tech-invite   World Map     

3GPP     Specs     Glossaries     Architecture     IMS     UICC       IETF     RFCs     Groups     SIP     ABNFs       Search

 


 

Here          Top          Up          Prev          Next
part:    1     2     3     4     5

 

 

6   Security features [R3]
7   USIM Commands [R3]
7.1   AUTHENTICATE
7.2   Void
7.3   Status Conditions Returned by the USIM   PDF-p. 251
7.4   Optional commands [R6]   PDF-p. 253      Up
8   Void
A   EF changes via Data Download or USAT applications [R3]   PDF-p. 254
B  (Normative)   Image Coding Schemes [R3]   PDF-p. 259
C   Structure of the Network parameters TLV objects [R3]   PDF-p. 262
D   Tags defined in 31.102 [R3]   PDF-p. 263
E   Suggested contents of the EFs at pre-personalization [R3]   PDF-p. 269
F   Examples of coding of LSA Descriptor files for SoLSA [R3]   PDF-p. 274
G   Phonebook Example [R3]   PDF-p. 275      Up

Up          Top          ToC