Show simple item record

Security Mechanisms Using GBA

contributor authorTIA - Telecommunications Industry Association
date accessioned2017-09-04T18:41:13Z
date available2017-09-04T18:41:13Z
date copyright40817
date issued2011
identifier otherJWREOEAAAAAAAAAA.pdf
identifier urihttps://yse.yabesh.ir/std/handle/yse/222792
description abstractIntroduction and Scope
This document describes profile of security mechanisms such that the mechanism can utilize keys that have been generated using the Generic Bootstrapping Architecture (GBA) [3]. GBA is a method of providing keys in a generic manner based on the cdma2000®1 authentication methods. Similar work has been carried out by 3GPP, see [8] and [9] as part of their General Authentication Architecture work [6]
1 cdma2000® is the trademark for the technical nomenclature for certain specifications and standards of the Organizational Partners (OPs) of 3GPP2. Geographically (and as of the date of publication), cdma2000® is a registered trademark of the Telecommunications Industry Association (TIA-USA) in the United States.
languageEnglish
titleTIA TIA-1097-Anum
titleSecurity Mechanisms Using GBAen
typestandard
page34
statusActive
treeTIA - Telecommunications Industry Association:;2011
contenttypefulltext


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record