More filter options Items per page
select
Type
select
Meeting
select
Status
select
Data pager
Data pager
1
Page size:
PageSizeComboBox
select
435 contributions found, displaying 1 to 435
TdocTypeTitleSourceStatusForMeetingAgenda itemRevision ofRevised ToExtra info
Details of ContributionS3-191035otherWork Plan input from RapporteursWG Vice Chairsnoted-SA3#94-Ad Hoc
6
S3-190612
Details of ContributionS3-191034pCRPrivacy for Slice AuthenticationLenovo, Motorola MobilityapprovedApprovalSA3#94-Ad Hoc
5.11
S3-191017
Spec: 33.813
Details of ContributionS3-191033pCRAdding an evaluation to solution #10 in TR 33.861Qualcomm IncorporatedapprovedApprovalSA3#94-Ad Hoc
5.6
S3-190786
Spec: 33.861
Details of ContributionS3-191032pCRAdding an evaluation to solution #9 in TR 33.861Qualcomm IncorporatedapprovedApprovalSA3#94-Ad Hoc
5.6
S3-190800
Spec: 33.861
Details of ContributionS3-191031draft TRDraft TR 33.855Deutsche TelekomapprovedApprovalSA3#94-Ad Hoc
5.1
 
Details of ContributionS3-191030pCRNew Solution: Key separation for untrusted and trusted accessEricssonapprovedApprovalSA3#94-Ad Hoc
5.7
S3-190747
Spec: 33.807
Details of ContributionS3-191029pCRSolution to Migitate DDoS Attack based on RANHuawei, HisiliconapprovedApprovalSA3#94-Ad Hoc
5.6
S3-190705
Spec: 33.861
Details of ContributionS3-191028pCRSolution to identify misbehaving UEsHuawei, HisiliconapprovedApprovalSA3#94-Ad Hoc
5.6
S3-190704
Spec: 33.861
Details of ContributionS3-191027pCRSolution proposal for FS_CIoT_sec_5G key issue #1 and #2Philips International B.V.approvedApprovalSA3#94-Ad Hoc
5.6
S3-190603
Spec: 33.861
Details of ContributionS3-191026draft TRdraft TR 33.861EricssonapprovedApprovalSA3#94-Ad Hoc
5.6
 
Details of ContributionS3-191025pCRDeleting EN on the usage of per-gNB and per-UE counters for solution #7 “protecting gNB from RRC DoS attack”Huawei, HisiliconapprovedApprovalSA3#94-Ad Hoc
5.6
S3-190661
Spec: 33.861
Details of ContributionS3-191024draft TRDraft skeleton document for TR 33.935VodafoneapprovedApprovalSA3#94-Ad Hoc
5.16
S3-191022
Details of ContributionS3-191023draft TRdraft TR 33.815SprintapprovedApprovalSA3#94-Ad Hoc
5.8
 
Details of ContributionS3-191022draft TRDraft skeleton document for TR 33.935VodafonerevisedApprovalSA3#94-Ad Hoc
5.16
  S3-191024
Details of ContributionS3-191021pCRProtection against Man-in-the-Middle false base station attacksQualcomm IncorporatedapprovedApprovalSA3#94-Ad Hoc
5.9
S3-190988
Spec: 33.809
Details of ContributionS3-191020LS outLS on Full date rate support for UP IPQualcommapprovedApprovalSA3#94-Ad Hoc
5.17
S3-190915
To: RAN2; Cc: RAN, RAN1, RAN3
Details of ContributionS3-191019pCRNew key issue on integrity protection capability imbalance in MR-DC scenariosNEC Europe Ltd,HuaweiapprovedApprovalSA3#94-Ad Hoc
5.17
S3-190912
Spec: 33.853
Details of ContributionS3-191018draft TRdraft TR 33.819NokiaapprovedApprovalSA3#94-Ad Hoc
5.15
 
Details of ContributionS3-191017pCRPrivacy for Slice AuthenticationLenovo, Motorola MobilityrevisedApprovalSA3#94-Ad Hoc
5.11
S3-190867 S3-191034
Spec: 33.813
Details of ContributionS3-191016LS outLS on Clarification of flexibility of N9 protectionDeutsche TelekomapprovedApprovalSA3#94-Ad Hoc
5.1
S3-190966
To: GSMA 5GJA
Details of ContributionS3-191015draft TRdraft TR 33.807HuaweiapprovedApprovalSA3#94-Ad Hoc
5.7
 
