Information technology. Security techniq
โฆ LIBER โฆ
๐
Information technology -- Security techniques -- Key management -- Part 4: Mechanisms based on weak secrets
- Publisher
- ISO
- Year
- 2006
- Leaves
- 38
- Edition
- 1
- Category
- Scientific
โฌ Acquire This Volume
No coin nor oath required. For personal study only.
๐ SIMILAR VOLUMES
Information technology. Security techniq
Information technology. Security techniq
Information technology -- Security techn
Information technology -- Security techn
Information technology -- Security techn