KSISOIEC11770-4:2017/AMD2

Information technology - Security techniques - Key management Part 4: Mechanisms based on weak secrets AMENDMENT 2: Leakage-resilient password-authenticated key agreement with additional stored s

Number of Pages:39

  • Kes 5,407.00