ZH
RU
ES
Information technology . security techniques . key management . part 2
Information technology . security techniques . key management . part 2, Total:19 items.
In the international standard classification, Information technology . security techniques . key management . part 2 involves: Character sets and information coding.
American National Standards Institute (ANSI), Information technology . security techniques . key management . part 2
- ISO/IEC 11770-2:2008/Cor1:2009 Information technology - Security techniques - Key management - Part 2: Mechanisms using symmetric techniques - Corrigendum 1
International Organization for Standardization (ISO), Information technology . security techniques . key management . part 2
- ISO/IEC 11770-2:2008 Information technology - Security techniques - Key management - Part 2: Mechanisms using symmetric techniques
- ISO/IEC 11770-2:1996 Information technology - Security techniques - Key management - Part 2: Mechanisms using symmetric techniques
- ISO/IEC 11770-2:1996/Cor 1:2005 Information technology - Security techniques - Key management - Part 2: Mechanisms using symmetric techniques; Technical Corrigendum 1
- ISO/IEC 11770-2:2008/Cor 1:2009 Information technology - Security techniques - Key management - Part 2: Mechanisms using symmetric techniques; Technical Corrigendum 1
未注明发布机构, Information technology . security techniques . key management . part 2
- ISO/IEC 11770-2:2018 IT Security techniques — Key management — Part 2: Mechanisms using symmetric techniques
VN-TCVN, Information technology . security techniques . key management . part 2
- TCVN 7817-2-2010 Information technology.Security techniques.Key management.Part 2: Mechanisms using symmetric techniques
KP-CSK, Information technology . security techniques . key management . part 2
- KPS 10877-2-2002 Information technology-Security techniques-Key management-Part 2:Mechanisms using symmetric techniques
Danish Standards Foundation, Information technology . security techniques . key management . part 2
- DS/ISO/IEC 11770-2/Corr. 1:2009 Information technology - Security techniques - Key management - Part 2: Mechanisms using symmetric techniques
- DS/ISO/IEC 11770-2:2008 Information technology - Security techniques - Key management - Part 2: Mechanisms using symmetric techniques
ANSI - American National Standards Institute, Information technology . security techniques . key management . part 2
- INCITS/ISO/IEC 11770-2:1996 Information technology - Security techniques - Key management - Part 2: Mechanisms using symmetric techniques
Canadian Standards Association (CSA), Information technology . security techniques . key management . part 2
- CSA ISO/IEC 11770-2-09-CAN/CSA:2009 Information technology ?Security techniques ?Key management ?Part 2: Mechanisms using symmetric techniques
- CAN/CSA-ISO/IEC 11770-2:2009 Information technology - Security techniques - Key management - Part 2: Mechanisms using symmetric techniques (Incorporates Corrigendum 1: December 2010)
- CSA ISO/IEC 11770-2-01:2001 Information Technology - Security Techniques - Key Management - Part 2: Mechanisms Using Symmetric Techniques ISO/IEC 11770-2: 1996; Technical Corrigendum 1:2006
Korean Agency for Technology and Standards (KATS), Information technology . security techniques . key management . part 2
ZA-SANS, Information technology . security techniques . key management . part 2
- SANS 11770-2:2004 Information technology — Security techniques — Key management Part 2: Mechanisms using symmetric techniques
- SANS 11770-2:2008 Information Technology - Security techniques - Key management Part 2: Mechanisms using symmetric techniques
Japanese Industrial Standards Committee (JISC), Information technology . security techniques . key management . part 2
- JIS X 5058-2:1998 Information technology -- Security techniques -- Key management -- Part 2: Mechanisms using symmetric techniques