KSISOIEC11770-4:2017/AMD2
Information technology - Security techniques - Key management Part 4: Mechanisms based on weak secrets AMENDMENT 2: Leakage-resilient password-authenticated key agreement with additional stored s
Number of Pages:39
-
Kes 5,407.00