3GPP Specifications per TSG/WG
3GPP Specifications for group: S3 (showing rapporteur)
Click on spec number for details
TR 01.31 | Fraud Information Gathering System (FIGS); Service requirements; Stage 0 | Mr. Sahlin, Bengt |
TR 01.33 | Lawful Interception requirements for GSM | Mr. Spalt, Bernhard |
TS 01.61 | General Packet Radio Service (GPRS); GPRS ciphering algorithm requirements | Prof. Walker, Michael |
TS 02.09 | Security aspects | Mr. Christoffersson, Per |
TS 02.31 | Fraud Information Gathering System (FIGS); Service description; Stage 1 | Mr. Sahlin, Bengt |
TS 02.32 | Immediate Service Termination (IST); Service description; Stage 1 | Mr. Sahlin, Bengt |
TS 02.33 | Lawful Interception (LI); Stage 1 | Mr. Spalt, Bernhard |
TS 03.20 | Security-related network functions | Mr. Nguyen Ngoc, Sebastien |
TS 03.20ext | Security-related fetwork functions (Ext) | Mr. Nguyen Ngoc, Sebastien |
TS 03.31 | Fraud Information Gathering System (FIGS); Service description; Stage 2 | Mr. Sahlin, Bengt |
TS 03.33 | 3G Security; Lawful Interception; Stage 2 | Mr. Spalt, Bernhard |
TS 03.35 | Immediate Service Termination (IST); Stage 2 | Mr. Sahlin, Bengt |
TR 10.20 | Lawful Interception requirements for GSM | Mr. Mckibben, Bernie |
TS 21.133 | 3G security; Security threats and requirements | Mr. Christoffersson, Per |
TS 22.031 | 3G Security; Fraud Information Gathering System (FIGS); Service description; Stage 1 | Mr. Bleckert, Peter |
TS 22.032 | Immediate Service Termination (IST); Service description; Stage 1 | Mr. Bleckert, Peter |
TS 23.031 | 3G Security; Fraud Information Gathering System (FIGS); Technical realization; Stage 2 | Mr. Sahlin, Bengt |
TS 23.035 | Immediate Service Termination (IST); Stage 2 | Mr. Sahlin, Bengt |
TS 33.102 | 3G security; Security architecture | Miss Jerichow, Anja |
TS 33.103 | 3G security; Integration guidelines | Mr. Blanchard, Colin |
TS 33.105 | 3G Security; Cryptographic algorithm requirements | Mr. Chikazawa, Takeshi |
TS 33.106 | 3G security; Lawful interception requirements | Mr. Jaspers, Koen |
TS 33.107 | 3G security; Lawful interception architecture and functions | Mr. Jaspers, Koen |
TS 33.108 | 3G security; Handover interface for Lawful Interception (LI) | Mr. Rao, Nagaraja |
TS 33.110 | Key establishment between a Universal Integrated Circuit Card (UICC) and a terminal | Mrs. Pauliac, Mireille |
TS 33.116 | Security Assurance Specification (SCAS) for the MME network product class | Dr. Zugenmaier, Alf |
TS 33.117 | Catalogue of general security assurance requirements | Dr. Zugenmaier, Alf |
TS 33.120 | Security Objectives and Principles | Mr. Sahlin, Bengt |
TS 33.122 | Security aspects of Common API Framework (CAPIF) for 3GPP northbound APIs | Mr. Rajadurai, Rajavelsamy |
TS 33.126 | Lawful Interception requirements | Mr. Jaspers, Koen |
TS 33.127 | Lawful Interception (LI) architecture and functions | Mr. Jaspers, Koen |
TS 33.128 | Security; Protocol and procedures for Lawful Interception (LI); Stage 3 | Mr. Rao, Nagaraja |
TS 33.141 | Presence service; Security | Mr. Mattsson, John |
TS 33.163 | Battery Efficient Security for very low throughput Machine Type Communication (MTC) devices (BEST) | Mr. Evans, Tim P. |
TS 33.179 | Security of Mission Critical Push To Talk (MCPTT) over LTE | Mr. Haigh, Peter |
TS 33.180 | Security of the Mission Critical (MC) service | Mr. Woodward, Tim |
TS 33.185 | Security aspect for LTE support of Vehicle-to-Everything (V2X) services | Mr. Wong, Marcus |
