G. Camarillo, Introduction to TISPAN NGN, Ericsson, Tech. Rep, 2005.

M. Tadault, S. Soormally, and L. Thiebault, Network evolution towards IP multimedia subsystem, T0312-IP-Multimedia-EN.pdf, 2003.

3. Ts, Security architecture". V8.4, pp.2009-2019

3. Ts, Cryptographic algorithm requirements". s.l. : ETSI, 2009-02

Y. Lin, M. Chang, M. Hsu, and L. Wu, One-pass GPRS and IMS authentication procedure for UMTS, IEEE Journal on Selected Areas in Communications, vol.23, issue.6, pp.1233-1239, 2005.

3. Ts, Access security for IP-based services". V8.6.0 s.l, pp.2009-2016

3. Ts, 3G security; Network Domain Security (NDS); IP network layer security". V8.3.0 s.l, pp.2009-2016

S. Kent and R. Atkinson, IP Encapsulating Security Payload (ESP) RFC 2406, 1998.
DOI : 10.17487/rfc4303

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.359.4556

S. Kent, IP Encapsulating Security Payload (ESP) RFC 4303, Internet Engineering Task Force, 2005.
DOI : 10.17487/rfc4303

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.359.4556

S. Frankel, R. Glenn, and S. Kelly, The aes-cbc cipher algorithm and its use with ipsec, p.3602, 2003.
DOI : 10.17487/rfc3602

C. Madson and R. Glenn, The use of hmac-sha-1 within esp and ah. ietf, 1998.

. Rescorla, Diffie-Hellman Key Agreement Method, RFC, vol.2631, 1999.
DOI : 10.17487/rfc2631