tech-invite   World Map     

3GPP     Specs     Glossaries     Architecture     IMS     UICC       IETF     RFCs     Groups     SIP     ABNFs       Search

 


 

Here        Top        Up        Prev        Next
part:    1     2     3     4     5

 

 

6   Solutions for Rel-12   Word-p. 36
6.1   Solutions for configuration data transfer
6.2   Solutions for Discovery   Word-p. 40
6.2.1   Solution #2.1: Security for ProSe discovery
6.2.2   Solution #2.2:Security for Direct Discovery   Word-p. 42
6.2.3   Solution #2.3: Solution against DOS attack in registration procedure   Word-p. 43
6.2.4   Solution #2.4: Security for discovery with network checking   Word-p. 45
6.2.5   Solution #2.5: Security for discovery response   Word-p. 49
6.2.6   Solution #2.6: Security for proximity request authentication and authorization   Word-p. 52
6.3   Solutions for One-to-many Communications   Word-p. 56
6.3.1   Solution #3.1: Security for ProSe Group Communications
6.3.2   Solution #3.2: Network-supported key distribution for group communications   Word-p. 73
6.3.3   Solution #3.3: security for D2D communications based on overlay   Word-p. 76      Up
6.3.4   Solution #3.4: Security for one-to-many communication   Word-p. 79
6.3.5   Solution #3.5: Security for one-to-many security   Word-p. 81
6.3.6   Solution #3.6: Public safety security layered over network security   Word-p. 86
6.3.7   Solution #3.7: Security for One-to-many ProSe Direct Communication
6.3.8   Conclusion on one-to-many security   Word-p. 89
6.4   Solutions for other areas   Word-p. 93

Up        Top        ToC