TS 33.187 | Security aspects of Machine-Type Communications (MTC) and other mobile data applications communications enhancements | Mr. Rajadurai, Rajavelsamy |
TS 33.200 | 3G Security; Network Domain Security (NDS); Mobile Application Part (MAP) application layer security | Dr. Escott, Adrian |
TS 33.203 | 3G security; Access security for IP-based services | Dr. Ben Henda, Noamen |
TS 33.204 | 3G Security; Network Domain Security (NDS); Transaction Capabilities Application Part (TCAP) user security | Miss Jerichow, Anja |
TS 33.210 | Network Domain Security (NDS); IP network layer security | Mr. Kohalmi, Steve |
TS 33.216 | Security Assurance Specification (SCAS) for the evolved Node B (eNB) network product class | Mr. Wong, Marcus |
TS 33.220 | Generic Authentication Architecture (GAA); Generic Bootstrapping Architecture (GBA) | Miss Jerichow, Anja |
TS 33.221 | Generic Authentication Architecture (GAA); Support for subscriber certificates | Miss Jerichow, Anja |
TS 33.222 | Generic Authentication Architecture (GAA); Access to network application functions using Hypertext Transfer Protocol over Transport Layer Security (HTTPS) | Mr. Lehtovirta, Vesa |
TS 33.223 | Generic Authentication Architecture (GAA); Generic Bootstrapping Architecture (GBA) Push function | Miss Jerichow, Anja |
TS 33.224 | Generic Authentication Architecture (GAA); Generic Bootstrapping Architecture (GBA) push layer | Dr. Blom, Rolf |
TS 33.226 | Security assurance for IP Multimedia Subsystem (IMS) | Dr. Zhang, Bo |
TS 33.234 | 3G security; Wireless Local Area Network (WLAN) interworking security | Mr. Lehtovirta, Vesa |
TS 33.246 | 3G Security; Security of Multimedia Broadcast/Multicast Service (MBMS) | Dr. Escott, Adrian |
TS 33.250 | Security assurance specification for the PGW network product class | Mr. Peng, Jin |
TS 33.256 | Security aspects of Uncrewed Aerial Systems (UAS) | Dr. Escott, Adrian |
TS 33.259 | Key establishment between a UICC hosting device and a remote device | Mr. Lehtovirta, Vesa |
TS 33.303 | Proximity-based Services (ProSe); Security aspects | Dr. Escott, Adrian |
TS 33.310 | Network Domain Security (NDS); Authentication Framework (AF) | Miss Jerichow, Anja |
TS 33.320 | Security of Home Node B (HNB) / Home evolved Node B (HeNB) | Mr. Wong, Marcus |
TS 33.326 | Security Assurance Specification (SCAS) for the Network Slice-Specific Authentication and Authorization Function (NSSAAF) network product class | Mrs. Rong, Wu |
TS 33.328 | IP Multimedia Subsystem (IMS) media plane security | Mr. Evans, Tim P. |
TS 33.401 | 3GPP System Architecture Evolution (SAE); Security architecture | Dr. Prasad, Anand |
TS 33.402 | 3GPP System Architecture Evolution (SAE); Security aspects of non-3GPP accesses | Miss Jerichow, Anja |
TS 33.434 | Security aspects of Service Enabler Architecture Layer (SEAL) for verticals | Mr. Rajadurai, Rajavelsamy |
TS 33.501 | Security architecture and procedures for 5G System | Dr. Zugenmaier, Alf |
TS 33.503 | Security Aspects of Proximity based Services (ProSe) in the 5G System (5GS) | Mr. Zhou, Wei |
TS 33.511 | Security Assurance Specification (SCAS) for the next generation Node B (gNodeB) network product class | Mr. Wong, Marcus |
TS 33.512 | 5G Security Assurance Specification (SCAS); Access and Mobility management Function (AMF) | Ms. Deng, Juan |
TS 33.513 | 5G Security Assurance Specification (SCAS); User Plane Function (UPF) | Mr. Rajadurai, Rajavelsamy |
TS 33.514 | 5G Security Assurance Specification (SCAS) for the Unified Data Management (UDM) network product class | Dr. Yoshizawa, Taka |
