Tech-invite3GPPspecsGlossariesIETFRFCsGroupsSIPABNFsWorld Map



 

Here   Top   Up   Prev   Next
1…      6…   7…     

 

 

6  Candidate solutions
6.0  General
6.1  Solution #1: "UE to HPLMN" security solutions based on UMTS/EPS AKA enhancements.
6.2  Solution #2: "End-to-middle security based on AKA"
6.3  Solution #3: "Independent VPLMN and e2m security associations"Up
6.4  Solution #4: "Security policies"
6.5  Solution #5: "End-to-end security solution"Word-p. 31
6.6  Solution #6: Bearer protection
6.7  Solution #X: "End-to-end" for solutions 1 and 2
6.8  Solution #8: Complete end to middle solutionWord-p. 34
6.9  Solution #9: Complete end to end solutionWord-p. 51
6.10  Solution #10: "AKA-based session key generation for application protocols"
6.11  Solution #11: A method for IoT service layer security bootstrapping solution
6.12  Solution #12: A method for IoT service layer security bootstrapping solution

Up   Top   ToC