Intellectual Property Rights
Foreword
Introduction
1 Scope
2 References
3 Abbreviations
4 Security requirements
4.1 S-MBMS security requirements
4.2 General security requirements
5 S-MBMS Security overview
5.1 S-MBMS- security architecture
5.2 Key management overview
6 Security functions
6.1 Authenticating and authorizing the user
6.2 Key management and distribution
6.3 Protection of the transmitted traffic
6.4 Protection of Intermediate Module Repeaters
7 Security mechanisms
7.1 Using GBA for S-MBMS
7.2 Authentication and authorization of user
7.3 Key update procedures
7.4 Protection of the transmitted traffic
Annex A (informative): Bibliography
History