TS 33.515 | 5G Security Assurance Specification (SCAS) for the Session Management Function (SMF) network product class | Mr. Wong, Marcus |
TS 33.516 | 5G Security Assurance Specification (SCAS) for the Authentication Server Function (AUSF) network product class | Dr. Jost, Christine |
TS 33.517 | 5G Security Assurance Specification (SCAS) for the Security Edge Protection Proxy (SEPP) network product class | Mr. Peinado, German |
TS 33.518 | 5G Security Assurance Specification (SCAS) for the Network Repository Function (NRF) network product class | Mr. Orkopoulos, Stawros |
TS 33.519 | 5G Security Assurance Specification (SCAS) for the Network Exposure Function (NEF) network product class | Mr. PENG, Jin |
TS 33.520 | Security Assurance Specification (SCAS) for Non-3GPP InterWorking Function (N3IWF) | Dr. Gao, Feng |
TS 33.521 | 5G Security Assurance Specification (SCAS);Network Data Analytics Function (NWDAF) | Mr. Qi, Minpeng |
TS 33.522 | 5G Security Assurance Specification (SCAS); Service Communication Proxy (SCP) | Miss Jerichow, Anja |
TS 33.523 | 5G Security Assurance Specification (SCAS); Split gNB product classes | Dr. Escott, Adrian |
TS 33.526 | Security assurance specification for the Management Function (MnF) | Dr. Ben Henda, Noamen |
TS 33.527 | Security Assurance Specification (SCAS) for 3GPP virtualized network products | Mr. Qi, Minpeng |
TS 33.528 | Security Assurance Specification (SCAS) for the Policy Control Function (PCF) | Mr. Andreas, Joerg |
TS 33.529 | Security Assurance Specification (SCAS) for the Short Message Service Function (SMSF) network product class | Prof. Hanawal, Manjesh Kumar |
TS 33.530 | Security Assurance Specification (SCAS) for Unified Data Repository (UDR) | Mr. Andreas, Joerg |
TS 33.533 | Security aspects of ranging based services and sidelink positioning | Ms. Lu, Wei |
TS 33.535 | Authentication and Key Management for Applications (AKMA) based on 3GPP credentials in the 5G System (5GS) | Miss Huang, Xiaoting |
TS 33.536 | Security aspects of 3GPP support for advanced Vehicle-to-Everything (V2X) services | Mr. Kim, Dongjoo |
TS 33.537 | Security Assurance Specification (SCAS) for the Authentication and Key Management for Applications (AKMA) Anchor Function (AAnF) | Miss Huang, Xiaoting |
TS 33.558 | Security aspects of enhancement of support for enabling edge applications | Dr. Zhang, Bo |
TS 33.700-22 | Study on security aspects of CAPIF Phase3 | Dr. Liang, Haoran |
TR 33.700-28 | Study on security aspects of satellite access | Ms. Lu, Wei |
TR 33.700-29 | Study on Security and Privacy Aspects of 5G Satellite Access Phase 3 | Mr. Zhou, Wei |
TR 33.700-32 | Study on the security aspects for usage of user identifiers in the 5G system | Mr. Ferdi, Samir |
TR 33.700-41 | Study on enabling a cryptographic algorithm transition to 256bits | Dr. Nakano, Yuto |
TR 33.701 | Study on mitigations against bidding down Attacks | Dr. Ben Henda, Noamen |
TR 33.702 | Security for mobility over non-3GPP access to avoid full primary authentication | Mr. Khare, Saurabh |
TR 33.713 | Study on security aspects of Ambient Internet of Things (AIoT) services in 5G | Mr. Wong, Marcus |
TR 33.721 | Study on security aspects of 5G mobile metaverse services | Ms. Rajendran, Rohini |
TR 33.737 | Study on Authentication and Key Management for Applications (AKMA) phase 2 | Miss Huang, Xiaoting |
TR 33.738 | Study on security aspects of enablers for network automation for the 5G system phase 3 | Mr. Liu, Chang |
