Search Serbian, European and international standards. Identify the standard organization, select the standard number or keyword, and complete the search you want. You can also add a standard drafting stage or a committee / national committee that drafted the standard
Security techniques — Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management — Requirements and guidelines — Corrigendum 1
60.60 Standard published
Information technology — Security techniques — Modes of operation for an n-bit block cipher
90.93 Standard confirmed
Information technology — Security techniques — Hash-functions — Part 1: General
90.93 Standard confirmed
Information technology — Security techniques — Hash-functions — Part 2: Hash-functions using an n-bit block cipher
60.60 Standard published
IT Security techniques — Hash-functions — Part 3: Dedicated hash-functions
90.93 Standard confirmed
Information technology — Security techniques — Hash-functions — Part 4: Hash-functions using modular arithmetic — Amendment 1: Object identifiers
60.60 Standard published
Information technology — Security techniques — Key management — Part 1: Framework
90.93 Standard confirmed
IT Security techniques — Key management — Part 2: Mechanisms using symmetric techniques
90.93 Standard confirmed
Information security — Key management — Part 3: Mechanisms using asymmetric techniques
60.60 Standard published
Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets
90.92 Standard to be revised
Information security — Key management — Part 5: Group key management
60.60 Standard published
Information security — Non-repudiation — Part 1: General
60.60 Standard published
Information technology — Security techniques — Non-repudiation — Part 2: Mechanisms using symmetric techniques
60.60 Standard published
Information security — Non-repudiation — Part 3: Mechanisms using asymmetric techniques
60.60 Standard published
Information technology — Security techniques — Guidelines for the use and management of Trusted Third Party services
90.93 Standard confirmed
Information technology — Security techniques — Digital signatures with appendix — Part 1: General
90.93 Standard confirmed
Information technology — Security techniques — Digital signatures with appendix — Part 2: Integer factorization based mechanisms
60.60 Standard published
IT Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms
90.93 Standard confirmed