1     Scope           
 2     References                
 3     Definitions  
        3.1     Terms defined
elsewhere         
        3.2     Terms defined in this
Recommendation             
 4     Abbreviations and acronyms              
 5     Conventions              
 6     Overview    
        6.1     Model of peer-to-peer
communications between devices of peer users            
        6.2     Overview of mechanisms
used for implementing PKI for P2P networks               
        6.3     Usage scenarios            
 7     Information
denoted in a peer device certificate      
 8     Operations provided by the
service provider              
        8.1     Upload of CA
certificate and CRL            
        8.2     Retrieval of CA
certificate and CRL         
 9     Peer entity authentication
procedure            
10     Security considerations       
       10.1     Authenticity and
integrity of CA certificates     
       10.2     Scope of peer devices'
name 
       10.3     Trustworthiness of
service providers  
Bibliography