Table of Contents

 1     Scope          
 2     References               
 3     Definitions 
        3.1     Terms defined elsewhere        
        3.2     Terms defined in this Recommendation            
 4     Abbreviations and acronyms             
 5     Conventions             
 6     Overview   
        6.1     Model of peer-to-peer communications between devices of peer users           
        6.2     Overview of mechanisms used for implementing PKI for P2P networks              
        6.3     Usage scenarios           
 7     Information denoted in a peer device certificate     
 8     Operations provided by the service provider             
        8.1     Upload of CA certificate and CRL           
        8.2     Retrieval of CA certificate and CRL        
 9     Peer entity authentication procedure           
10     Security considerations      
       10.1     Authenticity and integrity of CA certificates    
       10.2     Scope of peer devices' name
       10.3     Trustworthiness of service providers 
Bibliography