INCITS/ISO/IEC 11770-3 : 1999 : R2006
Current
Current
The latest, up-to-date edition.
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 3: MECHANISMS USING ASYMMETRIC TECHNIQUES
Available format(s)
Hardcopy , PDF
Language(s)
English
Published date
01-01-2006
Publisher
Foreword
1 Scope
2 Normative reference
3 Definitions
4 Symbols and abbreviations
5 Requirements
6 Secret key agreement
7 Secret key transport
8 Public key transport
Annex A (informative) Properties of key establishment
mechanisms
Annex B (informative) Examples of key establishment
mechanisms
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.