Information technology. Security techniques. Key management. Mechanisms using asymmetric techniques Part 3, (15th January 2000)