Details of ContributionS3-191014pCRMobility between TNGFs within the Trusted Non-3GPP Access Network (TNAN)Nokia, Nokia Shanghai BellapprovedApprovalSA3#94-Ad Hoc
5.7
S3-190878
Spec: 33.807
Details of ContributionS3-191013pCRMobility between TNAPs within the Trusted Non-3GPP Access Network (TNAN)Nokia, Nokia Shanghai BellapprovedApprovalSA3#94-Ad Hoc
5.7
S3-190877
Spec: 33.807
Details of ContributionS3-191012pCRNew KI: N3GPP Key HierarchyEricssonapprovedApprovalSA3#94-Ad Hoc
5.7
S3-190745
Spec: 33.807
Details of ContributionS3-191011pCRProposed update for Solution #2 AS and NAS security based on the emergency call proceduresQualcomm Incorporated,LenovoapprovedApprovalSA3#94-Ad Hoc
5.8
S3-190783
Spec: 33.815
Details of ContributionS3-191010pCRProposed evaluation for Solution #1 AS and NAS security for RLOS servicesQualcomm IncorporatedapprovedApprovalSA3#94-Ad Hoc
5.8
S3-190781
Spec: 33.815
Details of ContributionS3-191009pCRSolution for slice specific authorizationHuawei, HisiliconapprovedApprovalSA3#94-Ad Hoc
5.11
S3-190739
Spec: 33.813
Details of ContributionS3-191008pCRRemove EN in 6.6.3Huawei, HisiliconapprovedApprovalSA3#94-Ad Hoc
5.11
S3-190738
Spec: 33.813
Details of ContributionS3-191007pCRAmendment to solution #3Huawei, HiSiliconapprovedApprovalSA3#94-Ad Hoc
5.11
S3-190698
Spec: 33.813
Details of ContributionS3-191006pCRNotifying cell information to the network after authentication procedure failureNEC Europe LtdnotedApprovalSA3#94-Ad Hoc
5.9
S3-190998
Spec: 33.809
Details of ContributionS3-191005pCRSolution for Key freshness in AKMAHuawei, HisiliconapprovedApprovalSA3#94-Ad Hoc
5.5
S3-190703
Spec: 33.835
Details of ContributionS3-191004pCRNew key issue on data rate limitation of integrity protection in UP DRBNEC Europe Ltd, Lenovo, Motorola Mobility, SamsungapprovedApprovalSA3#94-Ad Hoc
5.17
S3-190911
Spec: 33.853
Details of ContributionS3-191003discussionNPN authentication way forwardORANGEendorsedEndorsementSA3#94-Ad Hoc
5.15
S3-190999
Details of ContributionS3-191002pCRSolution for Slice Specific Authentication and Authorization with multiple registrations in the same PLMNInterDigital, Inc.approvedApprovalSA3#94-Ad Hoc
5.11
S3-190609
Spec: 33.813
Details of ContributionS3-191001pCRDeployment options for authentication in NPNsCablelabs, Nokia, Nokia Shanghai BellapprovedApprovalSA3#94-Ad Hoc
5.15
S3-190846
Spec: 33.819
Details of ContributionS3-191000pCRKI on authentication and authorization of NPN subscribers by a 5G external entityNokia, Nokia Shanghai BellapprovedApprovalSA3#94-Ad Hoc
5.15
S3-190856
Spec: 33.819
Details of ContributionS3-190999discussionNPN authentication way forwardORANGErevisedEndorsementSA3#94-Ad Hoc
5.15
S3-190990 S3-191003
Details of ContributionS3-190998pCRNotifying cell information to the network after authentication procedure failureNEC Europe LtdrevisedApprovalSA3#94-Ad Hoc
5.9
S3-190654 S3-191006
Spec: 33.809
Details of ContributionS3-190997pCRNew security requirement against replay of RRCResumeRequest messageHuawei, HisiliconapprovedApprovalSA3#94-Ad Hoc
5.9
S3-190937
Spec: 33.809
Details of ContributionS3-190996pCRCreating a combined solution for usage of KSEAF and KAUSFNEC Europe LtdapprovedApprovalSA3#94-Ad Hoc
5.5
S3-190645
Spec: 33.835
Details of ContributionS3-190995pCRNew solution for CAG access control in Non-standalone NPNsSamsungapproved-SA3#94-Ad Hoc
5.15
S3-190861
Spec: 33.819
Details of ContributionS3-190994pCRKey issue on CAG access control in Non-standalone NPNsSamsungapproved-SA3#94-Ad Hoc
5.15
S3-190860
Spec: 33.819
Details of ContributionS3-190993pCRAdding network binding requirement to the keys issue #1.1 on standalone public networksQualcomm IncorporatedapprovedApprovalSA3#94-Ad Hoc
5.15
S3-190789
Spec: 33.819
Details of ContributionS3-190992pCRProposed addition to key issue#1.1 for standalone non-public networksQualcomm IncorporatedapprovedApprovalSA3#94-Ad Hoc
5.15
S3-190788
Spec: 33.819
Details of ContributionS3-190991pCRProposed solution to the key hierarchy for non-public networksQualcomm IncorporatedapprovedApprovalSA3#94-Ad Hoc
5.15
S3-190787
Spec: 33.819
Details of ContributionS3-190990discussionNPN authentication way forwardORANGErevisedEndorsementSA3#94-Ad Hoc
5.15
  S3-190999
Details of ContributionS3-190989pCRReferences to TR 33.809BTapprovedApprovalSA3#94-Ad Hoc
5.9
 
Spec: 33.809
Details of ContributionS3-190988pCRProtection against Man-in-the-Middle false base station attacksQualcomm IncorporatedrevisedApprovalSA3#94-Ad Hoc
5.9
S3-190793 S3-191021
Spec: 33.809
Details of ContributionS3-190987pCRNew solution for Authentication relay attackHuawei, HisiliconapprovedApprovalSA3#94-Ad Hoc
5.9
S3-190734
Spec: 33.809
Details of ContributionS3-190986pCRNew requirment for Authentication relay attackHuawei, HisiliconapprovedApprovalSA3#94-Ad Hoc
5.9
S3-190733
Spec: 33.809
Details of ContributionS3-190985pCRKI#3 in TR 33.809 - new solution for enriched measurement reportsEricsson,HuaweiapprovedApprovalSA3#94-Ad Hoc
5.9
S3-190827
Spec: 33.809
Details of ContributionS3-190984pCRKey Issue: Handling of invalid IPX patchesDeutsche Telekom AGapprovedApprovalSA3#94-Ad Hoc
5.1
S3-190725
Spec: 33.855
Details of ContributionS3-190983pCRIndirect communication between NFs in roaming scenariosNokia, Nokia Shanghai BellapprovedApprovalSA3#94-Ad Hoc
5.1
S3-190873
Spec: 33.855
Details of ContributionS3-190982pCRService access authorization within a NF Set or NF Service SetNokia, Nokia Shanghai BellapprovedApprovalSA3#94-Ad Hoc
5.1
S3-190874
Spec: 33.855
Details of ContributionS3-190981pCRNF to NF authenticaton and authorization in Indirect communication modeNokia, Nokia Shanghai BellapprovedApprovalSA3#94-Ad Hoc
5.1
S3-190871
Spec: 33.855
Details of ContributionS3-190980pCRAuthorization of NF service access in SCPNokia, Nokia Shanghai BellapprovedApprovalSA3#94-Ad Hoc
5.1
S3-190872
Spec: 33.855
Details of ContributionS3-190979draft TRdraft TR 33.825HuaweiapprovedApprovalSA3#94-Ad Hoc
5.13
 
