1
Scope
2
References
2.1
Normative
references
2.2
Informative
references
3
Terms and definitions
4
Symbols and abbreviations
5
Conventions
6
Overview
6.1 H.323 requirements
6.2 Authentication and integrity
7
Procedure IV
8
Security association for concurrent calls
9
Key update
10 Usage of
elliptic curve techniques
11 Illustration
examples
12 Multicast
behaviour
13 List of
secure signalling messages
13.1
H.225.0
RAS
13.2 H.225.0 call signalling (single
administrative domain)
13.3 H.225.0 call signalling
(multi-administrative domain)
14 List of
object identifiers
Appendix I
– H.235.3 enabled Gatekeeper Security Processor
I.1 Discovery
of a gatekeeper security processor
I.2 Gatekeeper
security processor operation
I.3 Processor
token
I.4 GKSP
illustration example
I.5 List of object identifiers