More filter options Items per page
select
Type
select
Meeting
select
Status
select
Data pager
Data pager
1
Page size:
PageSizeComboBox
select
283 contributions found, displaying 1 to 283
TdocTypeTitleSourceStatusForMeetingAgenda itemRevision ofRevised ToExtra info
Details of ContributionS3-190882pCRIssue of Alignment of the terms Private network and NPNSAMSUNGavailableApprovalSA3#94-Ad Hoc
5.15
 
Spec: 33.819
Details of ContributionS3-190881pCRKey Issue proposal on location measurement tampering for FS_eLCS_SecPhilips International B.V.availableApprovalSA3#94-Ad Hoc
5.12
 
Spec: 33.814
Details of ContributionS3-190880discussion(FS_UP_IP_Sec) Integrity protection of the User Plane -New key Issue - Reporting Integrity check failures to the networkBT plcavailableDecisionSA3#94-Ad Hoc
5.17
 
Details of ContributionS3-190879otherTLMSP, A Proxy Transport Layer Secure ProtocolNCSCavailableDiscussionSA3#94-Ad Hoc
5.1
 
Details of ContributionS3-190878pCRMobility between TNGFs within the Trusted Non-3GPP Access Network (TNAN)Nokia, Nokia Shanghai BellavailableApprovalSA3#94-Ad Hoc
5.7
 
Spec: 33.807
Details of ContributionS3-190877pCRMobility between TNAPs within the Trusted Non-3GPP Access Network (TNAN)Nokia, Nokia Shanghai BellavailableApprovalSA3#94-Ad Hoc
5.7
 
Spec: 33.807
Details of ContributionS3-190876pCRProtection of N9 interface in Inter-PLMN scenarioNokia, Nokia Shanghai BellavailableApprovalSA3#94-Ad Hoc
5.1
 
Spec: 33.855
Details of ContributionS3-190875pCRRemoval of Editor’s Note in Solution#6Lenovo, Motorola MobilityavailableApprovalSA3#94-Ad Hoc
5.7
 
Spec: 33.807
Details of ContributionS3-190874pCRService access authorization within a NF Set or NF Service SetNokia, Nokia Shanghai BellavailableApprovalSA3#94-Ad Hoc
5.1
 
Spec: 33.855
Details of ContributionS3-190873pCRIndirect communication between NFs in roaming scenariosNokia, Nokia Shanghai BellavailableApprovalSA3#94-Ad Hoc
5.1
 
Spec: 33.855
Details of ContributionS3-190872pCRAuthorization of NF service access in SCPNokia, Nokia Shanghai BellavailableApprovalSA3#94-Ad Hoc
5.1
 
Spec: 33.855
Details of ContributionS3-190871pCRNF to NF authenticaton and authorization in Indirect communication modeNokia, Nokia Shanghai BellavailableApprovalSA3#94-Ad Hoc
5.1
 
Spec: 33.855
Details of ContributionS3-190870pCRSolution on Authentication Relay AttackLenovo, Motorola MobilityavailableApprovalSA3#94-Ad Hoc
5.9
 
Spec: 33.809
Details of ContributionS3-190869pCRSecurity aspects of Service Communication Proxy (SCP)Nokia, Nokia Shanghai BellavailableApprovalSA3#94-Ad Hoc
5.1
 
Spec: 33.855
Details of ContributionS3-190868pCRSolution Evaluations and Conclusion on KI#1Lenovo, Motorola MobilityavailableApprovalSA3#94-Ad Hoc
5.8
 
Spec: 33.815
Details of ContributionS3-190867pCRPrivacy for Slice AuthenticationLenovo, Motorola MobilityavailableApprovalSA3#94-Ad Hoc
5.11
 
Spec: 33.813
Details of ContributionS3-190866pCRSolution for AS security during RRC Idle mode Samsung available-SA3#94-Ad Hoc
5.9
 
Spec: 33.809
Details of ContributionS3-190865pCREvaluation of Solution #2Samsungavailable-SA3#94-Ad Hoc
5.9
 
Spec: 33.809
Details of ContributionS3-190864otherScope for the study on security for NR Integrated Access and BackhaulSamsungavailable-SA3#94-Ad Hoc
5.20
 
Details of ContributionS3-190863otherDraft TR 33.xxx - Skeleton TR on Security for NR Integrated Access and BackhaulSamsung available-SA3#94-Ad Hoc
5.20
 
Details of ContributionS3-190862pCRKey issue on Alignment of the terms Private network and NPNSamsungavailable-SA3#94-Ad Hoc
5.15
 
Spec: 33.819
Details of ContributionS3-190861pCRNew solution for CAG access control in Non-standalone NPNs Samsungavailable-SA3#94-Ad Hoc
5.15
 
Spec: 33.819
Details of ContributionS3-190860pCRKey issue on CAG access control in Non-standalone NPNsSamsungavailable-SA3#94-Ad Hoc
5.15
 
Spec: 33.819
Details of ContributionS3-190859pCRSolution for secure storage of SNPN access credentialsSamsung, Intelavailable-SA3#94-Ad Hoc
5.15
 
Spec: 33.819
Details of ContributionS3-190858pCRKey issue on secure storage of SNPN access credentialsSamsung, Intelavailable-SA3#94-Ad Hoc
5.15
 
Spec: 33.819
Details of ContributionS3-190857pCRRapporteur correction to TR 33819Nokia, Nokia Shanghai BellavailableApprovalSA3#94-Ad Hoc
5.15
 
Spec: 33.819
Details of ContributionS3-190856pCRKI on authentication and authorization of NPN subscribers by a 5G external entityNokia, Nokia Shanghai BellavailableApprovalSA3#94-Ad Hoc
5.15
 
Spec: 33.819
Details of ContributionS3-190855pCRKI on credential storage for NPN-UesNokia, Nokia Shanghai BellavailableApprovalSA3#94-Ad Hoc
5.15
 
Spec: 33.819
Details of ContributionS3-190854pCRSolution for UE authentication to PLMN integrated NPNNokia, Nokia Shanghai BellavailableApprovalSA3#94-Ad Hoc
5.15
 
Spec: 33.819
Details of ContributionS3-190853discussionDiscussion on Authentication of UE to PLMN integrated NPNNokia, Nokia Shanghai BellavailableEndorsementSA3#94-Ad Hoc
5.15
 
Details of ContributionS3-190852pCRSolution on PLMN service access via NPNNokia, Nokia Shanghai BellavailableApprovalSA3#94-Ad Hoc
5.15
 
Spec: 33.819
Details of ContributionS3-190851pCRSolution on SNPN service access via PLMNNokia, Nokia Shanghai BellavailableApprovalSA3#94-Ad Hoc
5.15
 
Spec: 33.819
Details of ContributionS3-190850discussionDiscussion of security solutions for SNPN service access via PLMN and vice versaNokia, Nokia Shanghai BellavailableEndorsementSA3#94-Ad Hoc
5.15
 
