iso file download
BSISO/IEC13888-2:2010 December BSiStandardsPublication Information technology - Security techniques - Non-repudiation Part 2: Mechanisms using symmetric techniques bsi. ..making excellence a habit' BS ISO/IEC 13888-2:2010 BRITISH STANDARD National foreword This British Standard is the UK implementation of IS0/IEC 13888-2:2010, incorporating Corrigendum December 2012. It supersedes BS IS0/IEC 13888-2:1998, which is withdrawn. The start and finish of text introduced or altered by corrigendum is indicated in the text by tags. Text altered by ISO/IEC corrigendum December 2012 is indicated in the text by [Aci) (Aci]. The UK participation in its preparation was entrusted to Technical Committee IST/33, IT - Security techniques. A list of organizations represented on this committee can be obtained on request to its secretary. This publication does not purport to include all the necessary provisions of a contract. Users are responsible for its correct application. @ The British Standards Institution 2013. Published by BSI Standards Limited 2013. ISBN9780580791314 ICS 35.040 Compliance with a British Standard cannot confer immunity from legal obligations. This British Standard was published under the authority of the Standards Policy and Strategy Committee on 28 February 2011. Amendments/corrigenda issued since publication Date Text affected 31 January 2013 Implementation of ISO/IEC corrigendum December 2012 ISO/IEC INTERNATIONAL STANDARD 13888-2 Secondedition 2010-12-15 InformationtechnologySecurity techniquesNon-repudiation- Part 2: Mechanismsusingsymmetrictechniques TechnologiesdeI'information-Techniquesde securite-Non- repudiation Partie2:Mecanismesutilisant des techniques symetriques Referencenumber ISO/IEC13888-2:2010(E) IEC ISO/IEC2010

.pdf文档 ISO IEC 13888-2 2010 Information technology — Security techniques — Non-repudiation — Part 2 Mechanisms using symmetric techniques

文档预览
中文文档 26 页 50 下载 1000 浏览 0 评论 309 收藏 3.0分
温馨提示:本文档共26页,可预览 3 页,如浏览全部内容或当前文档出现乱码,可开通会员下载原始文档
ISO IEC 13888-2 2010 Information technology — Security techniques — Non-repudiation — Part 2  Mechanisms using symmetric techniques 第 1 页 ISO IEC 13888-2 2010 Information technology — Security techniques — Non-repudiation — Part 2  Mechanisms using symmetric techniques 第 2 页 ISO IEC 13888-2 2010 Information technology — Security techniques — Non-repudiation — Part 2  Mechanisms using symmetric techniques 第 3 页
下载文档到电脑,方便使用
本文档由 人生无常 于 2024-08-31 15:51:57上传分享
站内资源均来自网友分享或网络收集整理,若无意中侵犯到您的权利,敬请联系我们微信(点击查看客服),我们将及时删除相关资源。