Tech-invite3GPPspecsGlossariesIETFRFCsGroupsSIPABNFsWorld Map



 

Here   Top   Up   Prev   Next
1…      A…   G…     

 

 

A  Trust model [R6]PDF-p. 42
B  Security threats [R6]PDF-p. 43
C (Normative)  MBMS security requirements [R6]PDF-p. 46
D (Normative)  UICC-ME interface [R6]PDF-p. 49
E  MIKEY features not used in MBMS [R6]PDF-p. 51
F (Normative)  MRK key derivation for ME based MBMS key management [R6]PDF-p. 52

Up   Top   ToC