Search
×
FR

Placeholder headline

This is just a placeholder headline

API Technical Report TDB-6 Chapter 6 – Density

$

204

BUY NOW

Placeholder headline

This is just a placeholder headline

API STD 560: Fired Heaters for General Refinery Services

$

721

BUY NOW

Placeholder headline

This is just a placeholder headline

API STD 64: Diverter Equipment Systems

$

324

BUY NOW

Placeholder headline

This is just a placeholder headline

API MPMS CH 17.10.1: Refrigerated Light Hydrocarbon Fluids – Measurement of Cargoes on Board LNG Carries

$

417

BUY NOW

Placeholder headline

This is just a placeholder headline

API RP 13B-1: Testing Water-based Drilling Fluids

$

418

BUY NOW

Placeholder headline

This is just a placeholder headline

API Technical Report TDB-12 Chapter 12 – Thermal Conductivity

$

214

BUY NOW

Placeholder headline

This is just a placeholder headline

API 16FI Frac Iron Guidelines and Requirements

$

129

BUY NOW

ISO 29150:2011

ISO 29150:2011 Information technology – Security techniques – Signcryption

CDN $351.00

SKU: ed4f9d809c04 Category:

Description

ISO/IEC 29150:2011 specifies four mechanisms for signcryption that employ public key cryptographic techniques requiring both the originator and the recipient of protected data to have their own public and private key pairs. The methods specified in ISO/IEC 29150:2011 have been designed to maximize the level of security and provide efficient processing of data. All the mechanisms defined have mathematical “proofs of security”, i.e. rigorous arguments supporting their security claims.

ISO/IEC 29150:2011 is not applicable to infrastructures for management of public keys which are defined in ISO/IEC 11770-1 and ISO/IEC 9594.

Edition

1

Published Date

2011-12-16

Status

PUBLISHED

Pages

53

Language Detail Icon

English

Format Secure Icon

Secure PDF

Abstract

ISO/IEC 29150:2011 specifies four mechanisms for signcryption that employ public key cryptographic techniques requiring both the originator and the recipient of protected data to have their own public and private key pairs. The methods specified in ISO/IEC 29150:2011 have been designed to maximize the level of security and provide efficient processing of data. All the mechanisms defined have mathematical "proofs of security", i.e. rigorous arguments supporting their security claims.

ISO/IEC 29150:2011 is not applicable to infrastructures for management of public keys which are defined in ISO/IEC 11770-1 and ISO/IEC 9594.

Previous Editions

Can’t find what you are looking for?

Please contact us at: