Search Serbian, European and international standards. Identify the standard organization, select the standard number or keyword, and complete the search you want. You can also add a standard drafting stage or a committee / national committee that drafted the standard
Information technology — Open Systems Interconnection — Conformance testing methodology and framework — Part 3: The Tree and Tabular Combined Notation (TTCN)
90.93 Standard confirmed
Information technology — Open Systems Interconnection — Conformance testing methodology and framework — Part 4: Test realization
90.93 Standard confirmed
Information technology — Open Systems Interconnection — Conformance testing methodology and framework — Part 5: Requirements on test laboratories and clients for the conformance assessment process
90.93 Standard confirmed
Information technology — Open Systems Interconnection — Conformance testing methodology and framework — Part 6: Protocol profile test specification
90.93 Standard confirmed
Information technology — Open Systems Interconnection — Conformance testing methodology and framework — Part 7: Implementation Conformance Statements
90.93 Standard confirmed
Information technology — Open Systems Interconnection — Conformance testing methodology and framework — Part 7: Implementation Conformance Statements — Technical Corrigendum 1
60.60 Standard published
Information processing — Volume and file structure of CD-ROM for information interchange
60.60 Standard published
Information technology — Data interchange on 12,7 mm wide magnetic tape cartridges — 18 tracks, 1 491 data bytes per millimetre
90.93 Standard confirmed
Information technology — Guidelines for the organization and representation of data elements for data interchange — Coding methods and principles
90.93 Standard confirmed
Information technology — Security techniques — Digital signature schemes giving message recovery — Part 2: Integer factorization based mechanisms
90.93 Standard confirmed
Information technology — Security techniques — Digital signature schemes giving message recovery — Part 3: Discrete logarithm based mechanisms
90.93 Standard confirmed
Information technology — Security techniques — Message Authentication Codes (MACs) — Part 1: Mechanisms using a block cipher
90.93 Standard confirmed
Information technology — Security techniques — Message Authentication Codes (MACs) — Part 1: Mechanisms using a block cipher — Amendment 1
60.60 Standard published
Information security — Message authentication codes (MACs) — Part 2: Mechanisms using a dedicated hash-function
90.20 Standard under periodical review
Information security — Message authentication codes (MACs) — Part 2: Mechanisms using a dedicated hash-function — Technical Corrigendum 1
60.60 Standard published
Information technology — Security techniques — Message Authentication Codes (MACs) — Part 3: Mechanisms using a universal hash-function
90.93 Standard confirmed
Information technology — Security techniques — Message Authentication Codes (MACs) — Part 3: Mechanisms using a universal hash-function — Amendment 1
60.60 Standard published
Information technology — Security techniques — Entity authentication — Part 1: General
90.93 Standard confirmed