TR 33.739 | Study on security enhancement of support for edge computing phase 2 | Dr. Zhang, Bo |
TR 33.740 | Study on security aspects of Proximity Based Services (ProSe) in 5G System (5GS) phase 2 | Mr. Zhou, Wei |
TR 33.741 | Study on home network triggered primary authentication | Mr. Li, He |
TR 33.743 | Study on security aspects of enhancement for Proximity Based Services (ProSe) in 5G Systems (5GS) phase 3 | Dr. Lei, Ao |
TR 33.745 | Study on security aspects of 5G Next Radio (NR) Femto | Miss Liu, Peilin |
TR 33.749 | Study on security aspects of enhancement of support for edge computing in the 5G Core (5GC) phase 3 | Dr. Yao, Ge |
TR 33.754 | Study on security aspects for multi-access (dualSteer + ATSSS Ph-4) | Mr. Kolekar, Abhijeet |
TR 33.757 | Study on security for PLMN hosting a NPN | Ms. Shen, Jun |
TR 33.759 | Study on security enhancements of Uncrewed Aerial Systems (UAS) Phase 3 | Mr. Hanhisalo, Markus |
TR 33.766 | Study on 5G System (5GS) enhancements for energy saving | Mr. Bjerrum, Bo Holm |
TR 33.769 | Feasibility Study on Security Aspects of Machine-Type Communications Enhancements to facilitate communications with Packet Data Networks and Applications | Mr. Rajadurai, Rajavelsamy |
TR 33.776 | Study of ACME for Automated Certificate Management in SBA | Mr. Eckel, Charles |
TR 33.784 | Study on security aspects of core network enhanced support for Artificial Intelligence Machine Learning (AIML) | Mr. Liu, Chang |
TR 33.790 | Study on the security support for the next generation real time communication services phase 2 | Dr. Tsiatsis, Vlasios |
TR 33.794 | Study on enablers for Zero Trust Security | Dr. Baskaran, Sheeba Backia Mary |
TR 33.803 | Coexistence between TISPAN and 3GPP authentication schemes | Miss Fouquet, Sylvie |
TR 33.804 | Single Sign On (SSO) application security for Common IP Multimedia Subsystem (IMS) based on Session Initiation Protocol (SIP) Digest | Dr. Holtmanns, Silke |
TR 33.805 | Study on security assurance methodology for 3GPP network products | Mr. Habermacher, Loic |
TR 33.807 | Study on the security of the wireless and wireline convergence for the 5G system architecture | Mr. Li, He |
TR 33.808 | KDF negotiation for 5GS security – phase2 | Dr. Muhanna, Ahmad |
TR 33.809 | Study on 5G security enhancements against False Base Stations (FBS) | Ms. Guo, Ivy |
TR 33.810 | 3G Security; Network Domain Security / Authentication Framework (NDS/AF); Feasibility Study to support NDS/IP evolution | Mr. Sahlin, Bengt |
TR 33.811 | Study on security aspects of 5G network slicing management | Dr. Lei, Zander (Zhongding) |
TR 33.812 | Feasibility study on the security aspects of remote provisioning and change of subscription for Machine to Machine (M2M) equipment | Mr. Lehtovirta, Vesa |
TR 33.813 | Study on security aspects of network slicing enhancement | Mr. Nair, Suresh |
TR 33.814 | Study on the security of the enhancement to the 5G Core (5GC) location services | Mr. Zhou, Wei |
TR 33.815 | Study on security aspects of Provision of Access to Restricted Local Operator Services by Unauthenticated UEs (PARLOS) | Mr. Schumacher, Greg |
TR 33.816 | Feasibility study on LTE relay node security | Dr. Escott, Adrian |
TR 33.817 | Feasibility study on (Universal) Subscriber Interface Module (U)SIM security reuse by peripheral devices on local interfaces | Dr. Yaqub, Raziq |
TR 33.818 | Security Assurance Methodology (SECAM) and Security Assurance Specification (SCAS) for 3GPP virtualized network products | Mr. Qi, Minpeng |
