Information technology - Security techniques - Digital signatures with appendix - Part 2: Identity-based mechanisms (0)

by ISOIEC