Details of ContributionS3-190978pCRSecurity Assurance Requirement and Test for NRFHuawei, HisiliconnotedApprovalSA3#94-Ad Hoc
4.1.8
S3-190742
Spec: 33.518
Details of ContributionS3-190977pCRsolution 2 clarificationHuawei, HiSiliconapprovedApprovalSA3#94-Ad Hoc
5.13
S3-190679
Spec: 33.825
Details of ContributionS3-190976pCRevaluation of solution 3Huawei, HiSiliconapprovedApprovalSA3#94-Ad Hoc
5.13
S3-190683
Spec: 33.825
Details of ContributionS3-190975pCRdeleting the EN of solution3Huawei, HiSiliconapprovedApprovalSA3#94-Ad Hoc
5.13
S3-190680
Spec: 33.825
Details of ContributionS3-190974pCRsolution1 and evaluation updateHuawei, HiSiliconapprovedApprovalSA3#94-Ad Hoc
5.13
S3-190685
Spec: 33.825
Details of ContributionS3-190973pCRSolution #Y: Security for redundant data transmission using Dual ConnectivityEricssonapprovedApprovalSA3#94-Ad Hoc
5.13
S3-190818
Spec: 33.825
Details of ContributionS3-190972pCRDynamic UP security policy control solution for URLLCHuawei, HiSiliconapprovedApprovalSA3#94-Ad Hoc
5.13
S3-190689
Spec: 33.825
Details of ContributionS3-190971pCRURLLC solution5 updateHuawei, HiSilicon,NECapprovedApprovalSA3#94-Ad Hoc
5.13
S3-190682
Spec: 33.825
Details of ContributionS3-190970pCRNew solution for security for redundant data transmission using Dual Connectivity proceduresEricssonapprovedApprovalSA3#94-Ad Hoc
5.13
S3-190819
Spec: 33.825
Details of ContributionS3-190969pCRURLLC-KI UP security performance for low latencyZTE CorporationapprovedApprovalSA3#94-Ad Hoc
5.13
S3-190619
Spec: 33.825
Details of ContributionS3-190968pCRKey Issue: Secure message transport via the SCPDeutsche Telekom AGapprovedApprovalSA3#94-Ad Hoc
5.1
S3-190727
Spec: 33.855
Details of ContributionS3-190967pCRSecurity aspects of Service Communication Proxy (SCP)Nokia, Nokia Shanghai Bell,Deutsche TelekomapprovedApprovalSA3#94-Ad Hoc
5.1
S3-190869
Spec: 33.855
Details of ContributionS3-190966LS outLS on Clarification of flexibility of N9 protectionDeutsche TelekomrevisedApprovalSA3#94-Ad Hoc
5.1
  S3-191016
To: GSMA 5GJA
Details of ContributionS3-190965pCRNew KI: flexible protection of data exchange on N9Huawei, Hisilicon,NokiaapprovedApprovalSA3#94-Ad Hoc
5.1
S3-190737
Spec: 33.819
Details of ContributionS3-190964pCRNew Key Issue: Support of a UP gateway function on the N9 interfaceEricssonapprovedApprovalSA3#94-Ad Hoc
5.1
S3-190744
Spec: 33.855
Details of ContributionS3-190963LS outReply LS on handling of Indirect communication across NF/NF ServicesDeutsche TelekomapprovedApprovalSA3#94-Ad Hoc
5.1
 
To: SA2
Details of ContributionS3-190962discussionDiscussion on NPN authenticationHuawei, HiSiliconnotedEndorsementSA3#94-Ad Hoc
5.15
S3-190700
Details of ContributionS3-190961LS inLS on handling of Indirect communication across NF/NF ServicesS2-1902905replied toApprovalSA3#94-Ad Hoc
5.1
 
Details of ContributionS3-190960draft TRdraft TR 33.809AppleapprovedApprovalSA3#94-Ad Hoc
5.9
 
Details of ContributionS3-190959pCRKey Issue proposal on location measurement tampering for FS_eLCS_SecPhilips International B.V.approvedApprovalSA3#94-Ad Hoc
5.12
S3-190903
Spec: 33.814
Details of ContributionS3-190958draft TRdraft TR 33.808HuaweiapprovedDiscussionSA3#94-Ad Hoc
5.10
 
Details of ContributionS3-190957pCRConclusion for KDF negotiation for 5G System SecurityHuawei, HisiliconapprovedApprovalSA3#94-Ad Hoc
5.10
S3-190723
Spec: 33.808
Details of ContributionS3-190956draft TRdraft TR 33.935VodafoneapprovedApprovalSA3#94-Ad Hoc
5.16
 
Details of ContributionS3-190955pCRDetailed solution 5 in TR 33.935Gemalto N.V.approvedApprovalSA3#94-Ad Hoc
5.16
S3-190920
Spec: 33.935
Details of ContributionS3-190954pCRpCR to 33935 - addition of detailed solution 4bVODAFONE Group PlcapprovedApprovalSA3#94-Ad Hoc
5.16
S3-190773
Spec: 33.935
Details of ContributionS3-190953pCRpCR to 33935 - addition section 4.1 OverviewVODAFONE Group PlcapprovedApprovalSA3#94-Ad Hoc
5.16
S3-190768
Spec: 33.935
Details of ContributionS3-190952pCRConsiderations on SECAM of the virtualized network productsChina Mobile Com. Corporationapproved-SA3#94-Ad Hoc
5.14
S3-190758
Spec: 33.818
Details of ContributionS3-190951pCRConsiderations on network product class when using NFV technologyChina Mobile Com. Corporationapproved-SA3#94-Ad Hoc
5.14
S3-190757
Spec: 33.818
Details of ContributionS3-190950draft TRdraft TR 33.818China MobileapprovedApprovalSA3#94-Ad Hoc
5.14
 
Details of ContributionS3-190948draft TRdraft TR 33.813NokiaapprovedApprovalSA3#94-Ad Hoc
5.11
 
Details of ContributionS3-190947pCRAvoiding UE connecting to fake base station during HOHuawei, HisiliconapprovedApprovalSA3#94-Ad Hoc
5.9
S3-190665
Spec: 33.809
Details of ContributionS3-190946pCRNetwork detection of false base station from UE measurement reportsNokiaapprovedApprovalSA3#94-Ad Hoc
5.9
S3-190660
Spec: 33.809
Details of ContributionS3-190945pCRKI#3 in TR 33.809 - updates to requirementsEricssonapprovedApprovalSA3#94-Ad Hoc
5.9
S3-190826
Spec: 33.809
Details of ContributionS3-190944pCRUpdating Key issue #3 for Network detection of nearby false base stationNEC Europe LtdapprovedApprovalSA3#94-Ad Hoc
5.9
S3-190635
Spec: 33.809
Details of ContributionS3-190943pCRSolution for AS security during RRC Idle modeSamsungapproved-SA3#94-Ad Hoc
5.9
S3-190866
Spec: 33.809
Details of ContributionS3-190942pCRAdding evaluation for Solution #2Apple Computer Trading Co. LtdapprovedApprovalSA3#94-Ad Hoc
5.9
S3-190835
Spec: 33.809
Details of ContributionS3-190941pCRKI#2 in TR 33.809 – new solution for tamper resistant SI messagesEricssonapprovedApprovalSA3#94-Ad Hoc
5.9
S3-190832
Spec: 33.809
Details of ContributionS3-190940pCRChanging the security requirement for KI #2Qualcomm IncorporatedapprovedApprovalSA3#94-Ad Hoc
5.9
S3-190798
Spec: 33.809
Details of ContributionS3-190939pCRKI#2 in TR 33.809 – updated details (cleanup)EricssonapprovedApprovalSA3#94-Ad Hoc
5.9
S3-190831
Spec: 33.809
Details of ContributionS3-190938pCRAdding evaluation for Solution #1Apple Computer Trading Co. LtdapprovedApprovalSA3#94-Ad Hoc
5.9
S3-190834
Spec: 33.809
Details of ContributionS3-190937pCRNew security requirement against replay of RRCResumeRequest messageHuawei, HisiliconrevisedApprovalSA3#94-Ad Hoc
5.9
S3-190670 S3-190997
Spec: 33.809
Details of ContributionS3-190936pCRNew security requirement against tampering of RRCResumeRequest messageHuawei, HisiliconmergedApprovalSA3#94-Ad Hoc
5.9
S3-190669
Spec: 33.809
Details of ContributionS3-190935pCRSolution 15 evaluationEricssonapprovedApprovalSA3#94-Ad Hoc
5.5
S3-190844
Spec: 33.835
Details of ContributionS3-190934discussionWay forward on evaluations for FS_AKMAORANGEendorsedEndorsementSA3#94-Ad Hoc
5.5
 
