Search Serbian, European and international standards. Identify the standard organization, select the standard number or keyword, and complete the search you want. You can also add a standard drafting stage or a committee / national committee that drafted the standard
Information security, cybersecurity and privacy protection — Guidelines on privacy preservation based on zero-knowledge proofs
60.00 Standard under publication
Information security, cybersecurity and privacy protection — Age Assurance Systems — Part 2: Technical approaches and guidance for implementation
10.20 New project ballot initiated
Age assurance systems — Part 2: Interoperability, technical architecture and guidelines for use
00.00 Proposal for new project received
Information security, cybersecurity and privacy protection – Age assurance systems — Part 3: Approaches to analysis or comparison
30.60 Close of voting/ comment period
Information technology — Brain-computer interfaces — BCI data format for non-invasive brain information collection
30.00 Committee draft (CD) registered
Information technology — Brain-computer interfaces — Reference architecture
30.00 Committee draft (CD) registered
Privacy protection of user avatar and system avatar interactions in the metaverse
20.20 Working draft (WD) study initiated
Information security, cybersecurity and privacy protection — Privacy in brain computer interface (BCI) applications
20.00 New project registered in TC/SC work programme
Information technology — Brain-computer interfaces — Use cases
20.00 New project registered in TC/SC work programme
Information security — Fully homomorphic encryption — Part 1: General
40.60 Close of voting
Information security — Fully homomorphic encryption — Part 2: Mechanisms for exact arithmetic on modular integers
40.00 DIS registered
Information security — Fully homomorphic encryption — Part 3: Mechanisms for arithmetic on approximate numbers
40.20 DIS ballot initiated: 12 weeks
Information Security — Fully homomorphic encryption — Part 4: Mechanisms for arithmetic based on look-up table evaluation
40.20 DIS ballot initiated: 12 weeks
Information security — Fully homomorphic encryption — Part 5: Mechanisms for scheme switching
20.60 Close of comment period
Information technology — Function libraries for advanced analytics in data management — Part 1: Framework
30.20 CD study/ballot initiated
Information technology — Function libraries for advanced analytics in data management — Part 2: Statistical functions
30.20 CD study/ballot initiated