02.09 | TS | Security aspects | Under change control |
S3
|
|
03.20 | TS | Security-related network functions | Under change control |
S3
|
|
21.133 | TS | 3G security; Security threats and requirements | Under change control |
S3
|
|
22.022 | TS | Personalisation of Mobile Equipment (ME); Mobile functionality specification | Under change control |
S1
|
|
23.003 | TS | Numbering, addressing and identification | Under change control |
C4
|
|
23.008 | TS | Organization of subscriber data | Under change control |
C4
|
|
24.008 | TS | Mobile radio interface Layer 3 specification; Core network protocols; Stage 3 | Under change control |
C1
|
|
24.109 | TS | Bootstrapping interface (Ub) and network application function interface (Ua); Protocol details | Under change control |
C1
|
|
24.229 | TS | IP multimedia call control protocol based on Session Initiation Protocol (SIP) and Session Description Protocol (SDP); Stage 3 | Under change control |
C1
|
|
29.002 | TS | Mobile Application Part (MAP) specification | Under change control |
C4
|
|
29.060 | TS | General Packet Radio Service (GPRS); GPRS Tunnelling Protocol (GTP) across the Gn and Gp interface | Under change control |
C4
|
|
29.109 | TS | Generic Authentication Architecture (GAA); Zh and Zn Interfaces based on the Diameter protocol; Stage 3 | Under change control |
C4
|
|
29.120 | TS | Mobile Application Part (MAP) specification for Gateway Location Register (GLR) | Under change control |
C4
|
|
29.230 | TS | Diameter applications; 3GPP specific codes and identifiers | Under change control |
C4
|
|
31.102 | TS | Characteristics of the Universal Subscriber Identity Module (USIM) application | Under change control |
C6
|
|
31.103 | TS | Characteristics of the IP Multimedia Services Identity Module (ISIM) application | Under change control |
C6
|
|
31.111 | TS | Universal Subscriber Identity Module (USIM) Application Toolkit (USAT) | Under change control |
C6
|
|
33.102 | TS | 3G security; Security architecture | Under change control |
S3
|
|
33.103 | TS | 3G security; Integration guidelines | Under change control |
S3
|
|
33.105 | TS | 3G Security; Cryptographic algorithm requirements | Under change control |
S3
|
|
33.106 | TS | 3G security; Lawful interception requirements | Under change control |
S3
|
|
33.107 | TS | 3G security; Lawful interception architecture and functions | Under change control |
S3
|
|
33.108 | TS | 3G security; Handover interface for Lawful Interception (LI) | Under change control |
S3
|
|
33.200 | TS | 3G Security; Network Domain Security (NDS); Mobile Application Part (MAP) application layer security | Under change control |
S3
|
|
33.203 | TS | 3G security; Access security for IP-based services | Under change control |
S3
|
|
33.210 | TS | Network Domain Security (NDS); IP network layer security | Under change control |
S3
|
|
33.220 | TS | Generic Authentication Architecture (GAA); Generic Bootstrapping Architecture (GBA) | Under change control |
S3
|
|
33.221 | TS | Generic Authentication Architecture (GAA); Support for subscriber certificates | Under change control |
S3
|
|
33.222 | TS | Generic Authentication Architecture (GAA); Access to network application functions using Hypertext Transfer Protocol over Transport Layer Security (HTTPS) | Under change control |
S3
|
|
33.246 | TS | 3G Security; Security of Multimedia Broadcast/Multicast Service (MBMS) | Under change control |
S3
|
|
33.310 | TS | Network Domain Security (NDS); Authentication Framework (AF) | Under change control |
S3
|
|
35.201 | TS | 3G Security; Specification of the 3GPP confidentiality and integrity algorithms; Document 1: f8 and f9 specification | Under change control |
S3
|
|
35.206 | TS | 3G Security; Specification of the MILENAGE algorithm set: An example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 2: Algorithm specification | Under change control |
S3
|
|
36.300 | TS | Evolved Universal Terrestrial Radio Access (E-UTRA) and Evolved Universal Terrestrial Radio Access Network (E-UTRAN); Overall description; Stage 2 | Under change control |
R2
|
|
42.009 | TS | Security aspects | Under change control |
S3
|
|
43.020 | TS | Security related network functions | Under change control |
S3
|
|
43.035 | TS | Immediate Service Termination (IST); Stage 2 | Withdrawn under change control |
S3
|
|
55.205 | TS | Specification of the GSM-MILENAGE algorithms: An example algorithm set for the GSM Authentication and Key Generation Functions A3 and A8 | Under change control |
S3
|
|
55.216 | TS | 3G Security; Specification of the A5/3 encryption algorithms for GSM and ECSD, and the GEA3 encryption algorithm for GPRS; Document 1: A5/3 and GEA3 specifications | Under change control |
S3
|
|
55.217 | TS | 3G Security; Specification of the A5/3 encryption algorithms for GSM and ECSD, and the GEA3 encryption algorithm for GPRS; Document 2: Implementors' test data | Under change control |
S3
|
|
55.218 | TS | 3G Security; Specification of the A5/3 encryption algorithms for GSM and ECSD, and the GEA3 encryption algorithm for GPRS; Document 3: Design conformance test data | Under change control |
S3
|
|
55.226 | TS | 3G Security; Specification of the A5/4 Encryption Algorithms for GSM and ECSD, and the GEA4 Encryption Algorithm for GPRS | Under change control |
S3
|
|
55.919 | TR | 3G Security; Specification of the A5/3 encryption algorithms for GSM and ECSD, and the GEA3 encryption algorithm for GPRS; Document 4: Design and evaluation report | Under change control |
S3
|
|