Search Serbian, European and international standards. Identify the standard organization, select the standard number or keyword, and complete the search you want. You can also add a standard drafting stage or a committee / national committee that drafted the standard
Security techniques — Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management — Requirements and guidelines — Corrigendum 1
60.60 Standard published
Information technology — Security techniques — Modes of operation for an n-bit block cipher
90.93 Standard confirmed
Information technology — Security techniques — Hash-functions — Part 1: General
90.93 Standard confirmed
Information technology — Security techniques — Hash-functions — Part 2: Hash-functions using an n-bit block cipher
60.60 Standard published
IT Security techniques — Hash-functions — Part 3: Dedicated hash-functions
90.93 Standard confirmed
Information technology — Security techniques — Hash-functions — Part 4: Hash-functions using modular arithmetic — Amendment 1: Object identifiers
60.60 Standard published
Cards and security devices for personal identification — Test methods — Part 1: General characteristics
60.60 Standard published
Identification cards — Test methods — Part 2: Cards with magnetic stripes
90.93 Standard confirmed
Identification cards — Test methods — Part 3: Integrated circuit cards with contacts and related interface devices
90.93 Standard confirmed
Identification cards — Test methods — Part 5: Optical memory cards
90.93 Standard confirmed
Cards and security devices for personal identification — Test methods — Part 6: Contactless proximity objects — Amendment 1: Dynamic power level management
90.92 Standard to be revised
Cards and security devices for personal identification — Test methods — Part 7: Contactless vicinity objects
90.60 Close of review
Securities and related financial instruments — Classification of financial instruments (CFI) code
60.60 Standard published
Information technology — Security techniques — Key management — Part 1: Framework
90.93 Standard confirmed
IT Security techniques — Key management — Part 2: Mechanisms using symmetric techniques
90.93 Standard confirmed
Information security — Key management — Part 3: Mechanisms using asymmetric techniques
60.60 Standard published
Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets
90.92 Standard to be revised
Information security — Key management — Part 5: Group key management
60.60 Standard published