ISO/IEC-14888-3-AM2 › Complete Document History
Information technology - Security techniques - Digital signatures with appendix - Part 3: Certificate-based mechanisms - Amendment 2: Optimizing hash inputs
Obsolete Revision Information: |
2ND EDITION AMENDMENT 2 - AMENDMENT 2 FOR 2ND EDITION - July 1, 2012
|