISO/IEC/TS 27008 : 2019 Reviewed In : 2023 ISO/IEC TS 27008:2019 (First Revision) |
Information Technology — Security Techniques — Guidelines for the Assessment of Information Security Controls ( First Revision ) | 0 | Sep, 2023 | Buy | |
59 |
IS/ISO/IEC 27010 : 2015 Reviewed In : 2024 ISO/IEC 27010:2015 |
Information Technology - Security Techniques - Information Security Management for Inter-Sector and Inter-Organizational Communications | 0 | May, 2024 | Buy | |
60 |
IS/ISO/IEC 27011 : 2024 (Second Revision) |
Information Security, Cybersecurity and Privacy Protection — Information Security Controls Based on ISO/IEC 27002 for Telecommunications Organizations (Second Revision) | 0 | ---- | Buy | |
61 |
IS/ISO/IEC 27011 : 2016 Reviewed In : 2023 ISO/IEC 27011:2024 (First Revision) |
Information Technology — Security Techniques — Code of Practice for Information Security Controls Based on ISO/IEC 27002 for Telecommunications Organizations ( First Revision ) | 0 | Feb, 2023 | Buy | |
62 |
IS/ISO/IEC 27017 : 2015 Reviewed In : 2024 ISO/IEC 27017 : 2015 |
Information Technology - Security Techniques - Code of Practice for Information Security Controls Based on ISO/IEC 27002 for Cloud Services | 0 | Jun, 2024 | Buy | |
63 |
IS/ISO/IEC 27018 : 2019 Reviewed In : 2023 ISO/IEC 27018:2019 (First Revision) |
Information Technology — Security Techniques — Code of Practice for Protection of Personally Identifiable Information ( PII ) in Public Clouds Acting as PII Processors ( First Revision ) | 0 | Sep, 2023 | Buy | |
64 |
IS/ISO/IEC 27019 : 2017 Reviewed In : 2022 ISO/IEC 27019:2017 |
Information Technology - Security Techniques - Information Security Controls for the Energy Utility Industry | 0 | Dec, 2022 | Buy | |
65 |
IS/ISO/IEC 27032 : 2023 (First Revision) |
Cyber Security — Internet Security — Guidelines (First Revision) | 0 | ---- | Buy | |
66 |
IS/ISO/IEC 27033-1 : 2015 Reviewed In : 2024 ISO/IEC 27033-1:2015 (First Revision) |
Information Technology - Security Techniques - Network Security Part 1 Overview and Concepts (First Revision) | 0 | Jun, 2024 | Buy | |
67 |
IS/ISO/IEC 27033-2 : 2012 Reviewed In : 2024 ISO/IEC 27033-2:2012 |
Information technology - Security techniques: Part 2 guidelines for the design and implementation of network: Security | 0 | Jul, 2024 | Buy | |
68 |
IS/ISO/IEC 27033-3 : 2010 Reviewed In : 2022 ISO/IEC 27033-3 :2010 |
Information technology - Security techniques - Network: Security: Part 3 reference networking scenarios - Threats, design techniques and control issues | 0 | Jan, 2022 | Buy | |
69 |
IS/ISO/IEC 27033-4 : 2014 Reviewed In : 2022 ISO/IEC 27033-4:2014 |
Information technology - Security techniques - Network: Security: Part 4 Securing communications between networks using: Security gateways | 0 | Nov, 2022 | Buy | |
70 |
IS/ISO/IEC 27033-5 : 2013 Reviewed In : 2024 ISO/IEC 27033-5:2013 |
Information technology - Security techniques - Network Security: Part 5 Securing communications across networks using virtual pr4ate networks (VPNs) | 0 | Jun, 2024 | Buy | |
71 |
IS/ISO/IEC 27033-6 : 2016 Reviewed In : 2022 ISO/IEC 27033-6:2016 |
Information technology - Security techniques - Network Security: Part 6 Securing wireless IP network access | 0 | May, 2022 | Buy | |
72 |
IS/ISO/IEC 27034-1 : 2011 Reviewed In : 2024 ISO/IEC 27034-1 : 2011 |
Information technology - Security techniques - Application Security: Part 1 overview and concepts | 1 | Jul, 2024 | Buy | |
73 |
IS/ISO/IEC 27034-2 : 2015 Reviewed In : 2022 ISO/IEC 27034-2:2015 |
Information technology - Security techniques - Application Security: Part 2 organization normat4e framework | 0 | May, 2022 | Buy | |
74 |
