Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Protection
5 Procedures for message authentication
Annex A (informative) - Protection against duplication
and loss using MIDs
Annex B (informative) - General tutorial information
Bibliography