Tech-invite3GPPspecsGlossariesIETFRFCsGroupsSIPABNFsWorld Map



 

Here   Top   Up   Prev   None
1…   6…   A…   G…

 

 

G (Normative)  HTTP based key management messages [R6]PDF-p. 52
H  Signalling flows for MSK procedures [R6]PDF-p. 56Up
I  Example of using MSKs and MTKs in MBMS [R6]PDF-p. 60
J  Mapping the MBMS security requirements into security functions and mechanism [R6]PDF-p. 61
K  SRTP features not used in MBMS [R7]PDF-p. 65
L (Normative)  Multicasting MBMS user data on Iub [R8]PDF-p. 66
M  Relation to IMS based MBMS user services [R8]PDF-p. 67
N (Normative)  GCSE security aspects [R12]PDF-p. 68
O (Normative)  Security aspects of xMB reference point between Content Provider and BM-SC [R14]PDF-p. 70
P  Change historyPDF-p. 71

Up   Top