DS ISO/IEC 11770-2 : 2008 COR 1 2009
Current
Current
The latest, up-to-date edition.
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 2: MECHANISMS USING SYMMETRIC TECHNIQUES
Published date
12-01-2013
Publisher
Sorry this product is not available in your region.
Describes procedures for handling cryptographic keying material to be used in symmetric or asymmetric cryptographic algorithms according to the security policy in force.
Committee |
DS/S-441
|
DocumentType |
Standard
|
PublisherName |
Danish Standards
|
Status |
Current
|
SupersededBy |
Standards | Relationship |
ISO/IEC 11770-2:2008 | Identical |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.