Details of ContributionS3-190933pCRSolution 15 comment on the application keysEricssonapprovedApprovalSA3#94-Ad Hoc
5.5
S3-190843
Spec: 33.835
Details of ContributionS3-190932pCRSolution 15 editorialsEricssonapprovedApprovalSA3#94-Ad Hoc
5.5
S3-190842
Spec: 33.835
Details of ContributionS3-190931pCRResolving Editor's notes in solution 6China Mobile Com. Corporationapproved-SA3#94-Ad Hoc
5.5
S3-190774
Spec: 33.835
Details of ContributionS3-190930pCRUpdating solution #16 to include home network optionNEC Europe LtdapprovedApprovalSA3#94-Ad Hoc
5.5
S3-190644
Spec: 33.835
Details of ContributionS3-190929pCRSolution for Established Key SynchronizationNEC Europe LtdapprovedApprovalSA3#94-Ad Hoc
5.5
S3-190639
Spec: 33.835
Details of ContributionS3-190928pCRpCR: Reusing KAUSF for AKMAQualcomm IncorporatedapprovedApprovalSA3#94-Ad Hoc
5.5
S3-190801
Spec: 33.835
Details of ContributionS3-190927pCRSolution to KI#9 Key separation for AKMA AFsNEC Europe LtdapprovedApprovalSA3#94-Ad Hoc
5.5
S3-190632
Spec: 33.835
Details of ContributionS3-190926pCRNew Solution: Battery efficient AKMAKPN N.V.approvedApprovalSA3#94-Ad Hoc
5.5
S3-190613
Spec: 33.835
Details of ContributionS3-190925pCRUpdates to KI #14EricssonapprovedApprovalSA3#94-Ad Hoc
5.5
S3-190824
Spec: 33.835
Details of ContributionS3-190924pCRKey issue on Key freshness in AKMAHuawei, HisiliconapprovedApprovalSA3#94-Ad Hoc
5.5
S3-190702
Spec: 33.835
Details of ContributionS3-190923draft TRdraft TR 33.835China MobileapprovedApprovalSA3#94-Ad Hoc
5.5
 
Details of ContributionS3-190922pCRNew KI: Interworking between AKMA and GBAEricssonwithdrawnApprovalSA3#94-Ad Hoc
5.5
 
Spec: 33.835
Details of ContributionS3-190921agendaAgendaWG Vice Chairapproved-SA3#94-Ad Hoc
2
S3-190600
Details of ContributionS3-190920pCRDetailed solution 5 in TR 33.935Gemalto N.V.revisedApprovalSA3#94-Ad Hoc
5.16
S3-190840 S3-190955
Spec: 33.935
Details of ContributionS3-190919othernew draft TR 33.ABCLGapprovedApprovalSA3#94-Ad Hoc
5.21
 
Details of ContributionS3-190918otherScope proposal for eV2X security studyLG ElectronicsapprovedApprovalSA3#94-Ad Hoc
5.21
S3-190770
Details of ContributionS3-190917othernew draft TR 33.XYZSamsungapprovedApprovalSA3#94-Ad Hoc
5.20
 
Details of ContributionS3-190916otherScope for the study on security for NR Integrated Access and BackhaulSamsungapproved-SA3#94-Ad Hoc
5.20
S3-190864
Details of ContributionS3-190915LS outLS on Full date rate support for UP IPQualcommrevisedApprovalSA3#94-Ad Hoc
5.17
  S3-191020
To: RAN2; Cc: RAN, RAN1, RAN3
Details of ContributionS3-190914pCRpCR: New KI: Ability to prioritize certain PDCP packets on the UE uplinkQualcomm IncorporatedapprovedApprovalSA3#94-Ad Hoc
5.17
S3-190803
Spec: 33.853
Details of ContributionS3-190913pCRpCR: New KI: Integrity Algorithm independenceQualcomm IncorporatednotedApprovalSA3#94-Ad Hoc
5.17
S3-190802
Spec: 33.853
Details of ContributionS3-190912pCRNew key issue on integrity protection capability imbalance in MR-DC scenariosNEC Europe LtdrevisedApprovalSA3#94-Ad Hoc
5.17
S3-190652 S3-191019
Spec: 33.853
Details of ContributionS3-190911pCRNew key issue on data rate limitation of integrity protection in UP DRBNEC Europe Ltd, Lenovo, Motorola Mobility, SamsungrevisedApprovalSA3#94-Ad Hoc
5.17
S3-190649 S3-191004
Spec: 33.853
Details of ContributionS3-190910draft TRdraft TR33.853VodafoneapprovedApprovalSA3#94-Ad Hoc
5.17
 
Details of ContributionS3-190909pCRKey issue to resist the linkability attacksChina Mobile Com. Corporation,ZTE,Huaweiapproved-SA3#94-Ad Hoc
5.19
S3-190762
Spec: 33.846
Details of ContributionS3-190908draft TRDraft TR 33.846EricssonapprovedApprovalSA3#94-Ad Hoc
5.19
 
Details of ContributionS3-190907pCRNew solution: TBS measurements from UEsEricssonapprovedApprovalSA3#94-Ad Hoc
5.12
S3-190754
Spec: 33.814
Details of ContributionS3-190906pCRNew solution: Bluetooth measurements from UEsEricssonapprovedApprovalSA3#94-Ad Hoc
5.12
S3-190752
Spec: 33.814
Details of ContributionS3-190905pCRNew solution: WLAN measurements from UEsEricssonapprovedApprovalSA3#94-Ad Hoc
5.12
S3-190751
Spec: 33.814
Details of ContributionS3-190904pCRNew solution: Effective privacy control in LCSEricssonapprovedApprovalSA3#94-Ad Hoc
5.12
S3-190756
Spec: 33.814
Details of ContributionS3-190903pCRKey Issue proposal on location measurement tampering for FS_eLCS_SecPhilips International B.V.revisedApprovalSA3#94-Ad Hoc
5.12
S3-190881 S3-190959
Spec: 33.814
Details of ContributionS3-190902pCRNew KI: Privacy control in LCSEricssonapprovedApprovalSA3#94-Ad Hoc
5.12
S3-190755
Spec: 33.814
Details of ContributionS3-190901draft TRdraft TR 33.814CATTapprovedApprovalSA3#94-Ad Hoc
5.12
 
