1 Scope
2 Normative references
3 Terms and definitions
4 Symbols and abbreviated terms
5 Command-Response pairs
6 Data Objects
7 Structures for applications and data
8 Specific use of DOs and related concepts
9 Security architecture
10 Secure messaging
11 Commands for interchange
12 Application-independent card services
Annex A (informative) - Examples of object identifiers and
tag allocation schemes
Annex B (informative) - Examples of secure messaging
Annex C (informative) - Examples of AUTHENTICATE functions
by GENERAL AUTHENTICATE commands
Annex D (informative) - Application identifiers using issuer
identification numbers
Annex E (informative) - BER Encoding Rules
Annex F (informative) - BER-TLV data object handling
Annex G (informative) - Template extension by tagged wrapper
Annex H (informative) - Parsing an extended header against its
target DO
Annex I (informative) - Editor's notes
Bibliography