Information technology — Security techniques — Key management —Part 4: Mechanisms based on weak secretsTechnologi...