Details of ContributionS3-190849pCRSolution on non-certificate based UE authentication in 5G NPN without AAACablelabs, Nokia, Nokia Shanghai BellavailableApprovalSA3#94-Ad Hoc
5.15
 
Spec: 33.819
Details of ContributionS3-190848pCRSolution on non-certificate based UE authentication in 5G NPN with AAACablelabs, Nokia, Nokia Shanghai BellavailableApprovalSA3#94-Ad Hoc
5.15
 
Spec: 33.819
Details of ContributionS3-190847pCREvaluation of EAP-TTLS for non-certificate based UE authentication in SNPNsCablelabs, Nokia, Nokia Shanghai BellavailableApprovalSA3#94-Ad Hoc
5.15
 
Spec: 33.819
Details of ContributionS3-190846pCRDeployment options for authentication in NPNsCablelabs, Nokia, Nokia Shanghai BellavailableApprovalSA3#94-Ad Hoc
5.15
 
Spec: 33.819
Details of ContributionS3-190845discussionDiscussion on NPN AuthenticationCablelabs, Nokia, Nokia Shanghai BellavailableEndorsementSA3#94-Ad Hoc
5.15
 
Details of ContributionS3-190844pCRSolution 15 evaluationEricssonavailableApprovalSA3#94-Ad Hoc
5.5
 
Spec: 33.835
Details of ContributionS3-190843pCRSolution 15 comment on the application keysEricssonavailableApprovalSA3#94-Ad Hoc
5.5
 
Spec: 33.835
Details of ContributionS3-190842pCRSolution 15 editorialsEricssonavailableApprovalSA3#94-Ad Hoc
5.5
 
Spec: 33.835
Details of ContributionS3-190841pCR33.846: solution for anchor keys securityGemalto N.V.availableApprovalSA3#94-Ad Hoc
5.19
 
Spec: 33.846
Details of ContributionS3-190840pCRDetailed solution 5 in TR 33.935Gemalto N.V.availableApprovalSA3#94-Ad Hoc
5.16
 
Spec: 33.935
Details of ContributionS3-190839pCRNew solution: Deriving session anchor keys with random numberZTE Corporation, NubiaavailableApprovalSA3#94-Ad Hoc
5.19
 
Spec: 33.846
Details of ContributionS3-190838pCRDetection of false relay base station by UEZTE Corporation, NubiaavailableApprovalSA3#94-Ad Hoc
5.9
 
Spec: 33.809
Details of ContributionS3-190837pCRImprovement to key issue #5ZTE Corporation, NubiaavailableApprovalSA3#94-Ad Hoc
5.9
 
Spec: 33.809
Details of ContributionS3-190836pCRModification of user identity in solution 2 and solution 3ZTE Corporation, NubiaavailableApprovalSA3#94-Ad Hoc
5.5
 
Spec: 33.835
Details of ContributionS3-190835pCRAdding evaluation for Solution #2 Apple Computer Trading Co. LtdavailableApprovalSA3#94-Ad Hoc
5.9
 
Spec: 33.809
Details of ContributionS3-190834pCRAdding evaluation for Solution #1Apple Computer Trading Co. LtdavailableApprovalSA3#94-Ad Hoc
5.9
 
Spec: 33.809
Details of ContributionS3-190833pCRID based solution against false base stationApple Computer Trading Co. LtdavailableApprovalSA3#94-Ad Hoc
5.9
 
Spec: 33.809
Details of ContributionS3-190832pCRKI#2 in TR 33.809 – new solution for tamper resistant SI messagesEricssonavailableApprovalSA3#94-Ad Hoc
5.9
 
Spec: 33.809
Details of ContributionS3-190831pCRKI#2 in TR 33.809 – updated details (cleanup)EricssonavailableApprovalSA3#94-Ad Hoc
5.9
 
Spec: 33.809
Details of ContributionS3-190830pCRNew annex in TR 33.809 - summary of PWS security studyEricssonavailableApprovalSA3#94-Ad Hoc
5.9
 
Spec: 33.809
Details of ContributionS3-190829pCRKI#1 in TR 33.809 - new solution with netwrok controlled RRC Reject messageEricssonavailableApprovalSA3#94-Ad Hoc
5.9
 
Spec: 33.809
Details of ContributionS3-190828pCRKI#3 in TR 33.809 - conclusion on second requirement (reactive action)EricssonavailableApprovalSA3#94-Ad Hoc
5.9
 
Spec: 33.809
Details of ContributionS3-190827pCRKI#3 in TR 33.809 - new solution for enriched measurement reportsEricssonavailableApprovalSA3#94-Ad Hoc
5.9
 
Spec: 33.809
Details of ContributionS3-190826pCRKI#3 in TR 33.809 - updates to requirementsEricssonavailableApprovalSA3#94-Ad Hoc
5.9
 
Spec: 33.809
Details of ContributionS3-190825pCRKI#3 in TR 33.809 - updates to updates to details and threatsEricssonavailableApprovalSA3#94-Ad Hoc
5.9
 
Spec: 33.809
Details of ContributionS3-190824pCRUpdates to KI #14EricssonavailableApprovalSA3#94-Ad Hoc
5.5
 
Spec: 33.835
Details of ContributionS3-190823pCRNew Solution Key LifetimeEricssonavailableApprovalSA3#94-Ad Hoc
5.5
 
Spec: 33.835
Details of ContributionS3-190822pCRConclusion to Solution #14EricssonavailableApprovalSA3#94-Ad Hoc
5.5
 
Spec: 33.835
Details of ContributionS3-190821pCRUpdates to Solution #14EricssonavailableApprovalSA3#94-Ad Hoc
5.5
 
Spec: 33.835
Details of ContributionS3-190820pCRCorrection to solution #3 ‘Security policy handling for redundant data transmission’EricssonavailableApprovalSA3#94-Ad Hoc
5.13
 
Spec: 33.825
Details of ContributionS3-190819pCRNew solution for security for redundant data transmission using Dual Connectivity proceduresEricssonavailableApprovalSA3#94-Ad Hoc
5.13
 
Spec: 33.825
Details of ContributionS3-190818pCRSolution #Y: Security for redundant data transmission using Dual ConnectivityEricssonavailableApprovalSA3#94-Ad Hoc
5.13
 
Spec: 33.825
Details of ContributionS3-190817pCREvaluation to Solution #5 ‘Security solution for small data included in initial NAS signalling at mobility’EricssonavailableApprovalSA3#94-Ad Hoc
5.6
 
Spec: 33.861
Details of ContributionS3-190816pCREvaluation to Solution #4 ‘Security solution for UL small data transfer in RRC Suspend and Resume with early data transmission (EDT)’EricssonavailableApprovalSA3#94-Ad Hoc
5.6
 
Spec: 33.861
Details of ContributionS3-190815pCREvaluation to Solution #3 ‘Security solution for MO SMS at AMF re-allocation’EricssonavailableApprovalSA3#94-Ad Hoc
5.6
 
Spec: 33.861
Details of ContributionS3-190814pCRSolution for key separation based on slice authentication keysEricssonavailableApprovalSA3#94-Ad Hoc
5.11
 