IS/ISO/IEC 27034-3 : 2018 Reviewed In : 2023 ISO/IEC 27034-3:2018 |
Information Technology - Application Security Part 3 Application Security Management Process | 0 | Jan, 2023 | Buy | |
75 |
IS/ISO/IEC/TS 27034-5-1 : 2018 Reviewed In : 2023 ISO/IEC TS 27034-5-1:2018 |
Information Technology - Application Security Part 5-1 Protocols and Application Security Controls Data Structure, XML Schemas | 0 | Jan, 2023 | Buy | |
76 |
IS/ISO/IEC 27034-5 : 2017 Reviewed In : 2022 ISO/IEC 27034-5:2017 |
Information technology - Security techniques - Application Security: Part 5 protocols and application Security controls data structure | 0 | May, 2022 | Buy | |
77 |
IS/ISO/IEC 27034-6 : 2016 Reviewed In : 2022 ISO/IEC 27034-6:2016 |
Information technology - Security techniques - Application Security: Part 6 case studies | 0 | May, 2022 | Buy | |
78 |
IS/ISO/IEC 27034-7 : 2018 Reviewed In : 2023 ISO/IEC 27034-7:2018 |
Information Technology - Application Security Part 7 Assurance Prediction Framework | 0 | Jan, 2023 | Buy | |
79 |
IS/ISO/IEC 27035-1 : 2023 (First Revision) |
Information Technology Information Security Incident Management Part 1: Principles and Process Second Revision | 0 | ---- | Buy | |
80 |
IS/ISO/IEC 27035-2 : 2023 (First Revision) |
Information Technology Information security incident management Part 2: Guidelines to plan and prepare for incident response Second Revision | 0 | ---- | Buy | |
81 |
IS/ISO/IEC 27035-3 : 2020 ISO 22468 : 2020 ISO 22468 : 2020 |
INFORMATION TECHNOLOGY INFORMATION SECURITY INCIDENT MANAGEMENT PART 3: GUIDELINES FOR ICT INCIDENT RESPONSE OPERATIONS | 0 | ---- | Buy | |
82 |
IS/ISO/IEC 27036-1 : 2021 (First Revision) |
Cybersecurity Supplier relationships Part 1: Overview and concepts First Revision | 0 | ---- | Buy | |
83 |
IS/ISO/IEC 27036-2 : 2022 |
Cybersecurity Supplier Relationships Part 2: Requirements | 0 | ---- | Buy | |
84 |
IS/ISO/IEC 27036-3 : 2023 (First Revision) |
Cybersecurity - Supplier Relationships Part 3: Guidelines for Hardware Software and Services Supply Chain Security ( First Revision) | 0 | ---- | Buy | |
85 |
IS/ISO/IEC 27036-3 : 2013 Reviewed In : 2023 ISO/IEC 27036-3:2023 |
Information technology - Security techniques - Information Security for supplier relationships: Part 3 guidelines for information and communication technology supply chain Security | 0 | Oct, 2023 | Buy | |
86 |
IS/ISO/IEC 27036-4 : 2016 Reviewed In : 2022 ISO/IEC 27036-4:2016 |
Information Technology - Security Techniques - Information Security for Supplier Relationships Part 4 Guidelines for Security of Cloud Services | 0 | Dec, 2022 | Buy | |
87 |
IS/ISO/IEC 27037 : 2012 Reviewed In : 2024 ISO/IEC 27037 : 2012 |
Information Technology - Security Techniques - Guidelines for Identification,Collection,Acquisition and Preservation of Digital Evidence | 0 | Jun, 2024 | Buy | |
88 |
IS/ISO/IEC 27040 : 2024 (First Revision) |
Information Technology — Security Techniques — Storage Security (First Revision) | 0 | ---- | Buy | |
89 |
IS/ISO/IEC 27040 : 2015 Reviewed In : 2024 ISO/IEC 27040:2024 |
Information Technology - Security Techniques - Storage Security | 0 | Jun, 2024 | Buy | |
90 |
IS/ISO/IEC 27050-1 : 2019 ISO/IEC TR 12785-3: 2012 (First Revision) |
Information technology Electronic discovery Part 1: Overview and concepts | 0 | ---- | Buy | |
91 |
IS/ISO/IEC 27050-2 : 2018 |
Information Technology � Electronic Discovery Part 2: Guidance for Governance and Management of Electronic Discovery | 0 | ---- | Buy | |
92 |
IS/ISO/IEC 27050-3 : 2020 (First Revision) |
Information technology Electronic discovery Part 3: Code of practice for electronic discovery | 0 | ---- | Buy | |
93 |
