Information technology -- Security techniques -- Entity authentication -- Part 4: Mechanisms using a cryptographic check function -- Technical Corrigendum 1— 2 стр.
Information technology -- Security techniques -- Entity authentication -- Part 6: Mechanisms using manual data transfer -- Technical Corrigendum 1— 2 стр.