TR 33.819 | Study on security enhancements of 5G System (5GS) for vertical and Local Area Network (LAN) services | Miss Jerichow, Anja |
TR 33.820 | Security of Home Node B (HNB) / Home evolved Node B (HeNB) | Mr. Yang, Yangmei |
TR 33.821 | Rationale and track of security decisions in Long Term Evolution (LTE) RAN / 3GPP System Architecture Evolution (SAE) | Dr. Zhang, Dajiang |
TR 33.822 | Security aspects for inter-access mobility between non 3GPP and 3GPP access network | Dr. Zhang, Dajiang |
TR 33.823 | Security for usage of Generic Bootstrapping Architecture (GBA) with a User Equipment (UE) browser | Dr. Holtmanns, Silke |
TR 33.824 | Study on Security for Next Radio (NR) Integrated Access and Backhaul (IAB) | Mr. Rajadurai, Rajavelsamy |
TR 33.825 | Study on the security of Ultra-Reliable Low-Latency Communication (URLLC) for the 5G System (5GS) | Mrs. Rong, Wu |
TR 33.826 | Study on Lawful Interception Service Evolution | Mr. Jacobson, Terry |
TR 33.827 | Study on providing for Lawful Interception (LI) in the S8 Home Routeing (S8HR) architecture for Voice over LTE (VoLTE) | Mr. Schumacher, Greg |
TR 33.828 | IP Multimedia Subsystem (IMS) media plane security | Mr. Howard, Peter |
TR 33.829 | Extended IP Multimedia Subsystem (IMS) media plane security features | Mr. Howard, Peter |
TR 33.830 | Feasibility study on IMS firewall traversal | Mr. Kumar, Prashant |
TR 33.831 | Study on security on spoofed call detection and prevention (Stage 2) | Mr. Li, Xiangjun |
TR 33.832 | Study on IMS Enhanced Spoofed Call Prevention and Detection | Mr. Schumacher, Greg |
TR 33.833 | Study on security issues to support Proximity Services (ProSe) | Dr. Escott, Adrian |
TR 33.834 | Study on Long Term Key Update Procedures (LTKUP) | Mr. Evans, Tim P. |
TR 33.835 | Study on authentication and key management for applications based on 3GPP credential in 5G | Miss Huang, Xiaoting |
TR 33.836 | Study on security aspects of 3GPP support for advanced Vehicle-to-Everything (V2X) services | Mr. Kim, Dongjoo |
TR 33.838 | Study on Protection against Unsolicited Communication for IMS (PUCI) | Dr. Prasad, Anand |
TR 33.839 | Study on security aspects of enhancement of support for edge computing in the 5G Core (5GC) | Dr. Zhang, Bo |
TR 33.840 | Study on security aspects of the disaggregated gNB architecture | Mr. xu, sen |
TR 33.841 | Study on the support of 256-bit algorithms for 5G | Mr. Evans, Tim P. |
TR 33.842 | Study on Lawful Interception (LI) service in 5G | Mr. McQuaid, Gerald |
TR 33.843 | Study on security architecture enhancements to Proximity Services (ProSe) User Equipment (UE)-to-network relay | Mr. Li, He |
TR 33.844 | Security Study on IP Multimedia Subsystem (IMS) based peer-to-peer content distribution services; Stage 2 | Dr. Qing, Yu |
TR 33.845 | Study on storage and transport of 5G Core (5GC) security parameters for Authentication Credential Repository Processing Function (ARPF) authentication | Mr. Evans, Tim P. |
TR 33.846 | Study on authentication enhancements in the 5G System (5GS) | Dr. Tsiatsis, Vlasios |
TR 33.847 | Study on security aspects of enhancement for proximity based services in the 5G System (5GS) | Mr. Zhou, Wei |
TR 33.848 | Study on security impacts of virtualisation | Mr. Leadbeater, Alex |
TR 33.849 | Study on subscriber privacy impact in 3GPP | Dr. Gao, Feng |
TR 33.850 | Study on security aspects of enhancements for 5G Multicast-Broadcast Services (MBS) | Mr. Guo, Longhua |
