IT Security techniques — Entity authentication —Part 3: Mechanisms using digital signature techniquesTechniques de...