Phone: (011) 7541-421, 3409-301, 3409-335, 6547-293, 3409-310
E-mail: Standards sales: prodaja@iss.rs Education: iss-edukacija@iss.rs Information about standards: infocentar@iss.rs
Stevana Brakusa 2, 11030 Beograd
Main menu

Projects

Search Serbian, European and international standards. Identify the standard organization, select the standard number or keyword, and complete the search you want. You can also add a standard drafting stage or a committee / national committee that drafted the standard

Security techniques — Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management — Requirements and guidelines — Corrigendum 1

60.60 Standard published

I224 more

Information technology — Security techniques — Modes of operation for an n-bit block cipher

90.93 Standard confirmed

I224 more

Information technology — Security techniques — Hash-functions — Part 1: General

90.93 Standard confirmed

I224 more

Information technology — Security techniques — Hash-functions — Part 2: Hash-functions using an n-bit block cipher

60.60 Standard published

I224 more

IT Security techniques — Hash-functions — Part 3: Dedicated hash-functions

90.93 Standard confirmed

I224 more

Information technology — Security techniques — Hash-functions — Part 4: Hash-functions using modular arithmetic — Amendment 1: Object identifiers

60.60 Standard published

I224 more

Information technology — Security techniques — Key management — Part 1: Framework

90.93 Standard confirmed

I224 more

IT Security techniques — Key management — Part 2: Mechanisms using symmetric techniques

90.93 Standard confirmed

I224 more

Information security — Key management — Part 3: Mechanisms using asymmetric techniques

60.60 Standard published

I224 more

Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets

90.92 Standard to be revised

I224 more

Information security — Key management — Part 5: Group key management

60.60 Standard published

I224 more

Information security — Non-repudiation — Part 1: General

60.60 Standard published

I224 more

Information technology — Security techniques — Non-repudiation — Part 2: Mechanisms using symmetric techniques

60.60 Standard published

I224 more

Information security — Non-repudiation — Part 3: Mechanisms using asymmetric techniques

60.60 Standard published

I224 more

Information technology — Security techniques — Guidelines for the use and management of Trusted Third Party services

90.93 Standard confirmed

I224 more

Information technology — Security techniques — Digital signatures with appendix — Part 1: General

90.93 Standard confirmed

I224 more

Information technology — Security techniques — Digital signatures with appendix — Part 2: Integer factorization based mechanisms

60.60 Standard published

I224 more

IT Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms

90.93 Standard confirmed

I224 more