Search Serbian, European and international standards. Identify the standard organization, select the standard number or keyword, and complete the search you want. You can also add a standard drafting stage or a committee / national committee that drafted the standard
Information technology — Security techniques — Entity authentication assurance framework
90.92 Standard to be revised
Information security, cybersecurity and privacy protection — Verification of cryptographic protocols — Part 1: Framework
60.60 Standard published
Information technology — Security techniques — Guidelines for privacy impact assessment
60.60 Standard published
Information technology — Security techniques — A framework for access management
60.60 Standard published
Information technology — Security techniques — Vulnerability disclosure
90.92 Standard to be revised
Information technology — Security techniques — Best practices for the provision and use of time-stamping services
90.93 Standard confirmed
Information technology — Security techniques — Signcryption
90.93 Standard confirmed
Information technology — Security techniques — Signcryption — Technical Corrigendum 1
60.60 Standard published
Information technology — Security techniques — Code of practice for personally identifiable information protection
90.92 Standard to be revised
Information technology — Online privacy notices and consent
90.60 Close of review
Information technology — Security techniques — Privacy capability assessment model
90.93 Standard confirmed
Information technology — Security techniques — Requirements for partially anonymous, partially unlinkable authentication.
90.93 Standard confirmed
Information technology — Security techniques — Lightweight cryptography — Part 1: General
90.93 Standard confirmed
Information technology — Security techniques — Lightweight cryptography — Part 1: General — Amendment 1
60.60 Standard published
Information security — Lightweight cryptography — Part 2: Block ciphers
90.93 Standard confirmed
Information technology — Security techniques — Lightweight cryptography — Part 3: Stream ciphers
90.93 Standard confirmed
Information technology — Security techniques — Lightweight cryptography — Part 4: Mechanisms using asymmetric techniques
90.93 Standard confirmed
Information technology — Security techniques — Lightweight cryptography — Part 4: Mechanisms using asymmetric techniques — Amendment 1
60.60 Standard published