Phone: (011) 7541-421, 3409-301, 3409-335, 6547-293, 3409-310
E-mail: Standards sales: prodaja@iss.rs Education: iss-edukacija@iss.rs Information about standards: infocentar@iss.rs
Stevana Brakusa 2, 11030 Beograd
Main menu

Projects

Search Serbian, European and international standards. Identify the standard organization, select the standard number or keyword, and complete the search you want. You can also add a standard drafting stage or a committee / national committee that drafted the standard

Information processing — Volume and file structure of CD-ROM for information interchange

60.60 Standard published

ISO/IEC JTC 1/SC 23 more

Information technology — Data interchange on 12,7 mm wide magnetic tape cartridges — 18 tracks, 1 491 data bytes per millimetre

90.93 Standard confirmed

ISO/IEC JTC 1/SC 23 more

Information technology — Security techniques — Digital signature schemes giving message recovery — Part 2: Integer factorization based mechanisms

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27 more

Information technology — Security techniques — Digital signature schemes giving message recovery — Part 3: Discrete logarithm based mechanisms

90.60 Close of review

ISO/IEC JTC 1/SC 27 more

Information technology — Security techniques — Message Authentication Codes (MACs) — Part 1: Mechanisms using a block cipher

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27 more

Information technology — Security techniques — Message Authentication Codes (MACs) — Part 1: Mechanisms using a block cipher — Amendment 1

60.60 Standard published

ISO/IEC JTC 1/SC 27 more

Information security — Message authentication codes (MACs) — Part 2: Mechanisms using a dedicated hash-function

60.60 Standard published

ISO/IEC JTC 1/SC 27 more

Information technology — Security techniques — Message Authentication Codes (MACs) — Part 3: Mechanisms using a universal hash-function

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27 more

Information technology — Security techniques — Message Authentication Codes (MACs) — Part 3: Mechanisms using a universal hash-function — Amendment 1

60.60 Standard published

ISO/IEC JTC 1/SC 27 more

Information technology — Security techniques — Entity authentication — Part 1: General

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27 more

IT Security techniques — Entity authentication — Part 2: Mechanisms using authenticated encryption

60.60 Standard published

ISO/IEC JTC 1/SC 27 more

IT Security techniques — Entity authentication — Part 3: Mechanisms using digital signature techniques

90.20 Standard under periodical review

ISO/IEC JTC 1/SC 27 more

Information technology — Security techniques — Entity authentication — Part 4: Mechanisms using a cryptographic check function

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27 more

Information technology — Security techniques — Entity authentication — Part 4: Mechanisms using a cryptographic check function — Technical Corrigendum 1

60.60 Standard published

ISO/IEC JTC 1/SC 27 more

Information technology — Security techniques — Entity authentication — Part 4: Mechanisms using a cryptographic check function — Technical Corrigendum 2

60.60 Standard published

ISO/IEC JTC 1/SC 27 more

Information technology — Security techniques — Entity authentication — Part 5: Mechanisms using zero-knowledge techniques

90.20 Standard under periodical review

ISO/IEC JTC 1/SC 27 more

Information technology — Security techniques — Entity authentication — Part 6: Mechanisms using manual data transfer

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27 more

Information technology — Open Systems Interconnection — Service definition for the Commitment, Concurrency and Recovery service element

90.93 Standard confirmed

ISO/IEC JTC 1 more