Phone: (011) 7541-421, 3409-301, 3409-335, 6547-293, 3409-310
E-mail: Standards sales: prodaja@iss.rs Education: iss-edukacija@iss.rs Information about standards: infocentar@iss.rs
Stevana Brakusa 2, 11030 Beograd
Main menu

Projects

Search Serbian, European and international standards. Identify the standard organization, select the standard number or keyword, and complete the search you want. You can also add a standard drafting stage or a committee / national committee that drafted the standard

Security techniques — Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management — Requirements and guidelines — Corrigendum 1

60.60   Standard published

I224 more

Information technology — Security techniques — Modes of operation for an n-bit block cipher

90.93   Standard confirmed

I224 more

Information technology — Security techniques — Hash-functions — Part 1: General

90.93   Standard confirmed

I224 more

Information technology — Security techniques — Hash-functions — Part 2: Hash-functions using an n-bit block cipher

60.60   Standard published

I224 more

IT Security techniques — Hash-functions — Part 3: Dedicated hash-functions

90.93   Standard confirmed

I224 more

Information technology — Security techniques — Hash-functions — Part 4: Hash-functions using modular arithmetic — Amendment 1: Object identifiers

60.60   Standard published

I224 more

Cards and security devices for personal identification — Test methods — Part 1: General characteristics

60.60   Standard published

I224 more

Identification cards — Test methods — Part 2: Cards with magnetic stripes

90.93   Standard confirmed

I224 more

Identification cards — Test methods — Part 3: Integrated circuit cards with contacts and related interface devices

90.93   Standard confirmed

I224 more

Identification cards — Test methods — Part 5: Optical memory cards

90.93   Standard confirmed

I224 more

Cards and security devices for personal identification — Test methods — Part 6: Contactless proximity objects — Amendment 1: Dynamic power level management

90.92   Standard to be revised

I224 more

Cards and security devices for personal identification — Test methods — Part 7: Contactless vicinity objects

90.60   Close of review

I224 more

Securities and related financial instruments — Classification of financial instruments (CFI) code

60.60   Standard published

I224 more

Information technology — Security techniques — Key management — Part 1: Framework

90.93   Standard confirmed

I224 more

IT Security techniques — Key management — Part 2: Mechanisms using symmetric techniques

90.93   Standard confirmed

I224 more

Information security — Key management — Part 3: Mechanisms using asymmetric techniques

60.60   Standard published

I224 more

Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets

90.92   Standard to be revised

I224 more

Information security — Key management — Part 5: Group key management

60.60   Standard published

I224 more