1 Scope
2 References
3 Terms and
definitions
3.1 Terms defined elsewhere
3.2 Terms defined in this
Recommendation
4 Abbreviations and
acronyms
5 Conventions
6 Overview
7 Security threats
7.1 Server impersonation
7.2 Other types of attacks
8 General model
8.1 Entities
8.2 Operational procedure of HAKE
8.3 Requirements for HAKE
9 Protocols
9.1 Two types of HAKE
9.2 HAKE protocols using shared secrets and identity-based cryptosystem
9.3 HAKE protocols using shared
secrets and public key infrastructure (PKI)
10 Extensions of HAKE
Appendix I – Comparison of HAKE protocols
Bibliography