Tech-invite3GPPspecsGlossariesIETFRFCsGroupsSIPABNFsWorld Map


Here   Top   Up   Prev   None
1…      A…   G…     



G (Normative)  HTTP based key management messages [R6]PDF-p. 53
H  Signalling flows for MSK procedures [R6]PDF-p. 57Up
I  Example of using MSKs and MTKs in MBMS [R6]PDF-p. 61
J  Mapping the MBMS security requirements into security functions and mechanism [R6]PDF-p. 62
K  SRTP features not used in MBMS [R7]PDF-p. 66
L (Normative)  Multicasting MBMS user data on Iub [R8]PDF-p. 67
M  Relation to IMS based MBMS user services [R8]PDF-p. 68
N (Normative)  GCSE security aspects [R12]PDF-p. 69
O (Normative)  Security aspects of xMB reference point between Content Provider and BM-SC [R14]PDF-p. 71
P  Change historyPDF-p. 72

Up   Top