Information technology. Security techniques. Non-repudiation. Mechanisms using symmetric techniques Part 2, (15th October 1998)