tech-invite   World Map     

3GPP     Specs     Glossaries     Architecture     IMS     UICC       IETF     RFCs     Groups     SIP     ABNFs       Search

 


 

Here        Top        Up        Prev        Next
part:    1     2     3

 

 

6   Candidate solutions
6.0   General
6.1   Solution #1: "UE to HPLMN" security solutions based on UMTS/EPS AKA enhancements.
6.2   Solution #2: "End-to-middle security based on AKA"
6.3   Solution #3: "Independent VPLMN and e2m security associations"      Up
6.4   Solution #4: "Security policies"
6.5   Solution #5: "End-to-end security solution"   Word-p. 31
6.6   Solution #6: Bearer protection
6.7   Solution #X: "End-to-end" for solutions 1 and 2
6.8   Solution #8: Complete end to middle solution   Word-p. 34
6.9   Solution #9: Complete end to end solution   Word-p. 51
6.10   Solution #10: "AKA-based session key generation for application protocols"
6.11   Solution #11: A method for IoT service layer security bootstrapping solution
6.12   Solution #12: A method for IoT service layer security bootstrapping solution

Up        Top        ToC