Published
This part of prEN 1546 defines the detailed security architecture for IEP systems as they are described in prEN 1546-1. It also describes the application protocols the use of cryptographic algorithms and some underlying assumptions concerning the key management necessary to implement IEP systems with sufficient security levels. The general architecture described here allows many types of implementation. It should be noted that the informative annexes of this standard focus on particular implementations.
PUBLISHED
SSH EN 1546-2:2006
60.60
Standard published
May 1, 2006
Only informative sections of projects are publicly available. To view the full content, you will need to members of the committee. If you are a member, please log in to your account by clicking on the "Log in" button.