Information technology. Security techniques. Anonymous entity authentication - Mechanisms based on weak secrets from other stores
-
Information technology. Securi...
Information technology. Security techniques. Anonymous entity authentication -...
Information technology. Security techniques. Anonymous entity authentication - Mechanisms based on signatures using a group public key
more
-
Information technology. Securi...
Information technology. Security techniques. Entity authentication mechanisms ...
Information technology. Security techniques. Entity authentication mechanisms - Entity authentication using a public key algorithm
more
-
BS ISO/IEC 11770-4:2017+A2:202...
Information technology. Security techniques. Key management. Mechanisms based ...
Information technology. Security techniques. Key management. Mechanisms based on weak secrets|Data management, Data storage protection, Information exchange, Data security, Data processing
more
-
BS ISO/IEC 20009-1:2013
Information technology. Security techniques. Anonymous entity authentication. ...
Information technology. Security techniques. Anonymous entity authentication. General|Data processing, Computer technology, Management, Data storage protection, Computer networks, Anti-burglar measures, Data security, Information exchange, Computers
more
Items per page