Skip to content
TechSpec
M.2 Reference model
M.1 General
L.1 Impersonation of the UE to the BSF during the run of the Ub protocol
L.2 Impersonation of the BSF to the UE during the run of the Ub protocol
K.1 Example on interoperator GBA setup
K.2 Example on interoperator GBA operation
J.2 Usage scenarios
J.1 General
I.4 Requirements and principles for bootstrapping
I.6 TLS Profile
Posts navigation
Older posts
Newer posts