15/30297775 DC : 0
NA
Status of Standard is Unknown
Hardcopy , PDF
English
Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Symbols and abbreviated terms
5 Interindustry commands for security operations
Annex A (informative) - Examples of operations related
to digital signature
Annex B (informative) - Examples of certificates interpreted
by the card
Annex C (informative) - Examples of asymmetric key transfer
Annex D (informative) - Alternatives to achieve the reversible
change of security context
Annex E (informative) - Example of uses for GENERATE
ASYMMETRIC KEY PAIR command
Bibliography
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.