Search results

Search list

Results in:

1-3 of 3 results

Information security - Redaction of authentic data - Part 2: Redactable signature schemes based on asymmetric mechanisms

Processes, data elements and documents in commerce, industry and administration - Long term signature - Part 3: profiles for PDF Advanced Electronic Signatures (PAdES)

Information technology - Automatic identification and data capture techniques - Digital signature data structure schema - Amendment 1: Domain authority identifier (DAID) specification for the GS1 legal entity identifier and encoding clarifications

TOP