31. Information technology. Security techniques. Digital signature schemes giving message recovery. Mechanisms using a hash-function Part 2, (15th December 1998) Authors: British Standards Institution, Record Type: Book Extent: 1 online resource (24 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
32. Information technology. Security techniques. Digital signatures with appendix. General Part 1, (15th April 1999) Authors: British Standards Institution, Record Type: Book Extent: 1 online resource (20 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
33. Information technology. Security techniques. Entity authentication mechanisms. General Part 1, (15th December 1998) Authors: British Standards Institution, Record Type: Book Extent: 1 online resource (16 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
34. Information technology. Security techniques. Non-repudiation. Mechanisms using asymmetric techniques Part 3, (15th December 1998) Authors: British Standards Institution, Record Type: Book Extent: 1 online resource (16 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
35. Information technology. Security techniques. Modes of operation for an n -bit block cipher. (15th December 1998) Authors: British Standards Institution, Record Type: Book Extent: 1 online resource (22 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
36. Information technology. Security techniques. Non-repudiation. General Part 1, (15th December 1998) Authors: British Standards Institution, Record Type: Book Extent: 1 online resource (24 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
37. Information technology. Security techniques. Hash-functions. Dedicated hash-functions Part 3, (15th December 1998) Authors: British Standards Institution, Record Type: Book Extent: 1 online resource (46 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
38. Data cryptographic techniques. Data integrity mechanism using a cryptographic check function employing a block cipher algorithm. (31st October 1990) Authors: British Standards Institution, Record Type: Book Extent: 1 online resource (9 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
39. Information technology. Security techniques. Data integrity mechanism using a cryptographic check function employing a block cipher algorithm. (15th November 1994) Authors: British Standards Institution, Record Type: Book Extent: 1 online resource (18 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
40. Information technology. Security techniques. Digital signatures with appendix. Identity-based mechanisms Part 2, (15th March 2000) Authors: British Standards Institution, Record Type: Book Extent: 1 online resource (22 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