Search Serbian, European and international standards. Identify the standard organization, select the standard number or keyword, and complete the search you want. You can also add a standard drafting stage or a committee / national committee that drafted the standard
Cybersecurity — Guidance on using ISO and IEC standards in a Cybersecurity Framework
50.20 Proof sent to secretariat or FDIS ballot initiated: 8 weeks
Cybersecurity — IoT security and privacy — Cybersecurity labelling framework for consumer IoT
50.00 Final text received or FDIS registered for formal approval
Information security, cybersecurity and privacy protection — Security and privacy requirements for authentication using biometrics on mobile devices — Part 2: Remote modes
60.00 Standard under publication
Privacy protection — Guidance on the use of models for privacy engineering
50.00 Final text received or FDIS registered for formal approval
Information security, cybersecurity and privacy protection — Guidelines on privacy preservation based on zero-knowledge proofs
40.20 DIS ballot initiated: 12 weeks
Information security, cybersecurity and privacy protection — Age assurance systems — Part 1: Framework
50.00 Final text received or FDIS registered for formal approval
Information security, cybersecurity and privacy protection — Privacy information management systems — Requirements and guidance
50.20 Proof sent to secretariat or FDIS ballot initiated: 8 weeks
Information security, cybersecurity and privacy protection — Requirements for bodies providing audit and certification of privacy information management systems
60.00 Standard under publication
Information Security - Fully homomorphic encryption — Part 4: Mechanisms for arithmetic based on look-up table evaluation
40.20 DIS ballot initiated: 12 weeks
Information security, cybersecurity and privacy protection – Controls and guidance for personally identifiable information protection
40.20 DIS ballot initiated: 12 weeks
Information technology — Security techniques — Lightweight cryptography — Part 1: General — Amendment 1
40.60 Close of voting
Information technology — Security techniques — Lightweight cryptography — Part 4: Mechanisms using asymmetric techniques — Amendment 2
30.20 CD study/ballot initiated
Information security — Lightweight cryptography — Part 8: Authenticated encryption — Amendment 1
30.20 CD study/ballot initiated
Information security — Message authentication codes (MACs) — Part 2: Mechanisms using a dedicated hash-function — Technical Corrigendum 2
00.00 Proposal for new project received