Recommendation for key management Part 1: General
Saved in:
Main Author: | Barker, Elaine B. |
---|---|
Other Authors: | National Institute of Standards and Technology (U.S.) |
Format: | Electronic |
Language: | English |
Published: |
[Gaithersburg, MD] :
National Institute of Standards and Technology, Technology Administration,
[2006]
|
Physical Description: |
141 pages : digital, PDF file. |
Edition: | Rev. |
Series: |
NIST special publication. Computer security ;
800-57. |
Subjects: |
In Prospector
Similar Items
-
Recommendation for key management. Part 2 best practices for key management organization
by: Barker, Elaine B.
Published: (2007) -
Recommendation for pair-wise key establishment schemes using discrete logarithm cryptography
by: Barker, Elaine B.
Published: (2006) -
Recommendation for key management. Part 3 application-specific key management guidance
by: Barker, Elaine B.
Published: (2008) -
Cryptographic key management workshop summary, June 8-9, 2009
by: Barker, Elaine B.
Published: (2010) -
Cryptographic key management workshop summary, June 8-9, 2009 (draft)
by: Barker, Elaine B.
Published: (2009)