IT Security techniques — Key management —Part 2: Mechanisms using symmetric techniquesTechniques de sécurité IT...