GB/T 15843.5-2005
ActiveInformation technology-Security techniques-Entity authentication-Part 5:Mechanisms using zero knowledge techniques
信息技术 安全技术 实体鉴别 第5部分:使用零知识技术的机制
📋 Scope / 适用范围 ai_extracted
·····································,································································,·······⋯⋯1
📝 Foreword / 前言 ai_extracted
···············,············,··················································,,············,···················⋯⋯ 皿
📚 References & Relations / 引用与关联
normative_reference
EC 9798-1
normative_reference
GB 15851-1995
normative_reference
GB/T 15843
normative_reference
GB/T 15843.1-1999
normative_reference
GB/T 18238
normative_reference
IEC 10118
normative_reference
IEC 9796
normative_reference
IQUE 3.2
normative_reference
STEM 3.
🔗 Related Standards / 同类标准
GB/Z 20986-2007
Information security technology - Guidelines for the category and classification of information security incidents
GB/Z 24364-2009
Information security technology - Guidelines for information security risk management
GB/Z 25114.1-2010
ebXML based business message - Part 1: Core item
GB/Z 25114.2-2010
ebXML based business message - Party 2: Core party
GB/Z 29830.3-2013
Information technology - Security technology - A framework for IT security assurance - Part 3: Analysis of assurance methods
GB/Z 29830.2-2013
Information technology - Security technology - A framework for IT security assurance - Part 2: Assurance methods
GB/Z 29830.1-2013
Information technology - Security technology - A framework for IT security assurance - Part 1: Overview and framework
GB/Z 30286-2013
Information security technology—Guide for the production of information system protect profile and information system security target
Content extracted by AI. Not officially verified.