Spec: 33.813
Details of ContributionS3-190813pCRUpdate on EAP-AKA´ PFSEricssonavailableApprovalSA3#94-Ad Hoc
5.19
 
Spec: 33.846
Details of ContributionS3-190812pCRNew solution: EAP-AKA´ PFSEricssonavailableApprovalSA3#94-Ad Hoc
5.19
 
Spec: 33.846
Details of ContributionS3-190811pCRNew KI: Leakage of long-term keyEricssonavailableApprovalSA3#94-Ad Hoc
5.19
 
Spec: 33.846
Details of ContributionS3-190810pCRScope for TR 33.846EricssonavailableApprovalSA3#94-Ad Hoc
5.19
 
Spec: 33.846
Details of ContributionS3-190809pCRSkeleton for TR 33.846EricssonavailableApprovalSA3#94-Ad Hoc
5.19
 
Spec: 33.846
Details of ContributionS3-190808pCREvaluation of solution 3EricssonavailableApprovalSA3#94-Ad Hoc
5.5
 
Spec: 33.835
Details of ContributionS3-190807pCRProtocol details for solution 3EricssonavailableApprovalSA3#94-Ad Hoc
5.5
 
Spec: 33.835
Details of ContributionS3-190806pCREvaluation of solution 2EricssonavailableApprovalSA3#94-Ad Hoc
5.5
 
Spec: 33.835
Details of ContributionS3-190805pCRSCAS NRF: Scope Representation for Nnrf_AccessToken ServiceNokia, Nokia Shanghai BellavailableApprovalSA3#94-Ad Hoc
4.1.8
 
Spec: 33.518
Details of ContributionS3-190804pCRpCR: New KI: Efficient handling of PDCP discardTimer expiry on the UE UplinkQualcomm IncorporatedavailableApprovalSA3#94-Ad Hoc
5.17
S3-190386
Spec: 33.853
Details of ContributionS3-190803pCRpCR: New KI: Ability to prioritize certain PDCP packets on the UE uplinkQualcomm IncorporatedavailableApprovalSA3#94-Ad Hoc
5.17
S3-190387
Spec: 33.853
Details of ContributionS3-190802pCRpCR: New KI: Integrity Algorithm independenceQualcomm IncorporatedavailableApprovalSA3#94-Ad Hoc
5.17
S3-190388
Spec: 33.853
Details of ContributionS3-190801pCRpCR: Reusing KAUSF for AKMAQualcomm IncorporatedavailableApprovalSA3#94-Ad Hoc
5.5
S3-190385
Spec: 33.835
Details of ContributionS3-190800pCRAdding an evaluation to solution #9 in TR 33.861Qualcomm IncorporatedavailableApprovalSA3#94-Ad Hoc
5.6
 
Spec: 33.861
Details of ContributionS3-190799pCRKAMF separation using a standalone SEAFQualcomm IncorporatedavailableApprovalSA3#94-Ad Hoc
5.11
 
Spec: 33.813
Details of ContributionS3-190798pCRChanging the security requirement for KI #2Qualcomm IncorporatedavailableApprovalSA3#94-Ad Hoc
5.9
 
Spec: 33.809
Details of ContributionS3-190797pCRConclusion on KI #8 for Study on the security for URLLCQualcomm IncorporatedavailableApprovalSA3#94-Ad Hoc
5.13
 
Spec: 33.825
Details of ContributionS3-190796pCRConclusion on KI #6 for Study on the security for URLLCQualcomm IncorporatedavailableApprovalSA3#94-Ad Hoc
5.13
 
Spec: 33.825
Details of ContributionS3-190795pCRConclusion on KI #4 for Study on the security for URLLCQualcomm IncorporatedavailableApprovalSA3#94-Ad Hoc
5.13
 
Spec: 33.825
Details of ContributionS3-190794pCRConclusion on KI #3 for Study on the security for URLLCQualcomm IncorporatedavailableApprovalSA3#94-Ad Hoc
5.13
 
Spec: 33.825
Details of ContributionS3-190793pCRProtection against Man-in-the-Middle false base station attacksQualcomm IncorporatedavailableApprovalSA3#94-Ad Hoc
5.9
S3-190381
Spec: 33.809
Details of ContributionS3-190792pCRSecurity protection of small data at idle mode mobilityQualcomm IncorporatedavailableApprovalSA3#94-Ad Hoc
5.6
 
Spec: 33.861
Details of ContributionS3-190791pCRProposed solution for protecting the S-NSSAI for transmission at the AS layerQualcomm IncorporatedavailableApprovalSA3#94-Ad Hoc
5.11
 
Spec: 33.813
Details of ContributionS3-190790pCRProposed solution to key issue #1.1 in TR 33.819Qualcomm IncorporatedavailableApprovalSA3#94-Ad Hoc
5.15
 
Spec: 33.819
Details of ContributionS3-190789pCRAdding network binding requirement to the keys issue #1.1 on standalone public networksQualcomm IncorporatedavailableApprovalSA3#94-Ad Hoc
5.15
 
Spec: 33.819
Details of ContributionS3-190788pCRProposed addition to key issue#1.1 for standalone non-public networksQualcomm IncorporatedavailableApprovalSA3#94-Ad Hoc
5.15
 
Spec: 33.819
Details of ContributionS3-190787pCRProposed solution to the key hierarchy for non-public networksQualcomm IncorporatedavailableApprovalSA3#94-Ad Hoc
5.15
 
Spec: 33.819
Details of ContributionS3-190786pCRAdding an evaluation to solution #10 in TR 33.861Qualcomm IncorporatedavailableApprovalSA3#94-Ad Hoc
5.6
 
Spec: 33.861
Details of ContributionS3-190785pCRResolving the editor’s note in solution #10 in TR 33.861Qualcomm IncorporatedavailableApprovalSA3#94-Ad Hoc
5.6
 
Spec: 33.861
Details of ContributionS3-190784pCRAcknowledging the multiple possible mobility solutions for CP small dataQualcomm IncorporatedavailableApprovalSA3#94-Ad Hoc
5.6
 
Spec: 33.861
Details of ContributionS3-190783pCRProposed update for Solution #2 AS and NAS security based on the emergency call proceduresQualcomm IncorporatedavailableApprovalSA3#94-Ad Hoc
5.8
 
Spec: 33.815
Details of ContributionS3-190782pCRProposed evaluation for Solution #2 AS and NAS security based on the emergency call proceduresQualcomm IncorporatedavailableApprovalSA3#94-Ad Hoc
5.8
 
Spec: 33.815
Details of ContributionS3-190781pCRProposed evaluation for Solution #1 AS and NAS security for RLOS servicesQualcomm IncorporatedavailableApprovalSA3#94-Ad Hoc
5.8
 
Spec: 33.815
Details of ContributionS3-190780pCRSCAS SEPP: Serving PLMN ID MismatchNokia, Nokia Shanghai BellavailableApprovalSA3#94-Ad Hoc
4.1.7
 
