DPS
Drejtoria e Përgjithshme e Standardizimit
Phone: +355 4 222 62 55
E-mail: info@dps.gov.al
Address: Address: "Reshit Collaku" Str., (nearby ILDKPKI, VI floor), Po.Box 98, Tiranë - Albania
Main menu

Projects

Use the form below to find the searched projects. Enter your criteria for searching (single or in combination) in the fields below and press the button “Search”.

Information technology -- Security techniques -- Guidelines for the assessment of information security controls

60.60 Standard published

DPS/KT 224 more

Information technology — Security techniques — Modes of operation for an n-bit block cipher

60.60 Standard published

DPS/KT 9 more

Information technology — Security techniques — Hash-functions — Part 1: General

60.60 Standard published

DPS/KT 9 more

Information technology — Security techniques — Hash-functions — Part 2: Hash-functions using an n-bit block cipher

60.60 Standard published

DPS/KT 9 more

IT Security techniques — Hash-functions — Part 3: Dedicated hash-functions

60.60 Standard published

DPS/KT 9 more

Information technology — Security techniques — Hash-functions — Part 4: Hash-functions using modular arithmetic

60.60 Standard published

DPS/KT 9 more

Information technology — Security techniques — Key management — Part 1: Framework

60.60 Standard published

DPS/KT 9 more

IT Security techniques — Key management — Part 2: Mechanisms using symmetric techniques

60.60 Standard published

DPS/KT 9 more

Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques

60.60 Standard published

DPS/KT 9 more

Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques — Amendment 1: Blinded Diffie-Hellman key agreement

60.60 Standard published

DPS/KT 9 more

Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets

60.60 Standard published

DPS/KT 9 more

Information security — Key management — Part 5: Group key management

60.60 Standard published

DPS/KT 9 more

Information technology — Security techniques — Key management — Part 6: Key derivation

60.60 Standard published

DPS/KT 9 more

Security aspects - Guidelines for their inclusion in publications

60.60 Standard published

DPS/KT 6 more

Information security, cybersecurity and privacy protection - Evaluation criteria for IT security - Part 1: Introduction and general model (ISO/IEC 15408-1:2022)

60.60 Standard published

DPS/KT 1 more

Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 1: Introduction and general model

60.60 Standard published

DPS/KT 9 more

Information security, cybersecurity and privacy protection - Evaluation criteria for IT security - Part 2: Security functional components (ISO/IEC 15408-2:2022)

60.60 Standard published

DPS/KT 1 more

Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 2: Security functional components

60.60 Standard published

DPS/KT 9 more