Tech-
invite
3GPP
space
IETF
space
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TS 33.220
Word version: 18.3.0
1…
4…
4.4…
4.5…
5…
B…
D…
I…
J…
M…
N…
D
Dialog example for user selection of UICC application used in GBA
E
TLS profile for securing Zn/Zn' reference points
F
Handling of TLS certificates
G
GBA_U UICC-ME interface
G.1
GBA_U Bootstrapping procedure
G.2
GBA_U NAF Derivation procedure
H
Ua security protocol identifier
H.1
Definition
H.2
Organization Octet
H.3
Ua security protocol identifiers for 3GPP specified protocols
...
D
Dialog example for user selection of UICC application used in GBA
p. 47
E
(Normative) TLS profile for securing Zn/Zn' reference points
p. 48
F
Handling of TLS certificates
p. 49
G
(Normative) GBA_U UICC-ME interface
p. 50
G.1
GBA_U Bootstrapping procedure
p. 50
G.2
GBA_U NAF Derivation procedure
p. 50
H
(Normative) Ua security protocol identifier
p. 52
H.1
Definition
p. 52
H.2
Organization Octet
p. 52
H.3
Ua security protocol identifiers for 3GPP specified protocols
p. 52