ISO/IEC 9594-8:2014/Cor 2:2016
Information technology — Open Systems Interconnection — The Directory — Part 8: Public-key and attribute certificate frameworks — Technical Corrigendum 2
1) Correction of the defects reported in defect report 406
2) Correction of the defects reported in defect report 407
6.1 Digital signatures
6.2 Public-key cryptography and cryptographic algorithms
6.2.1 Formal specification of public-key cryptography
6.2.2 Formal definitions of cryptographic algorithms
3) Correction of the defects reported in defect report 408
4) Correction of the defects reported in defect report 409
5) Correction of the defects reported in defect report 410
6) Correction of the defects reported in defect report 411
7) Correction of the defects reported in defect report 412
8) Correction of the defects reported in defect report 413
7.11 Uniqueness of names
7.12 Indirect CRLs
7.12.1 Introduction
7.12.2 Indirect CRL contents
9) Correction of the defects reported in defect report 414
10) Correction of the defects reported in defect report 415
11) Correction of the defects reported in defect report 416
12) Correction of the defects reported in defect report 417
13) Correction of the defects reported in defect report 418
14) Correction of the defects reported in defect report 419
15) Correction of the defects reported in defect report 420
Previous versions
Related Information
Similar Standards
-
BS EN 12834:2003
Road transport and traffic telematics. Dedicated Short Range Communication (DSRC). DSRC application layer
-
BS EN 13757-1:2021
Communication systems for meters, Data exchange
-
BS EN 13757-1:2021 - TC
Tracked Changes. Communication systems for meters, Data exchange
-
BS EN 13757-3:2013
Communication systems for and remote reading of meters, Dedicated application layer
1) Correction of the defects reported in defect report 406
2) Correction of the defects reported in defect report 407
6.1 Digital signatures
6.2 Public-key cryptography and cryptographic algorithms
6.2.1 Formal specification of public-key cryptography
6.2.2 Formal definitions of cryptographic algorithms
3) Correction of the defects reported in defect report 408
4) Correction of the defects reported in defect report 409
5) Correction of the defects reported in defect report 410
6) Correction of the defects reported in defect report 411
7) Correction of the defects reported in defect report 412
8) Correction of the defects reported in defect report 413
7.11 Uniqueness of names
7.12 Indirect CRLs
7.12.1 Introduction
7.12.2 Indirect CRL contents
9) Correction of the defects reported in defect report 414
10) Correction of the defects reported in defect report 415
11) Correction of the defects reported in defect report 416
12) Correction of the defects reported in defect report 417
13) Correction of the defects reported in defect report 418
14) Correction of the defects reported in defect report 419
15) Correction of the defects reported in defect report 420