Tech-invite3GPPspecsGlossariesIETFRFCsGroupsSIPABNFsWorld Map



 

Here   Top   Up   Prev   Next
1…   6…   A…   G…

 

 

A  Trust model [R6]PDF-p. 41
B  Security threats [R6]PDF-p. 42
C (Normative)  MBMS security requirements [R6]PDF-p. 45
D (Normative)  UICC-ME interface [R6]PDF-p. 48
E  MIKEY features not used in MBMS [R6]PDF-p. 50
F (Normative)  MRK key derivation for ME based MBMS key management [R6]PDF-p. 51

Up   Top   ToC