Details of ContributionS3-190900pCRpCR to TR33.814 - Key issue for positioning data confidentiality protectionCATT,HuaweiapprovedApprovalSA3#94-Ad Hoc
5.12
S3-190729
Spec: 33.814
Details of ContributionS3-190899pCRText for Clause 4 Security aspects of eLCSCATTapprovedApprovalSA3#94-Ad Hoc
5.12
S3-190732
Spec: 33.814
Details of ContributionS3-190898pCRpCR to TR33.814 – Text for Clause IntroductionCATTapprovedApprovalSA3#94-Ad Hoc
5.12
S3-190731
Spec: 33.814
Details of ContributionS3-190897draftCRLiving Document: General SBA/SBI aspects in TS 33.117Nokia, Nokia Shanghai BellapprovedApprovalSA3#94-Ad Hoc
4.1.10
S3-190672
Details of ContributionS3-190896draftCRSCAS 5G: mutual authentication between NFsNokia, Nokia Shanghai BellapprovedApprovalSA3#94-Ad Hoc
4.1.10
S3-190775
Details of ContributionS3-190895draft TSdraft TS 33.519ZTEapprovedApprovalSA3#94-Ad Hoc
4.1.9
 
Details of ContributionS3-190894pCRSCAS NEF Add test steps for authorization on northbound APIsZTE CorporationapprovedApprovalSA3#94-Ad Hoc
4.1.9
S3-190618
Spec: 33.519
Details of ContributionS3-190893draft TSDraft TS 33.517NokiaapprovedApprovalSA3#94-Ad Hoc
4.1.7
 
Details of ContributionS3-190892pCRSCAS SEPP: Serving PLMN ID MismatchNokia, Nokia Shanghai BellapprovedApprovalSA3#94-Ad Hoc
4.1.7
S3-190780
Spec: 33.517
Details of ContributionS3-190891pCRTest Case: Connection-specific scope of IPX-provider cryptographic materialDeutsche Telekom AGapprovedApprovalSA3#94-Ad Hoc
4.1.7
S3-190728
Spec: 33.517
Details of ContributionS3-190890draft TSdraft TS 33.515HuaweiapprovedApprovalSA3#94-Ad Hoc
4.1.5
 
Details of ContributionS3-190889pCRSecurity Assurance Requirement and test cases for SMFHuawei, HisiliconapprovedApprovalSA3#94-Ad Hoc
4.1.5
S3-190743
Spec: 33.515
Details of ContributionS3-190888draft TSDraft TS 33.513SamsungapprovedApprovalSA3#94-Ad Hoc
4.1.3
 
Details of ContributionS3-190887draft TSDraft TS 33.512Deutsche TelekomapprovedApprovalSA3#94-Ad Hoc
4.1.2
 
Details of ContributionS3-190886pCRecurity Assurance Requirements and Test Case for UPF- Reference to 33.250Huawei, HisiliconapprovedApprovalSA3#94-Ad Hoc
4.1.3
 
Spec: 33.513
Details of ContributionS3-190885pCRSecurity Assurance Requirements and Test Case for UPFHuawei, HisiliconapprovedApprovalSA3#94-Ad Hoc
4.1.3
S3-190741
Spec: 33.513
Details of ContributionS3-190884pCRSCAS: AMF-specific adaptations of security functional requirements and related test casesHuawei, HisiliconapprovedApprovalSA3#94-Ad Hoc
4.1.2
S3-190740
Spec: 33.512
Details of ContributionS3-190883discussionThe purpose and scope of SCASEricssonendorsedEndorsementSA3#94-Ad Hoc
4.1.10
S3-190749
Details of ContributionS3-190882pCRIssue of Alignment of the terms Private network and NPNSAMSUNGnotedApprovalSA3#94-Ad Hoc
5.15
 
Spec: 33.819
Details of ContributionS3-190881pCRKey Issue proposal on location measurement tampering for FS_eLCS_SecPhilips International B.V.revisedApprovalSA3#94-Ad Hoc
5.12
  S3-190903
Spec: 33.814
Details of ContributionS3-190880discussion(FS_UP_IP_Sec) Integrity protection of the User Plane -New key Issue - Reporting Integrity check failures to the networkBT plcnotedDecisionSA3#94-Ad Hoc
5.17
 
Details of ContributionS3-190879otherTLMSP, A Proxy Transport Layer Secure ProtocolNCSCnotedDiscussionSA3#94-Ad Hoc
5.1
 
Details of ContributionS3-190878pCRMobility between TNGFs within the Trusted Non-3GPP Access Network (TNAN)Nokia, Nokia Shanghai BellrevisedApprovalSA3#94-Ad Hoc
5.7
  S3-191014
Spec: 33.807
Details of ContributionS3-190877pCRMobility between TNAPs within the Trusted Non-3GPP Access Network (TNAN)Nokia, Nokia Shanghai BellrevisedApprovalSA3#94-Ad Hoc
5.7
  S3-191013
Spec: 33.807
Details of ContributionS3-190876pCRProtection of N9 interface in Inter-PLMN scenarioNokia, Nokia Shanghai BellmergedApprovalSA3#94-Ad Hoc
5.1
 
Spec: 33.855
Details of ContributionS3-190875pCRRemoval of Editor’s Note in Solution#6Lenovo, Motorola MobilitynotedApprovalSA3#94-Ad Hoc
5.7
 
Spec: 33.807
Details of ContributionS3-190874pCRService access authorization within a NF Set or NF Service SetNokia, Nokia Shanghai BellrevisedApprovalSA3#94-Ad Hoc
5.1
  S3-190982
Spec: 33.855
Details of ContributionS3-190873pCRIndirect communication between NFs in roaming scenariosNokia, Nokia Shanghai BellrevisedApprovalSA3#94-Ad Hoc
5.1
  S3-190983
Spec: 33.855
Details of ContributionS3-190872pCRAuthorization of NF service access in SCPNokia, Nokia Shanghai BellrevisedApprovalSA3#94-Ad Hoc
5.1
  S3-190980
Spec: 33.855
Details of ContributionS3-190871pCRNF to NF authenticaton and authorization in Indirect communication modeNokia, Nokia Shanghai BellrevisedApprovalSA3#94-Ad Hoc
5.1
  S3-190981
Spec: 33.855
Details of ContributionS3-190870pCRSolution on Authentication Relay AttackLenovo, Motorola MobilitymergedApprovalSA3#94-Ad Hoc
5.9
 
