Tech-invite3GPPspecsGlossariesIETFRFCsGroupsSIPABNFsWorld Map



 

Here   Top   Up   Prev   None
1…      6…     

 

 

6  General aspects of solutionsWord-p. 17
7  Candidate solutionsWord-p. 24
7.1  Ticket-Based System (TBS)
7.1.1  Introduction
7.1.2  AnalysisWord-p. 25
7.1.3  Solution descriptionWord-p. 26
7.1.4  System detailsWord-p. 27
7.1.5  Evaluation of solution against requirements.Word-p. 35
7.2  Using IMS AKA keys for media protection over the access network
7.3  Security Descriptions (SDES)
7.4  Otway-Rees based key management protocolWord-p. 52
7.5  DTLS-SRTPWord-p. 65
7.6  MIKEY-IBAKE Solution
8  Conclusions
A  Identity Based EncryptionWord-p. 80
B  Change historyWord-p. 81

Up   Top