1 Scope
1.1 Structure of ITU-T H.235.x sub-series Recommendations
2 References
3 Terms and definitions
3.1 Terms defined elsewhere
3.2 Terms defined in this Recommendation
4 Abbreviations and acronyms
5 Conventions
6 System introduction
6.1 Summary
6.2 Authentication
6.3 Call establishment security
6.4 Call control (ITU-T H.245) security
6.5 Media stream privacy
6.6 Trusted elements
6.7 Non-repudiation
6.8 Mobility security
6.9 Security profiles
6.10 Secured NAT/firewall traversal
7 Connection establishment procedures
8 Authentication signalling and procedures
8.1 Diffie-Hellman with optional authentication
8.2 Subscription-based authentication
8.3 RAS signalling/procedures for authentication
8.4 Key management on the RAS channel
9 Asymmetric authentication and key exchange using elliptic curve crypto
systems
9.1 Key management
9.2 Digital signature
10 Pseudo-random function (PRF)
11 Security error recovery
11.1 Error signalling
Annex A – ITU-T H.235 ASN.1
Annex B –
ITU-T H.324-specific topics
Appendix I – ITU-T H.323 implementation details
I.1 Implementation examples
Appendix II – ITU-T H.324 implementation details
Appendix III – Other ITU-T H-series implementation details
Appendix IV – Section mapping of ITU-T H.235v3Amd1Cor1 to ITU-T H.235v4
sub-series Recommendations
Appendix V – Figure mapping of ITU-T H.235v3Amd1Cor1 to ITU-T H.235v4
sub-series Recommendations
Appendix VI – Table mapping of ITU-T H.235v3Amd1Cor1 to ITU-T H.235v4
sub-series Recommendations
Bibliography