IEC - International Electrotechnical Commission - ISO/IEC 9798-2:2008/COR2:2012

Corrigendum 2 - Information technology -- Security techniques -- Entity authentication -- Part 2: Mechanisms using symmetric encipherment algorithms -

revised
Buy Now
Organization: IEC - International Electrotechnical Commission
Publication Date: 5 March 2012
Status: revised
Page Count: 2
ICS Code (IT Security): 35.030

Document History

June 5, 2019
IT Security techniques - Entity authentication - Part 2: Mechanisms using authenticated encryption
This document specifies entity authentication mechanisms using authenticated encryption algorithms. Four of the mechanisms provide entity authentication between two entities where no trusted third...
February 13, 2013
Corrigendum 3 - Information technology -- Security techniques -- Entity authentication -- Part 2: Mechanisms using symmetric encipherment algorithms -
A description is not available for this item.
ISO/IEC 9798-2:2008/COR2:2012
March 5, 2012
Corrigendum 2 - Information technology -- Security techniques -- Entity authentication -- Part 2: Mechanisms using symmetric encipherment algorithms -
A description is not available for this item.
Corrigendum 1 - Information technology -- Security techniques -- Entity authentication -- Part 2: Mechanisms using symmetric encipherment algorithms -
A description is not available for this item.
December 9, 2008
Information technology -- Security techniques -- Entity authentication -- Part 2: Mechanisms using symmetric encipherment algorithms
ISO/IEC 9798-2:2008 specifies entity authentication mechanisms using symmetric encipherment algorithms. Four of the mechanisms provide entity authentication between two entities where no trusted...
July 22, 1999
Information technology -- Security techniques -- Entity authentication -- Part 2: Mechanisms using symmetric encipherment algorithms
A description is not available for this item.
Advertisement