Search Serbian, European and international standards. Identify the standard organization, select the standard number or keyword, and complete the search you want. You can also add a standard drafting stage or a committee / national committee that drafted the standard
Identification cards — Optical memory cards — Part 2: Co-existence of optical memory with other machine readable technologies
90.93 Standard confirmed
Identification cards — Optical memory cards — Part 3: Authentication techniques
90.93 Standard confirmed
Identification cards — Optical memory cards — Linear recording method — Part 1: Physical characteristics
90.93 Standard confirmed
Identification cards — Optical memory cards — Linear recording method — Part 2: Dimensions and location of the accessible optical area
90.93 Standard confirmed
Identification cards — Optical memory cards — Linear recording method — Part 3: Optical properties and characteristics
90.93 Standard confirmed
Identification cards — Optical memory cards — Linear recording method — Part 4: Logical data structures
90.93 Standard confirmed
Identification cards — Optical memory cards — Linear recording method — Part 5: Data format for information interchange for applications using ISO/IEC 11694-4
90.93 Standard confirmed
Identification cards — Optical memory cards — Linear recording method — Part 6: Use of biometrics on an optical memory card
90.93 Standard confirmed
Identification cards — Optical memory cards — Holographic recording method — Part 1: Physical characteristics
90.93 Standard confirmed
Identification cards — Optical memory cards — Holographic recording method — Part 2: Dimensions and location of accessible optical area
90.93 Standard confirmed
Identification cards — Optical memory cards — Holographic recording method — Part 3: Optical properties and characteristics
90.93 Standard confirmed
Information technology — Programming languages — M
90.20 Standard under periodical review
Information technology — Security techniques — Key management — Part 1: Framework
90.93 Standard confirmed
IT Security techniques — Key management — Part 2: Mechanisms using symmetric techniques
90.93 Standard confirmed
Information security — Key management — Part 3: Mechanisms using asymmetric techniques
60.60 Standard published
Information security — Key management — Part 3: Mechanisms using asymmetric techniques — Amendment 1: TFNS identity-based key agreement
60.60 Standard published
Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets
90.92 Standard to be revised
Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets — Amendment 1: Unbalanced Password-Authenticated Key Agreement with Identity-Based Cryptosystems (UPAKA-IBC)
60.60 Standard published