Use the form below to find particular standards or projects. Enter your criteria for searching (single or in combination) in the fields below and press the button “Search”. You can also search using the Advance Search facility.
Design of graphical symbols for use in the technical documentation of products — Part 1: Basic rules
95.99 Withdrawal of Standard
Information technology — Programming languages — Generic package of primitive functions for Ada
95.99 Withdrawal of Standard
Information technology — Programming languages — Form Interface Management System (FIMS)
95.99 Withdrawal of Standard
Information technology — Programming languages — MUMPS
95.99 Withdrawal of Standard
Information technology — Security techniques — Key management — Part 1: Framework
95.99 Withdrawal of Standard
Information technology — Security techniques — Key management — Part 2: Mechanisms using symmetric techniques
95.99 Withdrawal of Standard
Information technology — Security techniques — Key management — Part 2: Mechanisms using symmetric techniques — Technical Corrigendum 1
95.99 Withdrawal of Standard
Information technology — Security techniques — Key management — Part 2: Mechanisms using symmetric techniques
95.99 Withdrawal of Standard
Information technology — Security techniques — Key management — Part 2: Mechanisms using symmetric techniques — Technical Corrigendum 1
95.99 Withdrawal of Standard
Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques
95.99 Withdrawal of Standard
Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques
95.99 Withdrawal of Standard
Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques — Technical Corrigendum 1
95.99 Withdrawal of Standard
Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques
95.99 Withdrawal of Standard
Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques — Amendment 1: Blinded Diffie-Hellman key agreement
95.99 Withdrawal of Standard
Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques — Technical Corrigendum 1
95.99 Withdrawal of Standard
Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets
95.99 Withdrawal of Standard
Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets — Technical Corrigendum 1
95.99 Withdrawal of Standard
Information technology — Security techniques — Key management — Part 5: Group key management
95.99 Withdrawal of Standard