Spec: 33.809
Details of ContributionS3-190869pCRSecurity aspects of Service Communication Proxy (SCP)Nokia, Nokia Shanghai BellrevisedApprovalSA3#94-Ad Hoc
5.1
  S3-190967
Spec: 33.855
Details of ContributionS3-190868pCRSolution Evaluations and Conclusion on KI#1Lenovo, Motorola MobilitymergedApprovalSA3#94-Ad Hoc
5.8
 
Spec: 33.815
Details of ContributionS3-190867pCRPrivacy for Slice AuthenticationLenovo, Motorola MobilityrevisedApprovalSA3#94-Ad Hoc
5.11
  S3-191017
Spec: 33.813
Details of ContributionS3-190866pCRSolution for AS security during RRC Idle modeSamsungrevised-SA3#94-Ad Hoc
5.9
  S3-190943
Spec: 33.809
Details of ContributionS3-190865pCREvaluation of Solution #2Samsungnoted-SA3#94-Ad Hoc
5.9
 
Spec: 33.809
Details of ContributionS3-190864otherScope for the study on security for NR Integrated Access and BackhaulSamsungrevised-SA3#94-Ad Hoc
5.20
  S3-190916
Details of ContributionS3-190863otherDraft TR 33.xxx - Skeleton TR on Security for NR Integrated Access and BackhaulSamsungapproved-SA3#94-Ad Hoc
5.20
 
Details of ContributionS3-190862pCRKey issue on Alignment of the terms Private network and NPNSamsungnoted-SA3#94-Ad Hoc
5.15
 
Spec: 33.819
Details of ContributionS3-190861pCRNew solution for CAG access control in Non-standalone NPNsSamsungrevised-SA3#94-Ad Hoc
5.15
  S3-190995
Spec: 33.819
Details of ContributionS3-190860pCRKey issue on CAG access control in Non-standalone NPNsSamsungrevised-SA3#94-Ad Hoc
5.15
  S3-190994
Spec: 33.819
Details of ContributionS3-190859pCRSolution for secure storage of SNPN access credentialsSamsung, Intelnoted-SA3#94-Ad Hoc
5.15
 
Spec: 33.819
Details of ContributionS3-190858pCRKey issue on secure storage of SNPN access credentialsSamsung, Intelnoted-SA3#94-Ad Hoc
5.15
 
Spec: 33.819
Details of ContributionS3-190857pCRRapporteur correction to TR 33819Nokia, Nokia Shanghai BellapprovedApprovalSA3#94-Ad Hoc
5.15
 
Spec: 33.819
Details of ContributionS3-190856pCRKI on authentication and authorization of NPN subscribers by a 5G external entityNokia, Nokia Shanghai BellrevisedApprovalSA3#94-Ad Hoc
5.15
  S3-191000
Spec: 33.819
Details of ContributionS3-190855pCRKI on credential storage for NPN-UesNokia, Nokia Shanghai BellnotedApprovalSA3#94-Ad Hoc
5.15
 
Spec: 33.819
Details of ContributionS3-190854pCRSolution for UE authentication to PLMN integrated NPNNokia, Nokia Shanghai Bellnot treatedApprovalSA3#94-Ad Hoc
5.15
 
Spec: 33.819
Details of ContributionS3-190853discussionDiscussion on Authentication of UE to PLMN integrated NPNNokia, Nokia Shanghai Bellnot treatedEndorsementSA3#94-Ad Hoc
5.15
 
Details of ContributionS3-190852pCRSolution on PLMN service access via NPNNokia, Nokia Shanghai Bellnot treatedApprovalSA3#94-Ad Hoc
5.15
 
Spec: 33.819
Details of ContributionS3-190851pCRSolution on SNPN service access via PLMNNokia, Nokia Shanghai Bellnot treatedApprovalSA3#94-Ad Hoc
5.15
 
Spec: 33.819
Details of ContributionS3-190850discussionDiscussion of security solutions for SNPN service access via PLMN and vice versaNokia, Nokia Shanghai Bellnot treatedEndorsementSA3#94-Ad Hoc
5.15
 
Details of ContributionS3-190849pCRSolution on non-certificate based UE authentication in 5G NPN without AAACablelabs, Nokia, Nokia Shanghai BellnotedApprovalSA3#94-Ad Hoc
5.15
 
Spec: 33.819
Details of ContributionS3-190848pCRSolution on non-certificate based UE authentication in 5G NPN with AAACablelabs, Nokia, Nokia Shanghai BellnotedApprovalSA3#94-Ad Hoc
5.15
 
Spec: 33.819
Details of ContributionS3-190847pCREvaluation of EAP-TTLS for non-certificate based UE authentication in SNPNsCablelabs, Nokia, Nokia Shanghai Bellnot treatedApprovalSA3#94-Ad Hoc
5.15
 
Spec: 33.819
Details of ContributionS3-190846pCRDeployment options for authentication in NPNsCablelabs, Nokia, Nokia Shanghai BellrevisedApprovalSA3#94-Ad Hoc
5.15
  S3-191001
Spec: 33.819
Details of ContributionS3-190845discussionDiscussion on NPN AuthenticationCablelabs, Nokia, Nokia Shanghai BellnotedEndorsementSA3#94-Ad Hoc
5.15
 
Details of ContributionS3-190844pCRSolution 15 evaluationEricssonrevisedApprovalSA3#94-Ad Hoc
5.5
  S3-190935
Spec: 33.835
Details of ContributionS3-190843pCRSolution 15 comment on the application keysEricssonrevisedApprovalSA3#94-Ad Hoc
5.5
  S3-190933
Spec: 33.835
Details of ContributionS3-190842pCRSolution 15 editorialsEricssonrevisedApprovalSA3#94-Ad Hoc
5.5
  S3-190932
Spec: 33.835
Details of ContributionS3-190841pCR33.846: solution for anchor keys securityGemalto N.V.notedApprovalSA3#94-Ad Hoc
5.19
 
Spec: 33.846
Details of ContributionS3-190840pCRDetailed solution 5 in TR 33.935Gemalto N.V.revisedApprovalSA3#94-Ad Hoc
5.16
  S3-190920
Spec: 33.935
Details of ContributionS3-190839pCRNew solution: Deriving session anchor keys with random numberZTE Corporation, NubianotedApprovalSA3#94-Ad Hoc
5.19
 