Spec: 33.517
Details of ContributionS3-190779draftCRSCAS 5G: Search Result Handling for NF DiscoveryNokia, Nokia Shanghai BellavailableApprovalSA3#94-Ad Hoc
4.1.10
 
Details of ContributionS3-190778draftCRSCAS 5G: update to Access Token Verification Failure in roaming caseNokia, Nokia Shanghai BellavailableApprovalSA3#94-Ad Hoc
4.1.10
 
Details of ContributionS3-190777draftCRSCAS 5G: update to Access Token Verification Failure in non-roaming caseNokia, Nokia Shanghai BellavailableApprovalSA3#94-Ad Hoc
4.1.10
 
Details of ContributionS3-190776pCRCertificate based solution against false base stationApple Computer Trading Co. LtdavailableApprovalSA3#94-Ad Hoc
5.9
 
Spec: 33.809
Details of ContributionS3-190775draftCRSCAS 5G: mutual authentication between NFsNokia, Nokia Shanghai BellavailableApprovalSA3#94-Ad Hoc
4.1.10
 
Details of ContributionS3-190774pCRResolving Editor's notes in solution 6China Mobile Com. Corporationavailable-SA3#94-Ad Hoc
5.5
 
Spec: 33.835
Details of ContributionS3-190773pCRpCR to 33935 - addition of detailed solution 4bVODAFONE Group PlcavailableApprovalSA3#94-Ad Hoc
5.16
 
Spec: 33.935
Details of ContributionS3-190772pCRKey issue on UE location privacy settingLG ElectronicsavailableApprovalSA3#94-Ad Hoc
5.12
 
Spec: 33.814
Details of ContributionS3-190771pCRKey issue on Granularity of isolation for slice specific securityLG ElectronicsavailableApprovalSA3#94-Ad Hoc
5.11
 
Spec: 33.813
Details of ContributionS3-190770otherScope proposal for eV2X security studyLG ElectronicsavailableApprovalSA3#94-Ad Hoc
5.21
 
Details of ContributionS3-190769otherSkeleton of eV2X security studyLG ElectronicsavailableApprovalSA3#94-Ad Hoc
5.21
 
Details of ContributionS3-190768pCRpCR to 33935 - addition section 4.1 OverviewVODAFONE Group PlcavailableApprovalSA3#94-Ad Hoc
5.16
 
Spec: 33.935
Details of ContributionS3-190767pCRAKMA Architecture and procedures with the anchor function as NEFChina Mobile Com. Corporationavailable-SA3#94-Ad Hoc
5.5
 
Spec: 33.835
Details of ContributionS3-190766pCR KSEAF enhancement for 5G AKA protocolChina Mobile Com. Corporationavailable-SA3#94-Ad Hoc
5.19
 
Spec: 33.846
Details of ContributionS3-190765pCRECIES based security enhancement for the key KSEAFChina Mobile Com. Corporationavailable-SA3#94-Ad Hoc
5.19
 
Spec: 33.846
Details of ContributionS3-190764pCRKSEAF enhancement for the EAP-AKA’ protocolChina Mobile Com. Corporationavailable-SA3#94-Ad Hoc
5.19
 
Spec: 33.846
Details of ContributionS3-190763pCRSecurity enhancement for the key KSEAF based on the symmetric algorithm China Mobile Com. Corporationavailable-SA3#94-Ad Hoc
5.19
 
Spec: 33.846
Details of ContributionS3-190762pCRKey issue to resist the linkability attacksChina Mobile Com. Corporationavailable-SA3#94-Ad Hoc
5.19
 
Spec: 33.846
Details of ContributionS3-190761pCRKey issue to mitigate the DDoS attacks on the UDMChina Mobile Com. Corporationavailable-SA3#94-Ad Hoc
5.19
 
Spec: 33.846
Details of ContributionS3-190760pCRKey issue to ensure the security of session anchor keysChina Mobile Com. Corporationavailable-SA3#94-Ad Hoc
5.19
 
Spec: 33.846
Details of ContributionS3-190759pCRKey issue regarding the minimal computational cost when generating session anchor keysChina Mobile Com. Corporationavailable-SA3#94-Ad Hoc
5.19
 
Spec: 33.846
Details of ContributionS3-190758pCRConsiderations on SECAM of the virtualized network productsChina Mobile Com. Corporationavailable-SA3#94-Ad Hoc
5.14
 
Spec: 33.818
Details of ContributionS3-190757pCRConsiderations on network product class when using NFV technologyChina Mobile Com. Corporationavailable-SA3#94-Ad Hoc
5.14
 
Spec: 33.818
Details of ContributionS3-190756pCRNew solution: Effective privacy control in LCSEricssonavailableApprovalSA3#94-Ad Hoc
5.12
 
Spec: 33.814
Details of ContributionS3-190755pCRNew KI: Privacy control in LCSEricssonavailableApprovalSA3#94-Ad Hoc
5.12
 
Spec: 33.814
Details of ContributionS3-190754pCRNew solution: TBS measurements from UEsEricssonavailableApprovalSA3#94-Ad Hoc
5.12
 
Spec: 33.814
Details of ContributionS3-190753pCRUpdate KI: TBS positioningEricssonavailableApprovalSA3#94-Ad Hoc
5.12
 
Spec: 33.814
Details of ContributionS3-190752pCRNew solution: Bluetooth measurements from UEsEricssonavailableApprovalSA3#94-Ad Hoc
5.12
 
Spec: 33.814
Details of ContributionS3-190751pCRNew solution: WLAN measurements from UEsEricssonavailableApprovalSA3#94-Ad Hoc
5.12
 
Spec: 33.814
Details of ContributionS3-190750pCRNew KI: Interworking between AKMA and GBAEricssonavailableApprovalSA3#94-Ad Hoc
5.5
 
Spec: 33.835
Details of ContributionS3-190749discussionThe purpose and scope of SCASEricssonavailableEndorsementSA3#94-Ad Hoc
4.1.10
 
Details of ContributionS3-190748pCRNew Solution: SUCI deconcealment for the FN-RGEricssonavailableApprovalSA3#94-Ad Hoc
5.7
 
Spec: 33.807
Details of ContributionS3-190747pCRNew Solution: Key separation for untrusted and trusted accessEricssonavailableApprovalSA3#94-Ad Hoc
5.7
 
Spec: 33.807
Details of ContributionS3-190746pCRNew Solution: New access type distinguisher for N3GPPEricssonavailableApprovalSA3#94-Ad Hoc
5.7
 
Spec: 33.807
Details of ContributionS3-190745pCRNew KI: N3GPP Key HierarchyEricssonavailableApprovalSA3#94-Ad Hoc
5.7
 
Spec: 33.807
Details of ContributionS3-190744pCRNew Key Issue: Support of a UP gateway function on the N9 interfaceEricssonavailableApprovalSA3#94-Ad Hoc
5.1
 
