Use the form below to find particular standards or projects. Enter your criteria for searching (single or in combination) in the fields below and press the button “Search”. You can also search using the Advance Search facility.
Security requirements for trustworthy systems managing certificates and time-stamps
90.60 Close of review
Identification card systems - Telecommunication applications - Integrated circuit(s) card payphone
90.60 Close of review
Identification card systems - Human-machine interface - Part 1: Design principles for the user interface
90.93 Standard confirmed
Identification card systems - Man-machine interface - Part 2: Dimensions and location of a tactile identifier for ID-1 cards
90.93 Standard confirmed
Identification card systems - User Interface - Part 3: Key pads
60.60 Standard published
Identification card systems - Man-machine interface - Part 4: Coding of user requirements for people with special needs
90.60 Close of review
Identification card systems - Man-machine interface - Part 5: Raised tactile symbols for differenciation of application on ID-1 cards
90.93 Standard confirmed
Machine readable cards - Health care applications - Cards: General characteristics
90.60 Close of review
Identification card systems - Surface transport applications - Interoperable Public Transport Applications - Framework
90.93 Standard confirmed
Identification card systems - Surface transport applications - Part 1: Elementary data types, general code lists and general data elements
90.93 Standard confirmed
Identification card systems - Surface transport applications - Part 2: Transport and travel payment related data elements and code lists
90.93 Standard confirmed
Machine-readable cards - Health care applications - Numbering system and registration procedure for issuer identifiers
90.93 Standard confirmed
Protection profiles for secure signature creation device - Part 1: Overview
90.93 Standard confirmed
Protection profiles for secure signature creation device - Part 2: Device with key generation
90.20 Standard under periodical review
Protection profiles for secure signature creation device - Part 3: Device with key import
90.60 Close of review
Protection profiles for secure signature creation device - Part 4: Extension for device with key generation and trusted channel to certificate generation application
90.60 Close of review
Protection profiles for secure signature creation device - Part 5: Extension for device with key generation and trusted channel to signature creation application
90.60 Close of review
Protection profiles for secure signature creation device - Part 6: Extension for device with key import and trusted channel to signature creation application
90.93 Standard confirmed