Tech-invite3GPPspecsGlossariesIETFRFCsGroupsSIPABNFsWorld Map



 

Here   Top   Up   Prev   Next
1…      6…   7…   8.3…   A…     

 

 

6  Solutions for Rel-12Word-p. 36
6.1  Solutions for configuration data transfer
6.2  Solutions for DiscoveryWord-p. 40
6.2.1  Solution #2.1: Security for ProSe discovery
6.2.2  Solution #2.2:Security for Direct DiscoveryWord-p. 42
6.2.3  Solution #2.3: Solution against DOS attack in registration procedureWord-p. 43
6.2.4  Solution #2.4: Security for discovery with network checkingWord-p. 45
6.2.5  Solution #2.5: Security for discovery responseWord-p. 49
6.2.6  Solution #2.6: Security for proximity request authentication and authorizationWord-p. 52
6.3  Solutions for One-to-many CommunicationsWord-p. 56
6.3.1  Solution #3.1: Security for ProSe Group Communications
6.3.2  Solution #3.2: Network-supported key distribution for group communicationsWord-p. 73
6.3.3  Solution #3.3: security for D2D communications based on overlayWord-p. 76Up
6.3.4  Solution #3.4: Security for one-to-many communicationWord-p. 79
6.3.5  Solution #3.5: Security for one-to-many securityWord-p. 81
6.3.6  Solution #3.6: Public safety security layered over network securityWord-p. 86
6.3.7  Solution #3.7: Security for One-to-many ProSe Direct Communication
6.3.8  Conclusion on one-to-many securityWord-p. 89
6.4  Solutions for other areasWord-p. 93

Up   Top   ToC