Tech-invite   World Map
3GPP     Specs     Glossaries     UICC       IETF     RFCs     Groups     SIP     ABNFs       T+       Search     Home
 


 

Here        Top        Up        Prev        Next
part:    1     2     3     4     5

 

 

6   Security procedures between UE and 5G network functions   Word-p. 23
6.1   Primary authentication and key agreement   Word-p. 24
6.2   Key hierarchy, key derivation, and distribution scheme   Word-p. 32
6.3   Security contexts
6.4   NAS security mechanisms
6.5   RRC security mechanisms   Word-p. 40
6.6   UP security mechanisms
6.7   Security algorithm selection, key establishment and security mode command procedure
6.8   Security handling in state transitions
6.9   Security handling in mobility
6.10   Dual connectivity
6.11   Security handling in radio link failure
6.12   Subscription identifier privacy
7   Security for non-3GPP access to the 5G core network
8   Security of interworking

Up        Top        ToC