CONTENTS

 1     Scope 
        1.1     Structure of H.235.x subseries Recommendations  
 2     References 
        2.1     Normative references         
        2.2     Informative references        
 3     Terms and definitions       
 4     Symbols and abbreviations           
 5     Conventions     
 6     System introduction         
        6.1     Summary
        6.2     Authentication        
        6.3     Call establishment security  
        6.4     Call control (H.245) security          
        6.5     Media stream privacy        
        6.6     Trusted elements    
        6.7     Non-repudiation    
        6.8     Mobility security    
        6.9     Security profiles     
       6.10     Secured NAT/firewall traversal     
 7     Connection establishment procedures       
 8     Authentication signalling and procedures   
        8.1     Diffie-Hellman with optional authentication  
        8.2     Subscription-based authentication  
        8.3     RAS signalling/procedures for authentication           
        8.4     Key management on the RAS channel        
 9     Asymmetric authentication and key exchange using elliptic curve crypto systems    
        9.1     Key management   
        9.2     Digital signature     
10     Pseudo-Random Function (PRF)
11     Security error recovery   
       11.1     Error signalling      
Annex A – H.235 ASN.1    
Annex B – H.324-specific topics    
Appendix I – H.323 implementation details    
        I.1        Implementation examples 
Appendix II – H.324 implementation details    
Appendix III – Other H-series implementation details    
Appendix IV – Section mapping of H.235v3Amd1Cor1 to H.235v4 subseries Recommendations    
Appendix V – Figure mapping of H.235v3Amd1Cor1 to H.235v4 subseries Recommendations    
Appendix VI – Table mapping of H.235v3Amd1Cor1 to H.235v4 subseries Recommendations