Projekt

Information technology - Security techniques - Key management - Part 4: Mechanisms based on weak secrets