Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets — Amendment 1: Unbalanced Password-Authenticated Key Agreement with Identity-Based Cryptosystems (UPAKA-IBC)
基于身份密码系统的非平衡密码认证密钥协议(UPAKA-IBC)
2019-09-06
ISO/IEC 11770-4-2017/AMD1-2019
Amendment 1 - Information technology - Security techniques - Key management - Part 4: Mechanisms based on weak secrets - Unbalanced Password-Authenticated Key Agreement with Identity-Based Cryptosystems (UPAKA-IBC)
修改件1.信息技术.安全技术.密钥管理.第4部分:基于弱秘密的机制.与基于身份的加密系统(UPAKA-IBC)的不平衡密码认证密钥协议
2019-09-06
GB/T 43779-2024
网络安全技术 基于密码令牌的主叫用户可信身份鉴别技术规范
Cybersecurity technology—Technical specification for caller identity authentication using crypto tokens
2024-04-25
GB/T 31504-2015
信息安全技术 鉴别与授权 数字身份信息服务框架规范
Information security technology—Authentication and authorization—Digital identity information service framework specification
2015-05-15
GB/Z 24294.3-2017
信息安全技术 基于互联网电子政务信息安全实施指南 第3部分:身份认证与授权管理
Information security technology—Guide of implementation for Internet-based e-government information security—Part 3: Identity authentication and authorization
2017-05-31
GB/T 25062-2010
信息安全技术 鉴别与授权 基于角色的访问控制模型与管理规范
Information security technology - Authentication and authorization - Role-based access control model and management specification