
【国际标准】 Amendment 2 - Information technology - Security techniques - Key management - Part 4: Mechanisms based on weak secrets - Leakage-resilient password-authenticated key agreement with additional stored secrets
本网站 发布时间:
2025-01-04
开通会员免费在线看70000余条国内标准,赠送文本下载次数,单本最低仅合13.3元!还可享标准出版进度查询、定制跟踪推送、标准查新等超多特权!  
查看详情>>

适用范围:
暂无
标准号:
ISO/IEC 11770-4:2017/AMD2:2021 EN
标准名称:
Amendment 2 - Information technology - Security techniques - Key management - Part 4: Mechanisms based on weak secrets - Leakage-resilient password-authenticated key agreement with additional stored secrets
英文名称:
Amendment 2 - Information technology - Security techniques - Key management - Part 4: Mechanisms based on weak secrets - Leakage-resilient password-authenticated key agreement with additional stored secrets标准状态:
现行-
发布日期:
2021-02-02 -
实施日期:
出版语种:
EN
- 其它标准
- 上一篇: ISO/IEC 11770-4:2017/AMD1:2019 EN f946ac63 Amendment 1 - Information technology - Security techniques - Key management - Part 4: Mechanisms based on weak secrets - Unbalanced Password-Authenticated Key Agreement with Identity-Based Cryptosystems (UPAKA-IBC)
- 下一篇: ISO/IEC 11770-5:2011 EN 298b3685 Information technology — Security techniques — Key management — Part 5: Group key management
- 推荐标准
- ISO/IEC 23264-1:2021 EN 91702f31 Information security - Redaction of authentic data - Part 1: General
- ISO/IEC 23264-2:2024 EN 82415c1d Information security — Redaction of authentic data — Part 2: Redactable signature schemes based on asymmetric mechanisms
- ISO/IEC 23837-2:2023 EN 5b96fefc Information security - Security requirements, test and evaluation methods for quantum key distribution - Part 2: Evaluation and testing methods
- ISO/IEC 24745:2022 EN 71bb9d75 Information security, cybersecurity and privacy protection - Biometric information protection
- ISO/IEC 24745:2022 EN d59ff202 Information security, cybersecurity and privacy protection — Biometric information protection
- ISO/IEC 24759:2025 EN 40ed81d8 Information security, cybersecurity and privacy protection - Test requirements for cryptographic modules
- ISO/IEC 24760-1:2019 EN 1a902ac9 IT Security and Privacy - A framework for identity management - Part 1: Terminology and concepts
- ISO/IEC 24760-1:2019/AMD1:2023 EN 0ada0ed2 Amendment 1 - IT Security and Privacy - A framework for identity management - Part 1: Terminology and concepts
- ISO/IEC 24760-2:2015 EN 825436f1 Information technology — Security techniques — A framework for identity management — Part 2: Reference architecture and requirements
- ISO/IEC 24760-3:2016 EN 36ea54f5 Information technology — Security techniques — A framework for identity management — Part 3: Practice
- ISO/IEC 24760-3:2016/AMD1:2023 EN a2c107f8 Amendment 1 - Information technology - Security techniques - A framework for identity management - Part 3: Practice - Identity Information Lifecycle processes
- ISO/IEC 26131:2024 EN 2255e816 Information technology - OpenID connect - OpenID connect core 1.0 incorporating errata set 2
- ISO/IEC 26131:2024 EN 5c84e316 Information technology — OpenID connect — OpenID connect core 1.0 incorporating errata set 2
- ISO/IEC 26132:2024 EN f12732ba Information technology - OpenID connect - OpenID connect discovery 1.0 incorporating errata set 2
- ISO/IEC 26134:2024 EN 1bacaede Information technology - OpenID connect - OpenID connect RP-initiated logout 1.0