Foreword
1 Scope
2 Normative references
3 Terms and definitions
4 Abbreviations and notation
5 Additional Service Selection
6 Client/Server Authentication
7 Role Authentication
8 Symmetric key transmission between a remote
server and the ICC
9 Signature verification
10 Certificates for additional services
11 Privacy Context functions
12 APDU data structures
Annex A (normative) - Security Service Descriptor
Templates
Annex B (informative) - Key and signature formats
for elliptic curves over prime fields GF(p)
Annex C (informative) - Security environments
Annex D (normative) - Algorithm Identifiers - Coding
and specification
Annex E (informative) - Example of DF.CIA
Bibliography