1 Scope
2 References
3 Definitions
3.1 Terms defined elsewhere
3.2 Terms defined in this Recommendation
4 Abbreviations
and acronyms
5 Conventions
6 Architecture
for interconnection between trustable network entities
6.1 Reference architecture
6.2 Functional entities
6.3 Reference points
7 Security
services
8 Security
association attribute definition
8.1 Security association identifier (SAI)
8.2 Cryptographic parameters per security association
9 Structure
of protected messages
9.1 Security header
9.2 Security payload
9.3 Digital signature algorithms (DSA) signature algorithms
10 Signalling
procedures
10.1 TSa
10.2 Sa
10.3 Sc
Annex A
– List of verifiable CSP identifiers to be sent in the
PEEC request
Annex B
– ASN.1 format for signalling messages
Appendix I – Information validation techniques
Bibliography