1     Scope 
 2     References 
 3     Definitions  
        3.1     Terms defined elsewhere    
        3.2     Terms defined in this Recommendation       
 4     Abbreviations and acronyms        
 5     Conventions     
 6     Overview   
        6.1     Use case description          
        6.2     Security considerations      
 7     Security architecture        
        7.1     Authentication model         
        7.2     Network elements 
        7.3     Reference points    
        7.4     Requirements for authentication information
        7.5     Key structure         
 8     Authentication procedures
        8.1     Authentication procedures overview           
        8.2     Entity initial authentication procedure          
        8.3     Entity re-authentication procedure  
        8.4     Authentication inquiring procedure with key generation       
        8.5     Mutual authentication procedure between SS and SP         
 9     Overall authentication procedures 
Appendix I – Some examples of entity authentication procedure     
        I.1        HTTP digest AKA used in 3GPP 
        I.2        HTTP digest AKA used in 3GPP2           
        I.3        TLS-Cert based authentication mechanism           
        I.4        Authentication procedure based on public key certificate authentication mechanism
        I.5        Authentication procedure based on a biometric authentication mechanism  
Appendix II – Examples of mutual authentication between SS and SP     
       II.1     Standardized cases 
       II.2     Other possible cases          
Appendix III – Key lifetime     
Appendix IV – Mapping of the reference points to those in 3GPP/3GPP2