
|
Issue 277 (cont’d) Suggested breakdown: Key management framework Section 1 Section 2 (minus AMSK and pre-emptive key derivation) Section 3 (EAP-Key SA) Section 4: Key Management (minus speculative material) Section 5: Handoff Support (minus speculative material) Section 6: Security Considerations Section 7: Security Requirements Key management extensions Section 2.4 (AMSK derivation) Section 3.2 (EAP-Key SA) Section 4 (Speculative Material) Section 5 (Speculative Material) |