
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NON-REPUDIATION - PART 3: MECHANISMS USING ASYMMETRIC TECHNIQUES
出版:International Organization for Standardization

专家解读视频
Describes mechanisms for the provision of specific, communication related, non-repudiation services using asymmetric cryptographic techniques.
NEN ISO/IEC 13888-3 : 2010 - Identical
INCITS/ISO/IEC 13888-3 : 2010 - Identical
CSA ISO/IEC 13888-3 : 2010 - Identical
SANS 13888-3 : 2ED 2010 - Identical
DS ISO/IEC 13888-3 : 2010 - Identical
BS ISO/IEC 13888-3 : 1997 - Identical
CSA ISO/IEC 13888-3 : 2010 : R2015 - Identical
CSA ISO/IEC 13888-3 : 2010 - Identical
PN ISO/IEC 13888-3 : 1999 - Identical
SAC GB/T 17903-3 : 1999 - Identical
DS ISO/IEC 13888-3 : 2010 - Identical
NEN ISO/IEC 13888-3 : 2010 - Identical
INCITS/ISO/IEC 13888-3 : 2010 - Identical
CSA ISO/IEC 13888-3 : 2010 - Identical
BS ISO/IEC 13888-3 : 1997 - Identical