Tech-invite3GPPspecsGlossariesIETFRFCsGroupsSIPABNFsWorld Map



 

Here   Top   Up   Prev   None
1…      7.3…     

 

 

7.3  SPIT/UC Protection with Supplementary Services
7.4  Contextual Information
7.5  UC protection framework for non-IMS interconnection: the Open Proxy Handshake
7.6  Alternative Methods for Authentication of Originating NetworkPDF-p. 70
8  Evaluation of Solution AlternativesPDF-p. 74
9  Potential PUCI ArchitecturePDF-p. 87Up
10  SummaryPDF-p. 91
A  Usability and Business AspectsPDF-p. 92
B  Analysis of UC protection mechanisms for non-IMS interconnectionPDF-p. 93
C  Change historyPDF-p. 96

Up   Top