CONTENTS

 1     Scope 
 2     References 
        2.1     Normative references         
        2.2     Informative references        
 3     Terms and definitions       
 4     Symbols and abbreviations           
 5     Conventions     
 6     Overview   
        6.1     H.323 requirements           
        6.2     Authentication and integrity
 7     Procedure IV   
 8     Security association for concurrent calls    
 9     Key update
10     Usage of elliptic curve techniques
11     Illustration examples        
12     Multicast behaviour         
13     List of secure signalling messages
       13.1     H.225.0 RAS       
       13.2     H.225.0 call signalling (single administrative domain)          
       13.3     H.225.0 call signalling (multi-administrative domain)           
14     List of object identifiers   
Appendix I – H.235.3 enabled Gatekeeper Security Processor    
        I.1        Discovery of a gatekeeper security processor       
        I.2        Gatekeeper security processor operation  
        I.3        Processor token   
        I.4        GKSP illustration example
        I.5          List of object identifiers