Guidance on security interworking between 2G and 3G networks, focusing on authentication and key agreement procedures for SIM/USIM and mobile equipment.
View the full specification with interactive table of contents, version history, and AI analysis.
Read Full Specification →