Standards search

Use the form below to find particular standards or projects. Enter your criteria for searching (single or in combination) in the fields below and press the button “Search”. You can also search using the Advance Search facility.

Design of graphical symbols for use in the technical documentation of products — Part 1: Basic rules

95.99 Withdrawal of Standard

ISO/TC 145

Information technology — Programming languages — Generic package of primitive functions for Ada

95.99 Withdrawal of Standard

ISO/IEC JTC 1/SC 22

Information technology — Programming languages — Form Interface Management System (FIMS)

95.99 Withdrawal of Standard

ISO/IEC JTC 1/SC 22

Information technology — Programming languages — MUMPS

95.99 Withdrawal of Standard

ISO/IEC JTC 1/SC 22

Information technology — Security techniques — Key management — Part 1: Framework

95.99 Withdrawal of Standard

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Key management — Part 2: Mechanisms using symmetric techniques

95.99 Withdrawal of Standard

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Key management — Part 2: Mechanisms using symmetric techniques — Technical Corrigendum 1

95.99 Withdrawal of Standard

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Key management — Part 2: Mechanisms using symmetric techniques

95.99 Withdrawal of Standard

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Key management — Part 2: Mechanisms using symmetric techniques — Technical Corrigendum 1

95.99 Withdrawal of Standard

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques

95.99 Withdrawal of Standard

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques

95.99 Withdrawal of Standard

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques — Technical Corrigendum 1

95.99 Withdrawal of Standard

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques

95.99 Withdrawal of Standard

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques — Amendment 1: Blinded Diffie-Hellman key agreement

95.99 Withdrawal of Standard

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques — Technical Corrigendum 1

95.99 Withdrawal of Standard

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets

95.99 Withdrawal of Standard

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets — Technical Corrigendum 1

95.99 Withdrawal of Standard

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Key management — Part 5: Group key management

95.99 Withdrawal of Standard

ISO/IEC JTC 1/SC 27