More info
Description / Abstract: This document defines the stage-2/3 procedures for the IMS security based on the CAVE authentication.
This document only covers the aspects that differ from the procedures defined in [3] for IMS security based on the CAVE authentication. Unless otherwise specified in this document, the IMS security procedures shall comply with [3].