tech-invite   World Map
3GPP     Specs     Glossaries     Architecture     IMS     UICC       IETF     RFCs     Groups     SIP     ABNFs       Search     Home
 


 

Here        Top        Up        Prev        Next
part:    1     2     3

 

 

A   Trust model [R6]   PDF-p. 42
B   Security threats [R6]   PDF-p. 43
C  (Normative)   MBMS security requirements [R6]   PDF-p. 46
D  (Normative)   UICC-ME interface [R6]   PDF-p. 49
E   MIKEY features not used in MBMS [R6]   PDF-p. 51
F  (Normative)   MRK key derivation for ME based MBMS key management [R6]   PDF-p. 52

Up        Top        ToC