Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Symbols and abbreviated terms
5 Interindustry commands for security operations
Annex A (informative) - Examples of operations related
to digital signature
Annex B (informative) - Examples of certificates interpreted
by the card
Annex C (informative) - Examples of asymmetric key transfer
Annex D (informative) - Alternatives to achieve the reversible
change of security context
Annex E (informative) - Example of uses for generate asymmetric
key pair command
Bibliography