tech-invite   World Map
3GPP     Specs     Glossaries     Architecture     IMS     UICC       IETF     RFCs     Groups     SIP     ABNFs       Search     Home
 


 

Here        Top        Up        Prev        None
part:    1     2     3

 

 

8   Application security mechanisms [R3]   PDF-p. 59
A   Void
B  (Normative)   Key derivation function [R8]   PDF-p. 61
C   Management of sequence numbers [R3]   PDF-p. 63
D   Void
E   Void
F   Example uses of the proprietary part of the AMF [R3]   PDF-p. 71
G  (Normative)   Support of algorithm change features [R7]   PDF-p. 72
H  (Normative)   Usage of the AMF [R8]   PDF-p. 73
I  (Normative)   Security requirements for RNCs in exposed locations [R11]   PDF-p. 74
J   Change history   PDF-p. 77

Up        Top