TR 33.851 | Study on security for enhanced support of Industrial Internet of Things (IIoT) | Miss Jerichow, Anja |
TR 33.853 | Study on key issues and potential solutions for integrity protection of the User Plane (UP) | Mr. Evans, Tim P. |
TR 33.854 | Study on security aspects of Uncrewed Aerial Systems (UAS) | Dr. Escott, Adrian |
TR 33.855 | Study on security aspects of the 5G Service Based Architecture (SBA) | Dr. Jost, Christine |
TR 33.856 | Study on security aspects of single radio voice continuity from 5G to UTRAN | Dr. Gao, Feng |
TR 33.857 | Study on enhanced security support for Non-Public Networks (NPN) | Dr. Jost, Christine |
TR 33.858 | Study on security aspects of enhanced support of Non-Public Networks (NPN) phase 2 | Dr. Jost, Christine |
TR 33.859 | Study on the Introduction of Key Hierarchy in Universal Terrestrial Radio Access Network (UTRAN) | Mr. Norrman, Karl |
TR 33.860 | Study on Enhanced General Packet Radio Service (EGPRS) access security enhancements with relation to cellular Internet of Things (IoT) | Mr. Torvinen, Vesa |
TR 33.861 | Study on evolution of Cellular Internet of Things (CIoT) security for the 5G System | Mr. Normann, Henrik Andreas |
TR 33.862 | Study on security aspects of the Message Service for MIoT over the 5G System (MSGin5G) | Miss Huang, Xiaoting |
TR 33.863 | Study on battery efficient security for very low throughput Machine Type Communication (MTC) devices | Mr. Evans, Tim P. |
TR 33.864 | Study on the security of Access and Mobility Management Function (AMF) re-allocation | Dr. Tsiatsis, Vlasios |
TR 33.865 | Security Aspects of WLAN Network Selection for 3GPP Terminals | Ms. Xu, Lydia |
TR 33.866 | Study on security aspects of enablers for Network Automation (eNA) for the 5G system (5GS) Phase 2 | Miss Huang, Xiaoting |
TR 33.867 | Study on user consent for 3GPP services | Mrs. Rong, Wu |
TR 33.868 | Study on security aspects of Machine-Type Communications (MTC) and other mobile data applications communications enhancements | Mr. Rajadurai, Rajavelsamy |
TR 33.870 | Study of privacy of identifiers over radio access | Mr. Brusilovsky, Alec |
TR 33.871 | Study on security for Web Real Time Communications (WebRTC) IP Multimedia Subsystem (IMS) client access to IMS | Mr. Ohlsson, Oscar |
TR 33.872 | Study on security enhancements to Web Real Time Communication (WebRTC) access to IP Multimedia Subsystem (IMS) | Mr. Lehtovirta, Vesa |
TR 33.873 | Study on the security of the system enablers for devices having Multiple Universal Subscriber Identity Modules (MUSIM) | Mr. Kolekar, Abhijeet |
TR 33.874 | Study on enhanced security for network slicing phase 2 | Dr. Lei, Zander (Zhongding) |
TR 33.875 | Study on enhanced security aspects of the 5G Service Based Architecture (SBA) | Miss Jerichow, Anja |
TR 33.876 | Study on automated certificate management in Service-Based Architecture (SBA) | Mr. Peinado, German |
TR 33.877 | Study on the security aspects of Artificial Intelligence (AI)/Machine Learning (ML) for the Next Generation Radio Access Network (NG-RAN) | Dr. Tsiatsis, Vlasios |
TR 33.879 | Study on security enhancements for Mission Critical Push To Talk (MCPTT) over LTE | Mr. Haigh, Peter |
TR 33.880 | Study on mission critical security enhancements | Mr. Haigh, Peter |
TR 33.881 | Study on Non-Seamless WLAN Offload (NSWO) in 5G System (5GS) using 3GPP credentials | Mr. M Dhanasekaran, Ranganathan |
TR 33.882 | Study on personal Internet of Things (IoT) networks security aspects | Mr. Xie, Zhenhua |
