Intellectual Property Rights
Foreword
Introduction
1 Scope
2 References
3 Definitions and abbreviations
4 Interception in the NGN
5A Stage 2 description of NGN LI
5 Interception in NGN subsystems
6 Identification of target of interception
7 Security considerations
Annex A - Void
Annex B - Void
Annex C - Void
Annex D - Void
Annex E (informative) - ISDN/PSTN LI reference configurations
Annex F (informative) - Selection of handover interface
Annex G (informative) - Bibliography
Annex H (informative) - Change history
History