Information technology - Security techniques - Key management - Part 4: Mechanisms based on weak secrets
Document status: Active
Information technology - Security techniques - Key management - Part 4: Mechanisms based on weak secrets - Corrigendum 1
Document status: Active
Corrigendum 1 - Information technology -- Security techniques -- Key management -- Part 4: Mechanisms based on weak secrets -
Document status: Active
Information technology - Security techniques - Key management - Part 5: Group key management
Document status: Active
Information security - Key management - Part 5: Group key management
Document status: Active
Information security - Key management - Part 7: Cross-domain password-based authenticated key exchange
Document status: Active
Information technology - Generic cabling for customer premises - Part 1: General requirements
Document status: Active
Information technology - Generic cabling for customer premises - Part 2: Office premises
Document status: Active
Information technology - Generic cabling for customer premises
Document status: Active