TR 33.883 | Study on security enhancements for 5G multicast-broadcast services phase 2 | Mr. Guo, Longhua |
TR 33.884 | Study on security of application enablement aspects for subscriber-aware northbound API access | Dr. Zugenmaier, Alf |
TR 33.885 | Study on security aspects for LTE support of Vehicle-to-Everything (V2X) services | Mr. Wong, Marcus |
TR 33.886 | Study on enhanced security for network slicing phase 3 | Dr. Lei, Zander (Zhongding) |
TR 33.887 | Study on security aspects for support for 5G Wireless and Wireline Convergence (5WWC) phase 2 | Mr. Khare, Saurabh |
TR 33.888 | Study on security issues to support Group Communication System Enablers (GCSE) for LTE | Mr. Merkel, Jürgen |
TR 33.889 | Study on security aspects of Machine-Type Communications (MTC) architecture and feature enhancements | Mr. Rajadurai, Rajavelsamy |
TR 33.890 | Study on security support for next generation real time communication services | Mr. Li, Fei |
TR 33.891 | Study on security of phase 2 for Uncrewed Aerial System (UAS), Uncrewed Aerial Vehicle (UAV) and Urban Air Mobility (UAM) | Dr. Escott, Adrian |
TR 33.892 | Study on UE Route Selection Policy (URSP) rules to securely identify applications | Dr. Kunz, Andreas |
TR 33.893 | Study on security aspects of ranging-based services and sidelink positioning | Ms. Lu, Wei |
TR 33.894 | Study on applicability of the zero trust security principles in mobile networks | Dr. Baskaran, Sheeba Backia Mary |
TR 33.896 | Study of security aspects on user consent for 3GPP services phase 2 | Mrs. Rong, Wu |
TR 33.897 | Study on isolated E-UTRAN operation for public safety; Security aspects | Dr. Piggin, Paul |
TR 33.898 | Study on security and privacy of Artificial Intelligence/Machine Learning (AI/ML)-based services and applications in 5G | Mr. Wong, Marcus |
TR 33.901 | Criteria for cryptographic Algorithm design process | Dr. Blom, Rolf |
TR 33.902 | Formal Analysis of the 3G Authentication Protocol | Dr. Horn, Guenther |
TR 33.905 | Recommendations for Trusted Open Platforms | Dr. Holtmanns, Silke |
TR 33.908 | 3G Security; General report on the design, specification and evaluation of 3GPP standard confidentiality and integrity algorithms | Prof. Walker, Michael |
TR 33.909 | 3G Security; Report on the design and evaluation of the MILENAGE algorithm set; Deliverable 5: An example algorithm for the 3GPP authentication and key generation functions | Prof. Walker, Michael |
TR 33.916 | Security Assurance Methodology (SECAM) for 3GPP network products | Dr. Zugenmaier, Alf |
TR 33.918 | Generic Authentication Architecture (GAA); Early implementation of Hypertext Transfer Protocol over Transport Layer Security (HTTPS) connection between a Universal Integrated Circuit Card (UICC) and a Network Application Function (NAF) | Mr. Seif, Jacques |
TR 33.919 | 3G Security; Generic Authentication Architecture (GAA); System description | Mrs. Van Moffaert, Annelies |
TR 33.920 | SIM card based Generic Bootstrapping Architecture (GBA); Early implementation feature | Dr. Holtmanns, Silke |
TR 33.924 | Identity management and 3GPP security interworking; Identity management and Generic Authentication Architecture (GAA) interworking | Dr. Holtmanns, Silke |
TR 33.926 | Security Assurance Specification (SCAS) threats and critical assets in 3GPP network product classes | Mr. Wong, Marcus |
TR 33.927 | Security Assurance Specification (SCAS); threats and critical assets in 3GPP virtualized network product classes | Mr. Qi, Minpeng |
TR 33.928 | ADMF logic for provisioning Lawful Interception (LI) | Mr. Rao, Nagaraja |