Spec: 33.855
Details of ContributionS3-190743pCRSecurity Assurance Requirement and test cases for SMFHuawei, HisiliconavailableApprovalSA3#94-Ad Hoc
4.1.5
 
Spec: 33.515
Details of ContributionS3-190742pCRSecurity Assurance Requirement and Test for NRFHuawei, HisiliconavailableApprovalSA3#94-Ad Hoc
4.1.8
 
Spec: 33.518
Details of ContributionS3-190741pCRSecurity Assurance Requirements and Test Case for UPFHuawei, HisiliconavailableApprovalSA3#94-Ad Hoc
4.1.3
 
Spec: 33.513
Details of ContributionS3-190740pCRSCAS: AMF-specific adaptations of security functional requirements and related test casesHuawei, HisiliconavailableApprovalSA3#94-Ad Hoc
4.1.2
 
Spec: 33.512
Details of ContributionS3-190739pCRSolution for slice specific authorizationHuawei, HisiliconavailableApprovalSA3#94-Ad Hoc
5.11
 
Spec: 33.813
Details of ContributionS3-190738pCRRemove EN in 6.6.3Huawei, HisiliconavailableApprovalSA3#94-Ad Hoc
5.11
 
Spec: 33.813
Details of ContributionS3-190737pCRNew KI: flexible protection of data exchange on N9Huawei, HisiliconavailableApprovalSA3#94-Ad Hoc
5.1
 
Spec: 33.819
Details of ContributionS3-190736pCRNew solution for linkability attackHuawei, HisiliconavailableApprovalSA3#94-Ad Hoc
5.19
 
Spec: 33.846
Details of ContributionS3-190735pCRKey issue on linkability attackHuawei, HisiliconavailableApprovalSA3#94-Ad Hoc
5.19
 
Spec: 33.846
Details of ContributionS3-190734pCRNew solution for Authentication relay attackHuawei, HisiliconavailableApprovalSA3#94-Ad Hoc
5.9
 
Spec: 33.809
Details of ContributionS3-190733pCRNew requirment for Authentication relay attackHuawei, HisiliconavailableApprovalSA3#94-Ad Hoc
5.9
 
Spec: 33.809
Details of ContributionS3-190732pCRText for Clause 4 Security aspects of eLCSCATTavailableApprovalSA3#94-Ad Hoc
5.12
 
Spec: 33.814
Details of ContributionS3-190731pCRpCR to TR33.814 – Text for Clause IntroductionCATTavailableApprovalSA3#94-Ad Hoc
5.12
 
Spec: 33.814
Details of ContributionS3-190730pCRpCR to TR33.814 - Solution for positioning data confidentiality protectionCATTavailableApprovalSA3#94-Ad Hoc
5.12
 
Spec: 33.814
Details of ContributionS3-190729pCRpCR to TR33.814 - Key issue for positioning data confidentiality protectionCATTavailableApprovalSA3#94-Ad Hoc
5.12
 
Spec: 33.814
Details of ContributionS3-190728pCRTest Case: Connection-specific scope of IPX-provider cryptographic materialDeutsche Telekom AGavailableApprovalSA3#94-Ad Hoc
4.1.7
 
Spec: 33.517
Details of ContributionS3-190727pCRKey Issue: Secure message transport via the SCPDeutsche Telekom AGavailableApprovalSA3#94-Ad Hoc
5.1
 
Spec: 33.855
Details of ContributionS3-190726pCRKey Issue: Protection of SCP interfacesDeutsche Telekom AGavailableApprovalSA3#94-Ad Hoc
5.1
 
Spec: 33.855
Details of ContributionS3-190725pCRKey Issue: Handling of invalid IPX patchesDeutsche Telekom AGavailableApprovalSA3#94-Ad Hoc
5.1
 
Spec: 33.855
Details of ContributionS3-190724LS outDraft LS on SCP security requirementsDeutsche Telekom AGavailableApprovalSA3#94-Ad Hoc
5.1
 
To: SA2
Details of ContributionS3-190723pCRConclusion for KDF negotiation for 5G System SecurityHuawei, HisiliconavailableApprovalSA3#94-Ad Hoc
5.10
S3-190706
Spec: 33.808
Details of ContributionS3-190722pCRSolution on integrity protection of privacy setting between UE and UDMHuawei, HisiliconavailableApprovalSA3#94-Ad Hoc
5.12
 
Spec: 33.814
Details of ContributionS3-190721pCRKey Issue for privacy setting integrity between UE and homenetworkHuawei, HisiliconavailableApprovalSA3#94-Ad Hoc
5.12
 
Spec: 33.814
Details of ContributionS3-190720pCRKey Issue for encryption and integrity protection of location dataHuawei, HisiliconavailableApprovalSA3#94-Ad Hoc
5.12
 
Spec: 33.814
Details of ContributionS3-190719pCRKey Issue for encryption and integrity protection of assistance dataHuawei, HisiliconavailableApprovalSA3#94-Ad Hoc
5.12
 
Spec: 33.814
Details of ContributionS3-190718pCRSolution for updating key to broadcast assitance dataHuawei, HisiliconavailableApprovalSA3#94-Ad Hoc
5.12
 
Spec: 33.814
Details of ContributionS3-190717pCRUpdate to solution#12"DDoS attack mitigation in CIoT"Huawei, HisiliconavailableApprovalSA3#94-Ad Hoc
5.6
 
Spec: 33.861
Details of ContributionS3-190716pCRAdd evaluation to soluiton 5Huawei, HisiliconavailableApprovalSA3#94-Ad Hoc
5.7
 
Spec: 33.807
Details of ContributionS3-190715pCRDelete EN for solution 5Huawei, HisiliconavailableApprovalSA3#94-Ad Hoc
5.7
 
Spec: 33.807
Details of ContributionS3-190714pCRAdd evaluation to solution #3Huawei, HisiliconavailableApprovalSA3#94-Ad Hoc
5.7
 
Spec: 33.807
Details of ContributionS3-190713pCRDelete EN for solution #3Huawei, HisiliconavailableApprovalSA3#94-Ad Hoc
5.7
 
Spec: 33.807
Details of ContributionS3-190712pCRConclusion on KI#1Huawei, HisiliconavailableApprovalSA3#94-Ad Hoc
5.7
 
Spec: 33.807
Details of ContributionS3-190711pCRAdd content to section 4Huawei, HisiliconreservedApprovalSA3#94-Ad Hoc
5.7
 
Spec: 33.807
Details of ContributionS3-190710pCRAdd content to Introduction clauseHuawei, HisiliconavailableApprovalSA3#94-Ad Hoc
5.7
 
Spec: 33.807
Details of ContributionS3-190709pCRAdd content to section 4Huawei, HisiliconavailableApprovalSA3#94-Ad Hoc
5.7
 
Spec: 33.807
Details of ContributionS3-190708pCRUP IP for Option 4Huawei, HisiliconavailableApprovalSA3#94-Ad Hoc
5.17
 
Spec: 33.853
Details of ContributionS3-190707pCRSupport UP_IP in option 7Huawei, HisiliconavailableApprovalSA3#94-Ad Hoc
5.17
 
