Tech-invite3GPPspecsGlossariesIETFRFCsGroupsSIPABNFs   Ti+SearchTech-invite World Map Symbol

 

Top   Up   Prev   Next
1…   6…   A…   G…

 

 

6  Security mechanisms [R6]PDF-p. 18
6.1  Using GBA for MBMS
6.2  Authentication and authorisation of a userPDF-p. 19Up
6.3  Key management proceduresPDF-p. 20
6.4  MIKEY message creation and processing in the MEPDF-p. 30
6.5  Validation and key derivation functions in MGV-F
6.6  Protection of the transmitted trafficPDF-p. 37
6.7  Confidentiality protection of associated delivery procedures [R11]

Up   Top   ToC