Spec: 33.846
Details of ContributionS3-190838pCRDetection of false relay base station by UEZTE Corporation, NubianotedApprovalSA3#94-Ad Hoc
5.9
 
Spec: 33.809
Details of ContributionS3-190837pCRImprovement to key issue #5ZTE Corporation, NubianotedApprovalSA3#94-Ad Hoc
5.9
 
Spec: 33.809
Details of ContributionS3-190836pCRModification of user identity in solution 2 and solution 3ZTE Corporation, NubianotedApprovalSA3#94-Ad Hoc
5.5
 
Spec: 33.835
Details of ContributionS3-190835pCRAdding evaluation for Solution #2Apple Computer Trading Co. LtdrevisedApprovalSA3#94-Ad Hoc
5.9
  S3-190942
Spec: 33.809
Details of ContributionS3-190834pCRAdding evaluation for Solution #1Apple Computer Trading Co. LtdrevisedApprovalSA3#94-Ad Hoc
5.9
  S3-190938
Spec: 33.809
Details of ContributionS3-190833pCRID based solution against false base stationApple Computer Trading Co. LtdnotedApprovalSA3#94-Ad Hoc
5.9
 
Spec: 33.809
Details of ContributionS3-190832pCRKI#2 in TR 33.809 – new solution for tamper resistant SI messagesEricssonrevisedApprovalSA3#94-Ad Hoc
5.9
  S3-190941
Spec: 33.809
Details of ContributionS3-190831pCRKI#2 in TR 33.809 – updated details (cleanup)EricssonrevisedApprovalSA3#94-Ad Hoc
5.9
  S3-190939
Spec: 33.809
Details of ContributionS3-190830pCRNew annex in TR 33.809 - summary of PWS security studyEricssonnotedApprovalSA3#94-Ad Hoc
5.9
 
Spec: 33.809
Details of ContributionS3-190829pCRKI#1 in TR 33.809 - new solution with netwrok controlled RRC Reject messageEricssonnotedApprovalSA3#94-Ad Hoc
5.9
 
Spec: 33.809
Details of ContributionS3-190828pCRKI#3 in TR 33.809 - conclusion on second requirement (reactive action)EricssonnotedApprovalSA3#94-Ad Hoc
5.9
 
Spec: 33.809
Details of ContributionS3-190827pCRKI#3 in TR 33.809 - new solution for enriched measurement reportsEricssonrevisedApprovalSA3#94-Ad Hoc
5.9
  S3-190985
Spec: 33.809
Details of ContributionS3-190826pCRKI#3 in TR 33.809 - updates to requirementsEricssonrevisedApprovalSA3#94-Ad Hoc
5.9
  S3-190945
Spec: 33.809
Details of ContributionS3-190825pCRKI#3 in TR 33.809 - updates to updates to details and threatsEricssonapprovedApprovalSA3#94-Ad Hoc
5.9
 
Spec: 33.809
Details of ContributionS3-190824pCRUpdates to KI #14EricssonrevisedApprovalSA3#94-Ad Hoc
5.5
  S3-190925
Spec: 33.835
Details of ContributionS3-190823pCRNew Solution Key LifetimeEricssonnotedApprovalSA3#94-Ad Hoc
5.5
 
Spec: 33.835
Details of ContributionS3-190822pCRConclusion to Solution #14EricssonnotedApprovalSA3#94-Ad Hoc
5.5
 
Spec: 33.835
Details of ContributionS3-190821pCRUpdates to Solution #14EricssonnotedApprovalSA3#94-Ad Hoc
5.5
 
Spec: 33.835
Details of ContributionS3-190820pCRCorrection to solution #3 ‘Security policy handling for redundant data transmission’EricssonapprovedApprovalSA3#94-Ad Hoc
5.13
 
Spec: 33.825
Details of ContributionS3-190819pCRNew solution for security for redundant data transmission using Dual Connectivity proceduresEricssonrevisedApprovalSA3#94-Ad Hoc
5.13
  S3-190970
Spec: 33.825
Details of ContributionS3-190818pCRSolution #Y: Security for redundant data transmission using Dual ConnectivityEricssonrevisedApprovalSA3#94-Ad Hoc
5.13
  S3-190973
Spec: 33.825
Details of ContributionS3-190817pCREvaluation to Solution #5 ‘Security solution for small data included in initial NAS signalling at mobility’EricssonapprovedApprovalSA3#94-Ad Hoc
5.6
 
Spec: 33.861
Details of ContributionS3-190816pCREvaluation to Solution #4 ‘Security solution for UL small data transfer in RRC Suspend and Resume with early data transmission (EDT)’EricssonnotedApprovalSA3#94-Ad Hoc
5.6
 
Spec: 33.861
Details of ContributionS3-190815pCREvaluation to Solution #3 ‘Security solution for MO SMS at AMF re-allocation’EricssonapprovedApprovalSA3#94-Ad Hoc
5.6
 
Spec: 33.861
Details of ContributionS3-190814pCRSolution for key separation based on slice authentication keysEricssonnotedApprovalSA3#94-Ad Hoc
5.11
 
Spec: 33.813
Details of ContributionS3-190813pCRUpdate on EAP-AKA´ PFSEricssonnotedApprovalSA3#94-Ad Hoc
5.19
 
Spec: 33.846
Details of ContributionS3-190812pCRNew solution: EAP-AKA´ PFSEricssonnotedApprovalSA3#94-Ad Hoc
5.19
 
Spec: 33.846
Details of ContributionS3-190811pCRNew KI: Leakage of long-term keyEricssonnotedApprovalSA3#94-Ad Hoc
5.19
 
Spec: 33.846
Details of ContributionS3-190810pCRScope for TR 33.846EricssonapprovedApprovalSA3#94-Ad Hoc
5.19
 
Spec: 33.846
Details of ContributionS3-190809pCRSkeleton for TR 33.846EricssonapprovedApprovalSA3#94-Ad Hoc
5.19
 
Spec: 33.846
Details of ContributionS3-190808pCREvaluation of solution 3EricssonnotedApprovalSA3#94-Ad Hoc
5.5
 
Spec: 33.835
Details of ContributionS3-190807pCRProtocol details for solution 3EricssonapprovedApprovalSA3#94-Ad Hoc
5.5
 
Spec: 33.835
Details of ContributionS3-190806pCREvaluation of solution 2EricssonnotedApprovalSA3#94-Ad Hoc
5.5
 
