ZH

RU

ES

Information technology . security techniques . key management . part 2

Information technology . security techniques . key management . part 2, Total:19 items.

In the international standard classification, Information technology . security techniques . key management . part 2 involves: Character sets and information coding.


American National Standards Institute (ANSI), Information technology . security techniques . key management . part 2

  • ISO/IEC 11770-2:2008/Cor1:2009 Information technology - Security techniques - Key management - Part 2: Mechanisms using symmetric techniques - Corrigendum 1

International Organization for Standardization (ISO), Information technology . security techniques . key management . part 2

  • ISO/IEC 11770-2:2008 Information technology - Security techniques - Key management - Part 2: Mechanisms using symmetric techniques
  • ISO/IEC 11770-2:1996 Information technology - Security techniques - Key management - Part 2: Mechanisms using symmetric techniques
  • ISO/IEC 11770-2:1996/Cor 1:2005 Information technology - Security techniques - Key management - Part 2: Mechanisms using symmetric techniques; Technical Corrigendum 1
  • ISO/IEC 11770-2:2008/Cor 1:2009 Information technology - Security techniques - Key management - Part 2: Mechanisms using symmetric techniques; Technical Corrigendum 1

未注明发布机构, Information technology . security techniques . key management . part 2

  • ISO/IEC 11770-2:2018 IT Security techniques — Key management — Part 2: Mechanisms using symmetric techniques

VN-TCVN, Information technology . security techniques . key management . part 2

  • TCVN 7817-2-2010 Information technology.Security techniques.Key management.Part 2: Mechanisms using symmetric techniques

KP-CSK, Information technology . security techniques . key management . part 2

  • KPS 10877-2-2002 Information technology-Security techniques-Key management-Part 2:Mechanisms using symmetric techniques

Danish Standards Foundation, Information technology . security techniques . key management . part 2

  • DS/ISO/IEC 11770-2/Corr. 1:2009 Information technology - Security techniques - Key management - Part 2: Mechanisms using symmetric techniques
  • DS/ISO/IEC 11770-2:2008 Information technology - Security techniques - Key management - Part 2: Mechanisms using symmetric techniques

ANSI - American National Standards Institute, Information technology . security techniques . key management . part 2

  • INCITS/ISO/IEC 11770-2:1996 Information technology - Security techniques - Key management - Part 2: Mechanisms using symmetric techniques

Canadian Standards Association (CSA), Information technology . security techniques . key management . part 2

  • CSA ISO/IEC 11770-2-09-CAN/CSA:2009 Information technology ?Security techniques ?Key management ?Part 2: Mechanisms using symmetric techniques
  • CAN/CSA-ISO/IEC 11770-2:2009 Information technology - Security techniques - Key management - Part 2: Mechanisms using symmetric techniques (Incorporates Corrigendum 1: December 2010)
  • CSA ISO/IEC 11770-2-01:2001 Information Technology - Security Techniques - Key Management - Part 2: Mechanisms Using Symmetric Techniques ISO/IEC 11770-2: 1996; Technical Corrigendum 1:2006

Korean Agency for Technology and Standards (KATS), Information technology . security techniques . key management . part 2

ZA-SANS, Information technology . security techniques . key management . part 2

  • SANS 11770-2:2004 Information technology — Security techniques — Key management Part 2: Mechanisms using symmetric techniques
  • SANS 11770-2:2008 Information Technology - Security techniques - Key management Part 2: Mechanisms using symmetric techniques

Japanese Industrial Standards Committee (JISC), Information technology . security techniques . key management . part 2

  • JIS X 5058-2:1998 Information technology -- Security techniques -- Key management -- Part 2: Mechanisms using symmetric techniques




Copyright ©2007-2023 ANTPEDIA, All Rights Reserved