Information technology. Security techniques. Non-repudiation. Mechanisms using asymmetric techniques Part 3, (15th December 1998)