Spec: 33.835
Details of ContributionS3-190805pCRSCAS NRF: Scope Representation for Nnrf_AccessToken ServiceNokia, Nokia Shanghai BellnotedApprovalSA3#94-Ad Hoc
4.1.8
 
Spec: 33.518
Details of ContributionS3-190804pCRpCR: New KI: Efficient handling of PDCP discardTimer expiry on the UE UplinkQualcomm IncorporatedmergedApprovalSA3#94-Ad Hoc
5.17
S3-190386
Spec: 33.853
Details of ContributionS3-190803pCRpCR: New KI: Ability to prioritize certain PDCP packets on the UE uplinkQualcomm IncorporatedrevisedApprovalSA3#94-Ad Hoc
5.17
S3-190387 S3-190914
Spec: 33.853
Details of ContributionS3-190802pCRpCR: New KI: Integrity Algorithm independenceQualcomm IncorporatedrevisedApprovalSA3#94-Ad Hoc
5.17
S3-190388 S3-190913
Spec: 33.853
Details of ContributionS3-190801pCRpCR: Reusing KAUSF for AKMAQualcomm IncorporatedrevisedApprovalSA3#94-Ad Hoc
5.5
S3-190385 S3-190928
Spec: 33.835
Details of ContributionS3-190800pCRAdding an evaluation to solution #9 in TR 33.861Qualcomm IncorporatedrevisedApprovalSA3#94-Ad Hoc
5.6
  S3-191032
Spec: 33.861
Details of ContributionS3-190799pCRKAMF separation using a standalone SEAFQualcomm IncorporatednotedApprovalSA3#94-Ad Hoc
5.11
 
Spec: 33.813
Details of ContributionS3-190798pCRChanging the security requirement for KI #2Qualcomm IncorporatedrevisedApprovalSA3#94-Ad Hoc
5.9
  S3-190940
Spec: 33.809
Details of ContributionS3-190797pCRConclusion on KI #8 for Study on the security for URLLCQualcomm IncorporatedapprovedApprovalSA3#94-Ad Hoc
5.13
 
Spec: 33.825
Details of ContributionS3-190796pCRConclusion on KI #6 for Study on the security for URLLCQualcomm IncorporatednotedApprovalSA3#94-Ad Hoc
5.13
 
Spec: 33.825
Details of ContributionS3-190795pCRConclusion on KI #4 for Study on the security for URLLCQualcomm IncorporatednotedApprovalSA3#94-Ad Hoc
5.13
 
Spec: 33.825
Details of ContributionS3-190794pCRConclusion on KI #3 for Study on the security for URLLCQualcomm IncorporatednotedApprovalSA3#94-Ad Hoc
5.13
 
Spec: 33.825
Details of ContributionS3-190793pCRProtection against Man-in-the-Middle false base station attacksQualcomm IncorporatedrevisedApprovalSA3#94-Ad Hoc
5.9
S3-190381 S3-190988
Spec: 33.809
Details of ContributionS3-190792pCRSecurity protection of small data at idle mode mobilityQualcomm IncorporatedapprovedApprovalSA3#94-Ad Hoc
5.6
 
Spec: 33.861
Details of ContributionS3-190791pCRProposed solution for protecting the S-NSSAI for transmission at the AS layerQualcomm IncorporatednotedApprovalSA3#94-Ad Hoc
5.11
  S3-191499
Spec: 33.813
Details of ContributionS3-190790pCRProposed solution to key issue #1.1 in TR 33.819Qualcomm IncorporatedapprovedApprovalSA3#94-Ad Hoc
5.15
 
Spec: 33.819
Details of ContributionS3-190789pCRAdding network binding requirement to the keys issue #1.1 on standalone public networksQualcomm IncorporatedrevisedApprovalSA3#94-Ad Hoc
5.15
  S3-190993
Spec: 33.819
Details of ContributionS3-190788pCRProposed addition to key issue#1.1 for standalone non-public networksQualcomm IncorporatedrevisedApprovalSA3#94-Ad Hoc
5.15
  S3-190992
Spec: 33.819
Details of ContributionS3-190787pCRProposed solution to the key hierarchy for non-public networksQualcomm IncorporatedrevisedApprovalSA3#94-Ad Hoc
5.15
  S3-190991
Spec: 33.819
Details of ContributionS3-190786pCRAdding an evaluation to solution #10 in TR 33.861Qualcomm IncorporatedrevisedApprovalSA3#94-Ad Hoc
5.6
  S3-191033
Spec: 33.861
Details of ContributionS3-190785pCRResolving the editor’s note in solution #10 in TR 33.861Qualcomm IncorporatedapprovedApprovalSA3#94-Ad Hoc
5.6
 
Spec: 33.861
Details of ContributionS3-190784pCRAcknowledging the multiple possible mobility solutions for CP small dataQualcomm IncorporatedapprovedApprovalSA3#94-Ad Hoc
5.6
 
Spec: 33.861
Details of ContributionS3-190783pCRProposed update for Solution #2 AS and NAS security based on the emergency call proceduresQualcomm IncorporatedrevisedApprovalSA3#94-Ad Hoc
5.8
  S3-191011
Spec: 33.815
Details of ContributionS3-190782pCRProposed evaluation for Solution #2 AS and NAS security based on the emergency call proceduresQualcomm IncorporatednotedApprovalSA3#94-Ad Hoc
5.8
 
Spec: 33.815
Details of ContributionS3-190781pCRProposed evaluation for Solution #1 AS and NAS security for RLOS servicesQualcomm IncorporatedrevisedApprovalSA3#94-Ad Hoc
5.8
  S3-191010
Spec: 33.815
Details of ContributionS3-190780pCRSCAS SEPP: Serving PLMN ID MismatchNokia, Nokia Shanghai BellrevisedApprovalSA3#94-Ad Hoc
4.1.7
  S3-190892
Spec: 33.517
Details of ContributionS3-190779draftCRSCAS 5G: Search Result Handling for NF DiscoveryNokia, Nokia Shanghai BellnotedApprovalSA3#94-Ad Hoc
4.1.10
 
Details of ContributionS3-190778draftCRSCAS 5G: update to Access Token Verification Failure in roaming caseNokia, Nokia Shanghai BellapprovedApprovalSA3#94-Ad Hoc
4.1.10
 
Details of ContributionS3-190777draftCRSCAS 5G: update to Access Token Verification Failure in non-roaming caseNokia, Nokia Shanghai BellapprovedApprovalSA3#94-Ad Hoc
4.1.10
 
Details of ContributionS3-190776pCRCertificate based solution against false base stationApple Computer Trading Co. LtdnotedApprovalSA3#94-Ad Hoc