tech-invite   World Map     

3GPP     Specs     Glossaries     Architecture     IMS     UICC       IETF     RFCs     Groups     SIP     ABNFs       Search

 


 

Here          Top          Up          Prev          None
part:    1     2     3

 

 

G  (Normative)   HTTP based key management messages [R6]   PDF-p. 53
H   Signalling flows for MSK procedures [R6]   PDF-p. 57      Up
I   Example of using MSKs and MTKs in MBMS [R6]   PDF-p. 61
J   Mapping the MBMS security requirements into security functions and mechanism [R6]   PDF-p. 62
K   SRTP features not used in MBMS [R7]   PDF-p. 66
L  (Normative)   Multicasting MBMS user data on Iub [R8]   PDF-p. 67
M   Relation to IMS based MBMS user services [R8]   PDF-p. 68
N  (Normative)   GCSE security aspects [R12]   PDF-p. 69
O  (Normative)   Security aspects of xMB reference point between Content Provider and BM-SC [R14]   PDF-p. 71
P   Change history   PDF-p. 72

Up          Top