Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x

Content for  TR 33.828  Word version:  11.1.0

Top   Top   Up   Prev   None
1…   4…

 

4  Use casesp. 8

5  Requirementsp. 14

6  General aspects of solutionsp. 17

7  Candidate solutionsp. 24

7.1  Ticket-Based System (TBS)p. 24

7.1.1  Introductionp. 24

7.1.2  Analysisp. 25

7.1.3  Solution descriptionp. 26

7.1.4  System detailsp. 27

7.1.5  Evaluation of solution against requirements.p. 35

7.2  Using IMS AKA keys for media protection over the access networkp. 38

7.3  Security Descriptions (SDES)p. 41

7.4  Otway-Rees based key management protocolp. 52

7.5  DTLS-SRTPp. 65

7.6  MIKEY-IBAKE Solutionp. 67

8  Conclusionsp. 79

A  Identity Based Encryptionp. 80

$  Change historyp. 81


Up   Top