IS/ISO/IEC 27050-4 : 2021 ISO 8968-3:2004 ISO 8968-3:2004 |
Information technology -Electronic discovery Part 4: Technical readiness | 0 | ---- | Buy | |
94 |
IS/ISO/IEC 27071 : 2023 |
Cybersecurity - Security Recommendations for Establishing Trusted Connections Between Devices and Services | 0 | ---- | Buy | |
95 |
IS/ISO/IEC 27099 : 2022 |
Information technology Public key infrastructure Practices and policy framework | 0 | ---- | Buy | |
96 |
IS/ISO/IEC/TS 27100 : 2020 ISO 14891 : 2002 ISO 14891 : 2002 |
INFORMATION TECHNOLOGY CYBERSECURITY OVERVIEW AND CONCEPTS | 0 | ---- | Buy | |
97 |
IS/ISO/IEC/TR 27103 : 2018 Reviewed In : 2023 ISO/IEC TR 27103:2018 |
Information Technology - Security Techniques - Cybersecurity and ISO and IEC Standards | 0 | Jan, 2023 | Buy | |
98 |
IS/ISO/IEC 27400 : 2022 |
Cybersecurity IoT Security and Privacy Guidelines | 0 | ---- | Buy | |
99 |
IS/ISO/IEC 27402 : 2023 |
Cybersecurity IoT Security and Privacy Device Baseline Requirements | 0 | ---- | Buy | |
100 |
IS/ISO/IEC/TR 27550 : 2019 |
Information technology Security techniques Privacy engineering for system life cycle processes | 0 | ---- | Buy | |
101 |
IS/ISO/IEC 29100 : 2024 (First Revision) |
Information Technology — Security Techniques — Privacy Framework (First Revision) | 0 | ---- | Buy | |
102 |
IS/ISO/IEC 29100 : 2011 Reviewed In : 2024 ISO/IEC 29100:2024 |
Information Technology - Security Techniques - Privacy Framework | 1 | Jun, 2024 | Buy | |
103 |
IS/ISO/IEC 29101 : 2018 Reviewed In : 2023 ISO/IEC 29101:2018 |
Information Technology — Security Techniques — Privacy Architecture Framework | 0 | Sep, 2023 | Buy | |
104 |
IS/ISO/IEC 29184 : 2020 |
Information technology Online privacy notices and consent | 0 | ---- | Buy | |
105 |
IS/ISO/IEC 29192-1 : 2012 Reviewed In : 2024 ISO/IEC 29192-1 : 2012 |
Information Technology - Security Techniques - Lightweight Crytography Part 1 General | 0 | Jun, 2024 | Buy | |
106 |
IS/ISO/IEC 29192-2 : 2019 ISO 10797 : 2012 ISO 10797 : 2012 (First Revision) |
Information security Lightweight cryptography Part 2: Block ciphers First Revision | 0 | ---- | Buy | |
107 |
IS/ISO/IEC 29192-3 : 2012 Reviewed In : 2024 ISO/IEC 29192-3 : 2012 |
Information Technology - Security Techniques - Lightweight Cryptography Part 3 Stream Ciphers | 0 | May, 2024 | Buy | |
108 |
IS/ISO/IEC 29192-4 : 2013 Reviewed In : 2024 ISO/IEC 29192-4 : 2013 |
Information Technology - Security Techniques - Lightweight Cryptography Part 4 Mechanisms Using Asymmetric Techniques | 1 | Jun, 2024 | Buy | |
109 |
IS/ISO/IEC 29192-5 : 2016 Reviewed In : 2022 ISO/IEC 29192-5:2016 |
Information Technology - Security Techniques - Lightweight Cryptography Part 5 Hash-Functions | 0 | Dec, 2022 | Buy | |
110 |
IS/ISO/IEC 29192-6 : 2019 |
Information technology Lightweight cryptography Part 6: Message authentication codes MACs | 0 | ---- | Download | |
111 |
IS/ISO/IEC 29192-7 : 2019 8601-2 |
Information security Lightweight cryptography Part 7: Broadcast authentication protocols | 0 | ---- | Buy | |
112 |
IS/ISO/IEC 29192-8 : 2022 |
Information Security Lightweight Cryptography Part 8: Authenticated Encryption | 0 | ---- | Buy | |
113 |
IS/ISO/IEC 9796-2 : 2010 Reviewed In : 2024 ISO/IEC 9796-2:2010 (First Revision) |
Information technology - Security techniques - Digital signature schemes g4ing message recovery: Part 2 integer factorization based mechanisms (First Revision) | 0 | Jun, 2024 | Buy | |
114 |
IS/ISO/IEC 9796-3 : 2006 Reviewed In : 2022 ISO/IEC 9796-3:2006 |
Information technology - Security techniques - Digital signature schemes giving message recovery: Part 3 discrete logarithm based mechanisms | 0 | Apr, 2022 | Buy |