tech-invite   World Map
3GPP     Specs     Glossaries     Architecture     IMS     UICC       IETF     RFCs     Groups     SIP     ABNFs       Search     Home
 


 

Here        Top        Up        Prev        Next
part:    1     2     3     4     5

 

 

8.3   Solutions for direct discovery (non-Public Safety)
8.3.1   Solution #8.3.1: Authorisation for restricted ProSe direct discovery
8.3.2   Solution #8.3.2: Security for restricted discovery
8.3.3   Solution #8.3.3 ProSe Restricted Discovery in Model B with Match Report procedures initiated by Discoveree UE and Discoverer UE
8.3.4   Solution #8.3.4: Integrity protection of the ProSe code for restricted discovery (Model A)   Word-p. 159
8.3.5   Solution #8.3.5 ProSe Restricted Discovery in Model B with Match Report procedure initiated by Discoverer UE only   Word-p. 160
8.3.6   Solution #8.3.6 ProSe Restricted Discovery in Model B with local MIC Checking   Word-p. 165
8.3.7   Solution #8.3.7: Security for Restricted ProSe Direct Discovery   Word-p. 170
8.3.8   Solution #8.3.8: Security for Restricted ProSe Direct Discovery (Model B)   Word-p. 172
8.3.9   Solution #8.3.9 Obtaining the security parameters needed for ProSe Restricted Discovery
8.3.10   Solution #8.3.10: Confidentiality of ProSe identifiers in PC5 interface   Word-p. 181
8.3.11   Solution #8.3.11 Protecting a Restricted Discovery Message (Model A and Model B)
8.3.12   Solution #8.3.12: Security for PC2 interface in Restricted Direct Discovery
8.3.14   Solution #8.3.14: Hint of scrambling key   Word-p. 190
8.3.15   Solution #8.3.15 Protecting a Restricted Discovery Message (Model A and Model B)   Word-p. 191
8.3.16   Solution #8.3.16: Masked UTC counter   Word-p. 195
8.4   Solutions for Direct Discovery (public safety use)   Word-p. 196      Up

Up        Top        ToC