More info
Description / Abstract:
This document defines the stage-2/3 procedures for the IMS
security based on the CAVE authentication.
This document only covers the aspects that differ from the
procedures defined in [3] for IMS security based on the CAVE
authentication. Unless otherwise specified in this document, the
IMS security procedures shall comply with [3].