Registration number (WIID)Project No.TitleStatus
25290ISO/IEC 11770-2:1996Information technology — Security techniques — Key management — Part 2: Mechanisms using symmetric techniquesAtcelts
42715ISO/IEC 11770-2:1996/Cor 1:2005Information technology — Security techniques — Key management — Part 2: Mechanisms using symmetric techniques — Technical Corrigendum 1Atcelts
46370ISO/IEC 11770-2:2008Information technology — Security techniques — Key management — Part 2: Mechanisms using symmetric techniquesAtcelts
53473ISO/IEC 11770-2:2008/Cor 1:2009Information technology — Security techniques — Key management — Part 2: Mechanisms using symmetric techniques — Technical Corrigendum 1Atcelts
73207ISO/IEC 11770-2:2018IT Security techniques — Key management — Part 2: Mechanisms using symmetric techniquesStandarts spēkā
25537ISO/IEC 11770-3:1999Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniquesAtcelts
46542ISO/IEC 11770-3:2008Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniquesAtcelts
53474ISO/IEC 11770-3:2008/Cor 1:2009Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques — Technical Corrigendum 1Atcelts
60237ISO/IEC 11770-3:2015Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniquesAtcelts
71113ISO/IEC 11770-3:2015/Amd 1:2017Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques — Amendment 1: Blinded Diffie-Hellman key agreementAtcelts
Displaying 31-40 of 774 results.