1
Scope
1.1 Structure of H.235.x subseries
Recommendations
2
References
2.1
Normative
references
2.2
Informative
references
3
Terms
and definitions
4
Symbols
and abbreviations
5
Conventions
6
System
introduction
6.1
Summary
6.2
Authentication
6.3
Call
establishment security
6.4
Call
control (H.245) security
6.5
Media
stream privacy
6.6
Trusted
elements
6.7
Non-repudiation
6.8
Mobility
security
6.9
Security
profiles
6.10
Secured
NAT/firewall traversal
7
Connection
establishment procedures
8
Authentication
signalling and procedures
8.1
Diffie-Hellman
with optional authentication
8.2
Subscription-based
authentication
8.3
RAS
signalling/procedures for authentication
8.4
Key
management on the RAS channel
9
Asymmetric
authentication and key exchange using elliptic curve crypto systems
9.1
Key
management
9.2
Digital
signature
10 Pseudo-Random Function (PRF)
11 Security error recovery
11.1
Error
signalling
Annex A –
H.235 ASN.1
Annex B –
H.324-specific topics
Appendix I
– H.323 implementation details
I.1
Implementation examples
Appendix II
– H.324 implementation details
Appendix
III – Other H-series implementation details
Appendix IV
– Section mapping of H.235v3Amd1Cor1 to H.235v4 subseries Recommendations
Appendix V
– Figure mapping of H.235v3Amd1Cor1 to H.235v4 subseries Recommendations
Appendix VI
– Table mapping of H.235v3Amd1Cor1 to H.235v4 subseries Recommendations