Spec: 33.853
Details of ContributionS3-190706pCRConclusion for KDF negotiation for 5G System SecurityHuawei, HisiliconrevisedApprovalSA3#94-Ad Hoc
5.6
  S3-190723
Spec: 33.808
Details of ContributionS3-190705pCRSolution to Migitate DDoS Attack based on RANHuawei, HisiliconavailableApprovalSA3#94-Ad Hoc
5.6
 
Spec: 33.861
Details of ContributionS3-190704pCRSolution to identify misbehaving UEsHuawei, HisiliconavailableApprovalSA3#94-Ad Hoc
5.6
 
Spec: 33.861
Details of ContributionS3-190703pCRSolution for Key freshness in AKMAHuawei, HisiliconavailableApprovalSA3#94-Ad Hoc
5.5
 
Spec: 33.835
Details of ContributionS3-190702pCRKey issue on Key freshness in AKMAHuawei, HisiliconavailableApprovalSA3#94-Ad Hoc
5.5
 
Spec: 33.835
Details of ContributionS3-190701pCREvaluation of solution 4Huawei, HisiliconavailableApprovalSA3#94-Ad Hoc
5.5
 
Spec: 33.835
Details of ContributionS3-190700discussionDiscussion on NPN authenticationHuawei, HiSiliconavailableEndorsementSA3#94-Ad Hoc
5.15
 
Details of ContributionS3-190699pCRAmendment to KI#6Huawei, HiSiliconavailableApprovalSA3#94-Ad Hoc
5.11
 
Spec: 33.813
Details of ContributionS3-190698pCRAmendment to solution #3Huawei, HiSiliconavailableApprovalSA3#94-Ad Hoc
5.11
 
Spec: 33.813
Details of ContributionS3-190697pCRAmendment to solution #2Huawei, HiSiliconavailableApprovalSA3#94-Ad Hoc
5.11
 
Spec: 33.813
Details of ContributionS3-190696discussionDiscussion on provisioning security features for a network sliceHuawei, HiSiliconavailableDiscussionSA3#94-Ad Hoc
5.11
 
Details of ContributionS3-190695pCRAMF key separation solution 3Huawei, HiSiliconavailableApprovalSA3#94-Ad Hoc
5.11
 
Spec: 33.813
Details of ContributionS3-190694pCRAMF key separation solution 2Huawei, HiSiliconavailableApprovalSA3#94-Ad Hoc
5.11
 
Spec: 33.813
Details of ContributionS3-190693pCRAMF key separation solution 1Huawei, HiSiliconavailableApprovalSA3#94-Ad Hoc
5.11
 
Spec: 33.813
Details of ContributionS3-190692discussionDiscussions on solutions to AMF key separationHuawei, HiSiliconavailableDiscussionSA3#94-Ad Hoc
5.11
 
Details of ContributionS3-190691pCRSolution Proposal based on DH between UE and AUSFHuawei, HiSiliconavailableApprovalSA3#94-Ad Hoc
5.19
 
Spec: 33.846
Details of ContributionS3-190690pCRA key issue on the long-term key and its related anchor key leakageHuawei, HiSiliconavailableApprovalSA3#94-Ad Hoc
5.19
 
Spec: 33.846
Details of ContributionS3-190689pCRDynamic UP security policy control solution for URLLCHuawei, HiSiliconavailableApprovalSA3#94-Ad Hoc
5.13
 
Spec: 33.825
Details of ContributionS3-190688pCRimprovement for AKMA architectureHuawei, HiSiliconavailableApprovalSA3#94-Ad Hoc
5.5
 
Spec: 33.835
Details of ContributionS3-190687pCRconclusion for key issue 2Huawei, HiSiliconavailableApprovalSA3#94-Ad Hoc
5.13
 
Spec: 33.825
Details of ContributionS3-190686pCRconclusion for key issue 1Huawei, HiSiliconavailableApprovalSA3#94-Ad Hoc
5.13
 
Spec: 33.825
Details of ContributionS3-190685pCRsolution1 and evaluation updateHuawei, HiSiliconavailableApprovalSA3#94-Ad Hoc
5.13
 
Spec: 33.825
Details of ContributionS3-190684pCRconclusion for key issue 4Huawei, HiSiliconavailableApprovalSA3#94-Ad Hoc
5.13
 
Spec: 33.825
Details of ContributionS3-190683pCRevaluation of solution 3Huawei, HiSiliconavailableApprovalSA3#94-Ad Hoc
5.13
 
Spec: 33.825
Details of ContributionS3-190682pCRURLLC solution5 updateHuawei, HiSiliconavailableApprovalSA3#94-Ad Hoc
5.13
 
Spec: 33.825
Details of ContributionS3-190681pCRoverall introductionHuawei, HiSiliconavailableApprovalSA3#94-Ad Hoc
5.13
 
Spec: 33.825
Details of ContributionS3-190680pCRdeleting the EN of solution3Huawei, HiSiliconavailableApprovalSA3#94-Ad Hoc
5.13
 
Spec: 33.825
Details of ContributionS3-190679pCRsolution 2 clarificationHuawei, HiSiliconavailableApprovalSA3#94-Ad Hoc
5.13
 
Spec: 33.825
Details of ContributionS3-190678pCRconclusion for key issue 6Huawei, HiSiliconavailableApprovalSA3#94-Ad Hoc
5.13
 
Spec: 33.825
Details of ContributionS3-190677pCRconclusion for key issue 3Huawei, HiSiliconavailableApprovalSA3#94-Ad Hoc
5.13
 
Spec: 33.825
Details of ContributionS3-190676pCRCell Authenticated Access for fake base station detectionIntel Mobile Communicationsavailable-SA3#94-Ad Hoc
5.9
 
Spec: 33.809
Details of ContributionS3-190675pCRKey Issue for Fake Base StationIntel Mobile Communicationsavailable-SA3#94-Ad Hoc
5.9
 
Spec: 33.809
Details of ContributionS3-190674pCRNotifying cell information to the network when the UE determines that the network fails the authentication procedureNEC Europe LtdavailableApprovalSA3#94-Ad Hoc
5.9
 
Spec: 33.809
Details of ContributionS3-190673pCRHandling of UE configuration update by a fake base stationNEC Europe LtdavailableApprovalSA3#94-Ad Hoc
5.9
 
Spec: 33.809
Details of ContributionS3-190672draftCRLiving Document: General SBA/SBI aspects in TS 33.117Nokia, Nokia Shanghai BellavailableApprovalSA3#94-Ad Hoc
4.1.10
 
Details of ContributionS3-190671pCRMeasurement Report Requirement When UE in RRC-CONNECTEDHuawei, HisiliconavailableApprovalSA3#94-Ad Hoc
5.9
 
Spec: 33.809
Details of ContributionS3-190670pCRNew security requirement against replay of RRCResumeRequest messageHuawei, HisiliconavailableApprovalSA3#94-Ad Hoc
5.9
 
