tech-invite   World Map     

3GPP     Specs     Glossaries     Architecture     IMS     UICC       IETF     RFCs     Groups     SIP     ABNFs       Search



Here          Top          Up          Prev          Next
part:    1     2     3



B  (Normative)   Specification of the key derivation function KDF [R6]   PDF-p. 38
C   Void
D   Dialog example for user selection of UICC application used in GBA [R6]   PDF-p. 44
E  (Normative)   TLS profile for securing Zn/Zn' reference points [R6]   PDF-p. 45
F   Handling of TLS certificates [R6]   PDF-p. 46
G  (Normative)   GBA_U UICC-ME interface [R6]   PDF-p. 47      Up
H  (Normative)   Ua security protocol identifier [R6]   PDF-p. 49
I  (Normative)   2G GBA [R7]   PDF-p. 51
I.0   Introduction [R11]
I.1   Reference model
I.2   Network elements      Up
I.3   Bootstrapping architecture and reference points
I.4   Requirements and principles for bootstrapping
I.5   Procedures
I.6   TLS Profile

Up          Top          ToC