Information technology -- Security techniques -- Time-stamping services -- Part 3: Mechanisms producing linked tokens
- describes a general model for time-stamping services producing linked tokens,
- describes the basic components used to construct a time-stamping service producing linked tokens,
- defines the data structures used to interact with a time-stamping service producing linked tokens,
- describes specific instances of time-stamping services producing linked tokens, and
defines a protocol to be utilized by time-stamping services producing linked tokens for the purpose of extending linked tokens to published values.
|Publication type||International Standard|
|TC/SC||ISO/IEC JTC 1/SC 27 - Information security, cybersecurity and privacy protectionrss|
|ICS||35.030 - IT Security|
|File size||351 KB|
The following test report forms are related:
Share your publications
Learn how to share your publications with your colleagues, using networking options.
Our prices are in Swiss francs (CHF). We accept all major credit cards (American Express, Mastercard and Visa), PayPal and bank transfers as form of payment.
Keep in touch
Keep up to date with new publication releases and announcements with our free IEC Just Published email newsletter.
Contact customer services
Please send your enquiry by email or call us on +41 22 919 02 11 between 09:00 – 17:00 CET Monday to Friday.