Spec: 33.809
Details of ContributionS3-190669pCRNew security requirement against tampering of RRCResumeRequest messageHuawei, HisiliconavailableApprovalSA3#94-Ad Hoc
5.9
 
Spec: 33.809
Details of ContributionS3-190668pCRRRCResume replay protectionHuawei, HisiliconavailableApprovalSA3#94-Ad Hoc
5.9
 
Spec: 33.809
Details of ContributionS3-190667pCRProtection of RRSResumeCauseHuawei, HisiliconavailableApprovalSA3#94-Ad Hoc
5.9
 
Spec: 33.809
Details of ContributionS3-190666pCRMeasurement report requirement for the case when the UE in RRC-IDLE & RRC-INACTIVEHuawei, HisiliconavailableApprovalSA3#94-Ad Hoc
5.9
 
Spec: 33.809
Details of ContributionS3-190665pCRAvoiding UE connecting to fake base station during HOHuawei, HisiliconavailableApprovalSA3#94-Ad Hoc
5.9
 
Spec: 33.809
Details of ContributionS3-190664pCRProtection for Incoming Paging Message Based on Stored Security ContextHuawei, HisiliconavailableApprovalSA3#94-Ad Hoc
5.9
 
Spec: 33.809
Details of ContributionS3-190663pCRPropose a new KI and security requirement for spoofing paging messagesHuawei, HisiliconavailableApprovalSA3#94-Ad Hoc
5.9
 
Spec: 33.809
Details of ContributionS3-190662pCRDelete the EN related to the “AttackInformationNotification” messageHuawei, HisiliconavailableApprovalSA3#94-Ad Hoc
5.6
 
Spec: 33.861
Details of ContributionS3-190661pCRDeleting EN on the usage of per-gNB and per-UE counters for solution #7 “protecting gNB from RRC DoS attack”Huawei, HisiliconavailableApprovalSA3#94-Ad Hoc
5.6
 
Spec: 33.861
Details of ContributionS3-190660pCRNetwork detection of false base station from UE measurement reportsNokiaavailableApprovalSA3#94-Ad Hoc
5.9
 
Spec: 33.809
Details of ContributionS3-190659otherUE Initiated EAP AKA' PFS solutionNokiaavailableApprovalSA3#94-Ad Hoc
5.19
 
Details of ContributionS3-190658discussionDiscussion paper on UE initiated EAP AKA' with PFSNokiaavailableEndorsementSA3#94-Ad Hoc
5.19
 
Details of ContributionS3-190657pCRNSSAI protection during the RRC connection establishment procedureNEC Europe LtdavailableApprovalSA3#94-Ad Hoc
5.11
 
Spec: 33.813
Details of ContributionS3-190656pCRNSSAI protection during the RRC connection establishment procedureNEC Europe LtdavailableApprovalSA3#94-Ad Hoc
5.11
 
Spec: 33.813
Details of ContributionS3-190655pCRProtection of UE configuration against false base stationNEC Europe LtdavailableApprovalSA3#94-Ad Hoc
5.9
 
Spec: 33.809
Details of ContributionS3-190654pCRNotifying cell information to the network after authentication procedure failureNEC Europe LtdavailableApprovalSA3#94-Ad Hoc
5.9
 
Spec: 33.809
Details of ContributionS3-190653pCRNew solution for integrity protection capability imbalance in MR-DC scenariosNEC Europe LtdavailableApprovalSA3#94-Ad Hoc
5.17
 
Spec: 33.853
Details of ContributionS3-190652pCRNew key issue on integrity protection capability imbalance in MR-DC scenariosNEC Europe LtdavailableApprovalSA3#94-Ad Hoc
5.17
 
Spec: 33.853
Details of ContributionS3-190651pCRNew solution for data rate limitation of integrity protection in UP DRBNEC Europe LtdavailableApprovalSA3#94-Ad Hoc
5.17
 
Spec: 33.853
Details of ContributionS3-190650pCRNew solution for data rate limitation of integrity protection in UP DRBNEC Europe Ltd, Lenovo, Motorola MobilityavailableApprovalSA3#94-Ad Hoc
5.17
 
Spec: 33.853
Details of ContributionS3-190649pCRNew key issue on data rate limitation of integrity protection in UP DRBNEC Europe Ltd, Lenovo, Motorola Mobility, SamsungavailableApprovalSA3#94-Ad Hoc
5.17
 
Spec: 33.853
Details of ContributionS3-190648discussionDiscussion on the need of UP IP solution for Rel.15 UEsNEC Europe Ltd, Lenovo, Motorola Mobility, SamsungavailableDiscussionSA3#94-Ad Hoc
5.17
 
Details of ContributionS3-190647pCREditorial corrections in TR 33.853 v0.1.0NEC Europe LtdavailableApprovalSA3#94-Ad Hoc
5.17
 
Spec: 33.853
Details of ContributionS3-190646pCRNew KI on Synchronization of Keys when using established keysNEC Europe LtdavailableApprovalSA3#94-Ad Hoc
5.5
 
Spec: 33.835
Details of ContributionS3-190645pCRCreating a combined solution for usage of KSEAF and KAUSF NEC Europe LtdavailableApprovalSA3#94-Ad Hoc
5.5
 
Spec: 33.835
Details of ContributionS3-190644pCRUpdating solution #16 to include home network option NEC Europe LtdavailableApprovalSA3#94-Ad Hoc
5.5
 
Spec: 33.835
Details of ContributionS3-190643pCRSolution for Roaming Architecture NEC Europe LtdavailableApprovalSA3#94-Ad Hoc
5.5
 
Spec: 33.835
Details of ContributionS3-190642pCRResolving Editor’s Notes in Solution #16NEC Europe LtdavailableApprovalSA3#94-Ad Hoc
5.5
 
Spec: 33.835
Details of ContributionS3-190641discussionDiscussion on using KSEAF and/or KAUSF for AKMA in view of regulatory compliance NEC Europe LtdavailableDiscussionSA3#94-Ad Hoc
5.5
 
Details of ContributionS3-190640discussionDiscussion on use of established keys for AKMA root keyNEC Europe LtdavailableDiscussionSA3#94-Ad Hoc
5.5
 
Details of ContributionS3-190639pCRSolution for Established Key SynchronizationNEC Europe LtdavailableApprovalSA3#94-Ad Hoc
5.5
 
Spec: 33.835
Details of ContributionS3-190638pCRNew Test Case: Error handling of malformed JSON object between two network products NEC Europe LtdavailableApprovalSA3#94-Ad Hoc
4.1.10
 
Spec: 33.517
Details of ContributionS3-190637pCRNew Test Case: Error handling of malformed N32 signalling message sent between peer SEPPsNEC Europe LtdavailableApprovalSA3#94-Ad Hoc
4.1.7
 
Spec: 33.517
Details of ContributionS3-190636pCRSolution for preventing UE camping on false base station during Idle modeNEC Europe LtdwithdrawnApprovalSA3#94-Ad Hoc
5.9
 
