We use cookies to enhance your browsing experience, serve personalized content, and analyze our traffic. Cookies are small files of information stored on your device that help us remember your preferences and improve your experience. By clicking ‘Accept All’, you consent to our use of cookies. You are able to reject all non-essential cookies or manage your preferences by . To learn more about our Online Digital and Cookie Notice,
click here.
Cookie Preference Center
Veuillez gérer vos choix de témoins en activant ou en désactivant les touches à bascule de consentement sous Objectifs ci-dessous.
Vous pouvez modifier vos préférences en tout temps, tel que décrit dans notre Politique sur les témoins. Politique de cookies
Information Technology - Security Techniques - Digital Signatures with Appendix - Part 2: Identity-Based Mechanisms (Adopted ISO/IEC 14888-2:1999, first edition, 1999-12-15)
Année de publication 2002
Publié par CSA Group
Confirmé(e) en 2006
Withdrawn
info Se connecter ou s’inscrire
Un compte d’utilisateur gratuit est requis pour lire ce document.
ISO/IEC 14888 specifies a variety of digital signature mechanisms with appendix for messages of arbitrary length and is applicable in schemes providing entity authentication, data origin authentication, non-repudiation, and integrity of data.
This part of ISO/IEC 14888 specifies the general structure and the fundamental procedures which constitute the signature and verification processes of an identity-based digital signature mechanism with appendix for messages of arbitrary length.
Login or Register
View Access for this document is only available for viewers in Canada