Competence requirements for information security testers and evaluators -- Part 1: Introduction, concepts and general requirements Read more about Competence requirements for information security testers and evaluators -- Part 1: Introduction, concepts and general requirements
Cards and security devices for personal identification Read more about Cards and security devices for personal identification
Encryption algorithms -- Part 6: Homomorphic encryption Read more about Encryption algorithms -- Part 6: Homomorphic encryption
Encryption algorithms -- Part 5: Identity-based ciphers Read more about Encryption algorithms -- Part 5: Identity-based ciphers
Encryption algorithms -- Part 4: Stream ciphers Read more about Encryption algorithms -- Part 4: Stream ciphers
Encryption algorithms -- Part 3: Block ciphers Read more about Encryption algorithms -- Part 3: Block ciphers
Encryption algorithms -- Part 2: Asymmetric ciphers Read more about Encryption algorithms -- Part 2: Asymmetric ciphers
Cloud computing -- Best practices for cloud SLA metrics Read more about Cloud computing -- Best practices for cloud SLA metrics
Information technology -- Cloud computing and distributed platforms -- Data sharing agreement (DSA) framework Read more about Information technology -- Cloud computing and distributed platforms -- Data sharing agreement (DSA) framework
Information technology -- Cloud service metering and billing elements Read more about Information technology -- Cloud service metering and billing elements
Information technology -- Cloud computing -- Edge computing landscape Read more about Information technology -- Cloud computing -- Edge computing landscape