Table of Contents

 1     Scope          
 2     References
 3     Definitions
        3.1     Terms defined elsewhere       
        3.2     Terms defined in this Recommendation           
 4     Abbreviations and acronyms             
 5     Conventions            
 6     Authentication of control word-usage rules information and associated data 1           
        6.1     Authentication of control word-usage rules information           
        6.2     Authentication of associated data 1    
Appendix I – Areas for further development    
Bibliography