Information technology - Security Techniques - Entity authentication mechanisms - Part 3: Entitiy authentication using a public key algorithm (1993)

by ISOIEC
Venue:Adams Standards Track [Page 36] 2025 SPKM