01.31 | TR | Fraud Information Gathering System (FIGS); Service requirements; Stage 0 | Under change control |
S3
|
|
01.33 | TR | Lawful Interception requirements for GSM | Under change control |
S3
|
|
01.61 | TS | General Packet Radio Service (GPRS); GPRS ciphering algorithm requirements | Under change control |
S3
|
|
02.09 | TS | Security aspects | Under change control |
S3
|
|
02.31 | TS | Fraud Information Gathering System (FIGS); Service description; Stage 1 | Under change control |
S3
|
|
02.32 | TS | Immediate Service Termination (IST); Service description; Stage 1 | Under change control |
S3
|
|
02.33 | TS | Lawful Interception (LI); Stage 1 | Under change control |
S3
|
|
03.20 | TS | Security-related network functions | Under change control |
S3
|
|
03.20ext | TS | Security-related fetwork functions (Ext) | Under change control |
S3
|
|
03.31 | TS | Fraud Information Gathering System (FIGS); Service description; Stage 2 | Under change control |
S3
|
|
03.33 | TS | 3G Security; Lawful Interception; Stage 2 | Under change control |
S3
|
|
03.35 | TS | Immediate Service Termination (IST); Stage 2 | Under change control |
S3
|
|
10.20 | TR | Lawful Interception requirements for GSM | Under change control |
S3
|
|
21.133 | TS | 3G security; Security threats and requirements | Under change control |
S3
|
|
22.031 | TS | 3G Security; Fraud Information Gathering System (FIGS); Service description; Stage 1 | Under change control |
S3
|
|
22.032 | TS | Immediate Service Termination (IST); Service description; Stage 1 | Under change control |
S3
|
|
23.031 | TS | 3G Security; Fraud Information Gathering System (FIGS); Technical realization; Stage 2 | Under change control |
S3
|
|
23.035 | TS | Immediate Service Termination (IST); Stage 2 | Under change control |
S3
|
|
33.102 | TS | 3G security; Security architecture | Under change control |
S3
|
|
33.103 | TS | 3G security; Integration guidelines | Under change control |
S3
|
|
33.105 | TS | 3G Security; Cryptographic algorithm requirements | Under change control |
S3
|
|
33.106 | TS | 3G security; Lawful interception requirements | Under change control |
S3
|
|
33.107 | TS | 3G security; Lawful interception architecture and functions | Under change control |
S3
|
|
33.108 | TS | 3G security; Handover interface for Lawful Interception (LI) | Under change control |
S3
|
|
33.109 | TS | Bootstrapping of application security using AKA and support for subscriber certificates; System description | Withdrawn before change control |
S3
|
|
33.110 | TS | Key establishment between a Universal Integrated Circuit Card (UICC) and a terminal | Under change control |
S3
|
|
33.116 | TS | Security Assurance Specification (SCAS) for the MME network product class | Under change control |
S3
|
|
33.117 | TS | Catalogue of general security assurance requirements | Under change control |
S3
|
|
33.120 | TS | Security Objectives and Principles | Under change control |
S3
|
|
33.122 | TS | Security aspects of Common API Framework (CAPIF) for 3GPP northbound APIs | Under change control |
S3
|
|
33.126 | TS | Lawful Interception requirements | Under change control |
S3
|
|
33.127 | TS | Lawful Interception (LI) architecture and functions | Under change control |
S3
|
|
33.128 | TS | Security; Protocol and procedures for Lawful Interception (LI); Stage 3 | Under change control |
S3
|
|
33.141 | TS | Presence service; Security | Under change control |
S3
|
|
33.163 | TS | Battery Efficient Security for very low throughput Machine Type Communication (MTC) devices (BEST) | Under change control |
S3
|
|
33.178 | TS | Security aspects of early IP Multimedia Subsystem (IMS) | Withdrawn before change control |
S3
|
|
33.179 | TS | Security of Mission Critical Push To Talk (MCPTT) over LTE | Under change control |
S3
|
|
33.180 | TS | Security of the Mission Critical (MC) service | Under change control |
S3
|
|
33.185 | TS | Security aspect for LTE support of Vehicle-to-Everything (V2X) services | Under change control |
S3
|
|
33.187 | TS | Security aspects of Machine-Type Communications (MTC) and other mobile data applications communications enhancements | Under change control |
S3
|
|
33.199 | TS | Catalogue of General Security Assurance Requirements | Withdrawn before change control |
S3
|
|
33.200 | TS | 3G Security; Network Domain Security (NDS); Mobile Application Part (MAP) application layer security | Under change control |
S3
|
|
33.201 | TS | Access domain security | Withdrawn before change control |
S3
|
|
33.203 | TS | 3G security; Access security for IP-based services | Under change control |
S3
|
|
33.204 | TS | 3G Security; Network Domain Security (NDS); Transaction Capabilities Application Part (TCAP) user security | Under change control |
S3
|
|
33.210 | TS | Network Domain Security (NDS); IP network layer security | Under change control |
S3
|
|
33.216 | TS | Security Assurance Specification (SCAS) for the evolved Node B (eNB) network product class | Under change control |
S3
|
|
33.220 | TS | Generic Authentication Architecture (GAA); Generic Bootstrapping Architecture (GBA) | Under change control |
S3
|
|
33.221 | TS | Generic Authentication Architecture (GAA); Support for subscriber certificates | Under change control |
S3
|
|
33.222 | TS | Generic Authentication Architecture (GAA); Access to network application functions using Hypertext Transfer Protocol over Transport Layer Security (HTTPS) | Under change control |
S3
|
|