UNLIMITED FREE ACCESS TO THE WORLD'S BEST IDEAS

SUBMIT
Already a GlobalSpec user? Log in.

This is embarrasing...

An error occurred while processing the form. Please try again in a few minutes.

Customize Your GlobalSpec Experience

Finish!
Privacy Policy

This is embarrasing...

An error occurred while processing the form. Please try again in a few minutes.

ISO/IEC 11770-2

Information Technology - Security Techniques - Key Management - Part 2: Mechanisms Using Symmetric Techniques

inactive
Buy Now
Organization: ISO
Publication Date: 15 July 2005
Status: inactive
Page Count: 21
ICS Code (Information coding): 35.040

Document History

October 1, 2018
IT Security techniques - Key management - Part 2: Mechanisms using symmetric techniques
This document defines key establishment mechanisms using symmetric cryptographic techniques. This document addresses three environments for the establishment of keys: Point-to-Point, Key...
September 15, 2009
Information technology - Security techniques - Key management - Part 2: Mechanisms using symmetric techniques TECHNICAL CORRIGENDUM 1
The purpose of key management is to provide procedures for handling cryptographic keying material to be used in symmetric or asymmetric cryptographic algorithms according to the security policy in...
June 15, 2008
Information technology - Security techniques - Key management - Part 2: Mechanisms using symmetric techniques
The purpose of key management is to provide procedures for handling cryptographic keying material to be used in symmetric or asymmetric cryptographic algorithms according to the security policy in...
ISO/IEC 11770-2
July 15, 2005
Information Technology - Security Techniques - Key Management - Part 2: Mechanisms Using Symmetric Techniques
A description is not available for this item.
April 15, 1996
Information Technology - Security Techniques - Key Management - Part 2: Mechanisms Using Symmetric Techniques
A description is not available for this item.
Advertisement