ITU H.530:2002

ITU H.530:2002 Symmetric Security Procedures For H.323 Mobility In H.510 Describe security procedures for an H.323 multimedia mobility environment. This Recommendation provides the details about the security procedures for H.510.

More details

Download

PDF AVAILABLE FORMATS IMMEDIATE DOWNLOAD
$17.53 tax incl.

$39.83 tax incl.

(price reduced by 56 %)

1000 items in stock

Table of Contents

1Scope
2Introduction
3Specificationconventions
4Termsanddefinitions
5Abbreviationsandsymbols
6References
6.1Normativereferences
6.2Non-normativereferences
7Securityrequirementsandconstraintsformobility
8Hop-by-hopsecuritywithsymmetriccryptographictechniques
8.1Assumptions
8.2Securelocationupdatingprocedures
8.2.1MTtoV-GK
8.2.2V-GKtoMRP
8.2.3MRPtoV-BE
8.2.4V-BEtoH-BE
8.2.5H-BEtoMRP
8.2.6MRPtoAuF
8.3Terminalauthentication
8.4Unregistration
8.5Applicationofthesymmetricsecurityprotocolin
thehomedomain
8.6ListofObjectIdentifiers
9End-to-endsecurity

Abstract

Describe security procedures for an H.323 multimedia mobility environment. This Recommendation provides the details about the security procedures for H.510.

Contact us