2 References
Annex B –
H.323 specific topics
B.7 Pseudo-Random Function (PRF)
Annex F – Hybrid
security profile
F.10
Illustration
examples
Annex I – Support of
direct-routed calls
I.9
Procedure DRC
I.10
PRF-based
key derivation procedure
I.11 FIPS-140-based key derivation
procedure
I.12 List of object identifiers