Pretražite srpske, evropske i međunarodne standarde. Odredite organizaciju koja je donosilac standarda, izaberite oznaku standarda ili ključnu reč i završite željenu pretragu. Možete dodati i fazu u izradi standarda ili komitet/komisiju koja je izradila standard.
Identification cards — Optical memory cards — Linear recording method — Part 2: Dimensions and location of the accessible optical area
90.93 Odluka o potvrđivanju standarda
Identification cards — Optical memory cards — Linear recording method — Part 3: Optical properties and characteristics
90.93 Odluka o potvrđivanju standarda
Identification cards — Optical memory cards — Linear recording method — Part 4: Logical data structures
90.93 Odluka o potvrđivanju standarda
Identification cards — Optical memory cards — Linear recording method — Part 5: Data format for information interchange for applications using ISO/IEC 11694-4
90.93 Odluka o potvrđivanju standarda
Identification cards — Optical memory cards — Linear recording method — Part 6: Use of biometrics on an optical memory card
90.93 Odluka o potvrđivanju standarda
Identification cards — Optical memory cards — Holographic recording method — Part 1: Physical characteristics
90.93 Odluka o potvrđivanju standarda
Identification cards — Optical memory cards — Holographic recording method — Part 2: Dimensions and location of accessible optical area
90.93 Odluka o potvrđivanju standarda
Identification cards — Optical memory cards — Holographic recording method — Part 3: Optical properties and characteristics
90.93 Odluka o potvrđivanju standarda
Information technology — Programming languages — M
90.20 Početak postupka preispitivanja standarda
Information technology — Security techniques — Key management — Part 1: Framework
90.93 Odluka o potvrđivanju standarda
IT Security techniques — Key management — Part 2: Mechanisms using symmetric techniques
90.93 Odluka o potvrđivanju standarda
Information security — Key management — Part 3: Mechanisms using asymmetric techniques
60.60 Standard objavljen
Information security — Key management — Part 3: Mechanisms using asymmetric techniques — Amendment 1: TFNS identity-based key agreement
60.60 Standard objavljen
Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets
90.92 Odluka o izmeni ili reviziji standarda
Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets — Amendment 1: Unbalanced Password-Authenticated Key Agreement with Identity-Based Cryptosystems (UPAKA-IBC)
60.60 Standard objavljen
Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets — Amendment 2: Leakage-resilient password-authenticated key agreement with additional stored secrets
60.60 Standard objavljen
Information security — Key management — Part 5: Group key management
90.20 Početak postupka preispitivanja standarda
Information technology — Security techniques — Key management — Part 6: Key derivation
90.93 Odluka o potvrđivanju standarda