Pretražite srpske, evropske i međunarodne standarde. Odredite organizaciju koja je donosilac standarda, izaberite oznaku standarda ili ključnu reč i završite željenu pretragu. Možete dodati i fazu u izradi standarda ili komitet/komisiju koja je izradila standard.
Information technology — Security techniques — Entity authentication — Part 4: Mechanisms using a cryptographic check function
90.93 Odluka o potvrđivanju standarda
Information technology — Security techniques — Entity authentication — Part 4: Mechanisms using a cryptographic check function — Technical Corrigendum 1
60.60 Standard objavljen
Information technology — Security techniques — Entity authentication — Part 4: Mechanisms using a cryptographic check function — Technical Corrigendum 2
60.60 Standard objavljen
Information technology — Security techniques — Entity authentication — Part 5: Mechanisms using zero-knowledge techniques
90.92 Odluka o izmeni ili reviziji standarda
Information technology — Security techniques — Entity authentication — Part 6: Mechanisms using manual data transfer
90.93 Odluka o potvrđivanju standarda
Information security — Key management — Part 3: Mechanisms using asymmetric techniques — Amendment 1: TFNS identity-based key agreement
40.60 Završetak javne rasprave
IT Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms — Amendment 1
20.00 Novi projekat upisuje se u plan rada komisije za standarde
Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 1: Introduction and general model
40.20 Nacrt na javnoj raspravi 60 dana
Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 2: Security functional components
40.20 Nacrt na javnoj raspravi 60 dana
Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 3: Security assurance components
40.20 Nacrt na javnoj raspravi 60 dana
Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 4: Framework for the specification of evaluation methods and activities
40.20 Nacrt na javnoj raspravi 60 dana
Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 5: Pre-defined packages of security requirements
40.20 Nacrt na javnoj raspravi 60 dana
Information technology — Security techniques — Time-stamping services — Part 1: Framework — Amendment 1
40.60 Završetak javne rasprave
Information security — Time-stamping services — Part 2: Mechanisms producing independent tokens — Technical Corrigendum 1
30.00 Evidentiranje nacrta komisije standarda
Information technology — Security techniques — Random bit generation
50.00 Evidentiranje podataka o definitivnom tekstu nacrta standarda
Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers — Amendment 2
30.60 Završetak izjašnjavanja o nacrtu komisije standarda
Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Methodology for IT security evaluation
40.20 Nacrt na javnoj raspravi 60 dana
Information security, cybersecurity and privacy protection — Security requirements for cryptographic modules
50.00 Evidentiranje podataka o definitivnom tekstu nacrta standarda