DPS
Drejtoria e Përgjithshme e Standardizimit
Phone: +355 4 222 62 55
E-mail: info@dps.gov.al
Address: Address: "Reshit Collaku" Str., (nearby ILDKPKI, VI floor), Po.Box 98, Tiranë - Albania
Main menu

Projects

Use the form below to find the searched projects. Enter your criteria for searching (single or in combination) in the fields below and press the button “Search”.

Guidance for developing security and privacy functional requirements based on ISO/IEC 15408

60.60 Standard published

DPS/KT 9 more

Information technology -- Security techniques -- Guidelines for the assessment of information security controls

60.60 Standard published

DPS/KT 224 more

IT Security techniques - Hash-functions - Part 3: Dedicated hash-functions

60.60 Standard published

DPS/KT 9 more

IT Security techniques - Key management - Part 2: Mechanisms using symmetric techniques

60.60 Standard published

DPS/KT 9 more

IT security techniques - Competence requirements for information security testers and evaluators - Part 2: Knowledge, skills and effectiveness requirements for ISO/IEC 19790 testers

60.60 Standard published

DPS/KT 9 more

IT security techniques - Competence requirements for information security testers and evaluators - Part 3: Knowledge, skills and effectiveness requirements for ISO/IEC 15408 evaluators

60.60 Standard published

DPS/KT 9 more

Information technology -- Security techniques -- Information security risk management

60.60 Standard published

DPS/KT 224 more

IT Security techniques - Entity authentication - Part 2: Mechanisms using authenticated encryption

60.60 Standard published

DPS/KT 9 more

Information technology -- Security techniques -- Entity authentication -- Part 3: Mechanisms using digital signature techniques

60.60 Standard published

DPS/KT 9 more

Information technology — Security techniques — Modes of operation for an n-bit block cipher

60.60 Standard published

DPS/KT 9 more

Information technology — Security techniques — Hash-functions — Part 1: General

60.60 Standard published

DPS/KT 9 more

Information technology — Security techniques — Hash-functions — Part 2: Hash-functions using an n-bit block cipher

60.60 Standard published

DPS/KT 9 more

Information technology — Security techniques — Hash-functions — Part 4: Hash-functions using modular arithmetic

60.60 Standard published

DPS/KT 9 more

Information technology — Security techniques — Key management — Part 1: Framework

60.60 Standard published

DPS/KT 9 more

Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques

60.60 Standard published

DPS/KT 9 more

Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques — Amendment 1: Blinded Diffie-Hellman key agreement

60.60 Standard published

DPS/KT 9 more

Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets

60.60 Standard published

DPS/KT 9 more

Information technology — Security techniques — Key management — Part 5: Group key management

60.60 Standard published

DPS/KT 9 more