Spec: 33.809
Details of ContributionS3-190635pCRUpdating Key issue #3 for Network detection of nearby false base stationNEC Europe LtdavailableApprovalSA3#94-Ad Hoc
5.9
 
Spec: 33.809
Details of ContributionS3-190634pCRSolution to support Fast Re-authentication in 5GSNEC Europe Ltd, IntelavailableApprovalSA3#94-Ad Hoc
5.19
 
Spec: 33.846
Details of ContributionS3-190633pCRNew KI on Fast re-authentication procedure for 5GSNEC Europe Ltd, IntelavailableApprovalSA3#94-Ad Hoc
5.19
 
Spec: 33.846
Details of ContributionS3-190632pCRSolution to KI#9 Key separation for AKMA AFsNEC Europe LtdavailableApprovalSA3#94-Ad Hoc
5.5
 
Spec: 33.835
Details of ContributionS3-190631pCREvaluation and text for resolving editor’s note for solution #5 in TR 33.825NEC Europe LtdavailableApprovalSA3#94-Ad Hoc
5.13
 
Spec: 33.825
Details of ContributionS3-190630pCR5GFBS-solution Using symmetric algorithm with assistance of USIM and home networkZTE CorporationavailableApprovalSA3#94-Ad Hoc
5.9
S3-190155
Spec: 33.809
Details of ContributionS3-190629pCReAUTH-Linkability solution encrypted session anchor key based solutionZTE CorporationavailableApprovalSA3#94-Ad Hoc
5.19
 
Spec: 33.846
Details of ContributionS3-190628pCReAUTH-Linkability KI SQN exposureZTE CorporationavailableApprovalSA3#94-Ad Hoc
5.19
 
Spec: 33.846
Details of ContributionS3-190627pCReAUTH-Linkability KI different length of responseZTE CorporationavailableApprovalSA3#94-Ad Hoc
5.19
 
Spec: 33.846
Details of ContributionS3-190626pCReAUTH-Linkability KI exposure of cause valueZTE CorporationavailableApprovalSA3#94-Ad Hoc
5.19
 
Spec: 33.846
Details of ContributionS3-190625pCReAUTH-SUCI solution mitigation of large SUCI attackZTE CorporationavailableApprovalSA3#94-Ad Hoc
5.19
 
Spec: 33.846
Details of ContributionS3-190624pCReAUTH-SUCI solution adding symmetric algorithm for SUPI protection schemeZTE CorporationavailableApprovalSA3#94-Ad Hoc
5.19
 
Spec: 33.846
Details of ContributionS3-190623pCReAUTH-SUCI KI quantum computingZTE CorporationavailableApprovalSA3#94-Ad Hoc
5.19
 
Spec: 33.846
Details of ContributionS3-190622pCReAUTH-SUCI KI congestionZTE CorporationavailableApprovalSA3#94-Ad Hoc
5.19
 
Spec: 33.846
Details of ContributionS3-190621pCReAUTH-SUCI KI Computing resource consumingZTE CorporationavailableApprovalSA3#94-Ad Hoc
5.19
 
Spec: 33.846
Details of ContributionS3-190620pCRURLLC-solution Enhancement of handover with Xn forwarding tunnelZTE CorporationavailableApprovalSA3#94-Ad Hoc
5.13
 
Spec: 33.825
Details of ContributionS3-190619pCRURLLC-KI UP security performance for low latencyZTE CorporationavailableApprovalSA3#94-Ad Hoc
5.13
 
Spec: 33.825
Details of ContributionS3-190618pCRSCAS NEF Add test steps for authorization on northbound APIsZTE CorporationavailableApprovalSA3#94-Ad Hoc
4.1.9
 
Spec: 33.519
Details of ContributionS3-190617pCRFraud controls bypassed key issue for RLOS P-CRSPRINT CorporationavailableAgreementSA3#94-Ad Hoc
5.8
 
Spec: 33.815
Details of ContributionS3-190616pCRReduced confidentiality protection key issue for RLOS P-CRSPRINT CorporationavailableAgreementSA3#94-Ad Hoc
5.8
 
Spec: 33.815
Details of ContributionS3-190615pCRFalse base station key issue for RLOS P-CRSPRINT CorporationavailableAgreementSA3#94-Ad Hoc
5.8
 
Spec: 33.815
Details of ContributionS3-190614pCRUpdate of Solution #6 – Use of UE Configuration UpdateKPN N.V.availableApprovalSA3#94-Ad Hoc
5.6
 
Spec: 33.861
Details of ContributionS3-190613pCRNew Solution: Battery efficient AKMAKPN N.V.availableApprovalSA3#94-Ad Hoc
5.5
 
Spec: 33.835
Details of ContributionS3-190612otherWork Plan input from RapporteursWG Vice Chairsavailable-SA3#94-Ad Hoc
6
 
Details of ContributionS3-190611LS inReply LS on authentication of group of IoT devicesS1-190501available-SA3#94-Ad Hoc
5.6
 
Details of ContributionS3-190610LS inInitialisation of Sensitive Functions in a Virtualised EnvironmentETSI TC CYBERavailable-SA3#94-Ad Hoc
5.18
 
Details of ContributionS3-190609pCRSolution for Slice Specific Authentication and Authorization with multiple registrations in the same PLMNInterDigital, Inc.availableApprovalSA3#94-Ad Hoc
5.11
 
Spec: 33.813
Details of ContributionS3-190608otherReferencesInterDigital, Inc.availableApprovalSA3#94-Ad Hoc
5.21
 
Details of ContributionS3-190607otherNew Key Issue for eV2X TR - Security of the UE service provisioningInterDigital, Inc.availableApprovalSA3#94-Ad Hoc
5.21
 
Details of ContributionS3-190606otherNew Key Issue for eV2X TR - Security of the UE service authorization and revocationInterDigital, Inc.availableApprovalSA3#94-Ad Hoc
5.21
 
Details of ContributionS3-190605pCRProposal for FS_UP_IP_Sec Key Issue #1.3: User plane integrity between UE and networkPhilips International B.V.availableApprovalSA3#94-Ad Hoc
5.17
 
Spec: 33.853
Details of ContributionS3-190604otherNew Key Issue for eV2X TR - security for unicast/multicast messagesInterDigital, Inc.availableApprovalSA3#94-Ad Hoc
5.21
 
Details of ContributionS3-190603pCRSolution proposal for FS_CIoT_sec_5G key issue #1 and #2Philips International B.V.availableApprovalSA3#94-Ad Hoc
5.6
 
Spec: 33.861
Details of ContributionS3-190602otherNew Key Issue for eV2X TR - privacy protection for multicast messagesInterDigital, Inc.availableApprovalSA3#94-Ad Hoc
5.21
 
Details of ContributionS3-190601otherNew Key Issue for eV2X TR - privacy protection for unicast messagesInterDigital, Inc.availableApprovalSA3#94-Ad Hoc
5.21
 
Details of ContributionS3-190600agendaAgendaWG Vice Chairavailable-SA3#94-Ad Hoc
2