1 Scope
2 References
3 Definitions
3.1 Terms defined
elsewhere
3.2 Terms defined in this
Recommendation
4 Abbreviations and acronyms
5 Conventions
6 Overview
6.1 Model of peer-to-peer
communications between devices of peer users
6.2 Overview of mechanisms
used for implementing PKI for P2P networks
6.3 Usage scenarios
7 Information
denoted in a peer device certificate
8 Operations provided by the
service provider
8.1 Upload of CA
certificate and CRL
8.2 Retrieval of CA
certificate and CRL
9 Peer entity authentication
procedure
10 Security considerations
10.1 Authenticity and
integrity of CA certificates
10.2 Scope of peer devices'
name
10.3 Trustworthiness of
service providers
Bibliography