TR 33.929-1 | Lawful Interception (LI) implementation guidance; LI for IMS based services | Mr. Rao, Nagaraja |
TR 33.929-2 | Lawful Interception (LI) implementation guidance; LI for IMS based STIR/SHAKEN | Mr. Rao, Nagaraja |
TR 33.929-3 | Lawful Interception (LI) implementation guidance; LI for messaging services | Mr. Rao, Nagaraja |
TR 33.929-4 | Lawful Interception (LI) implementation guidance; LI for data in 5G core | Mr. Rao, Nagaraja |
TR 33.929-5 | Lawful Interception (LI) implementation guidance; LI for ID association caching | Mr. Rao, Nagaraja |
TS 33.929-6 | Lawful Interception (LI) implementation guidance; LI for IMS based RCS | Mr. Rao, Nagaraja |
TR 33.929-7 | Lawful Interception (LI) implementation guidance; LI location acquisition capabilities | Mr. Rao, Nagaraja |
TR 33.929-8 | Lawful Interception (LI) implementation guidance; LI for MMS | Mr. Rao, Nagaraja |
TR 33.929-9 | Lawful Interception (LI) implementation guidance; LI for PTC | Mr. Rao, Nagaraja |
TR 33.935 | Study on detailed Long Term Key Update Process (LTKUP) detailed solutions | Mr. Evans, Tim P. |
TR 33.936 | Security Assurance Methodology (SECAM) for 3GPP virtualized network products | Mr. Qi, Minpeng |
TR 33.937 | Study of mechanisms for Protection against Unsolicited Communication for IMS (PUCI) | Dr. Prasad, Anand |
TR 33.969 | Study on security aspects of Public Warning System (PWS) | Mr. Mattsson, John |
TR 33.978 | Security aspects of early IP Multimedia Subsystem (IMS) | Mr. Howard, Peter |
TR 33.980 | Liberty Alliance and 3GPP security interworking; Interworking of Liberty Alliance Identity Federation Framework (ID-FF), Identity Web Services Framework (ID-WSF) and Generic Authentication Architecture (GAA) | Dr. Holtmanns, Silke |
TS 35.201 | 3G Security; Specification of the 3GPP confidentiality and integrity algorithms; Document 1: f8 and f9 specification | Mr. Evans, Tim P. |
TS 35.202 | 3G Security; Specification of the 3GPP confidentiality and integrity algorithms; Document 2: Kasumi specification | Mr. Evans, Tim P. |
TS 35.203 | 3G Security; Specification of the 3GPP confidentiality and integrity algorithms; Document 3: Implementors' test data | Mr. Evans, Tim P. |
TS 35.204 | 3G Security; Specification of the 3GPP confidentiality and integrity algorithms; Document 4: Design conformance test data | Mr. Evans, Tim P. |
TS 35.205 | 3G Security; Specification of the MILENAGE algorithm set: An example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 1: General | Mr. Evans, Tim P. |
TS 35.206 | 3G Security; Specification of the MILENAGE algorithm set: An example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 2: Algorithm specification | Mr. Evans, Tim P. |
TS 35.207 | 3G Security; Specification of the MILENAGE algorithm set: An example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 3: Implementors' test data | Mr. Evans, Tim P. |
TS 35.208 | 3G Security; Specification of the MILENAGE algorithm set: An example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 4: Design conformance test data | Mr. Evans, Tim P. |
TS 35.215 | Specification of the 3GPP Confidentiality and Integrity Algorithms UEA2 & UIA2; Document 1: UEA2 and UIA2 specifications | Mr. Sahlin, Bengt |
TS 35.216 | Specification of the 3GPP Confidentiality and Integrity Algorithms UEA2 & UIA2; Document 2: SNOW 3G specification | Mr. Sahlin, Bengt |
TS 35.217 | Specification of the 3GPP Confidentiality and Integrity Algorithms UEA2 & UIA2; Document 3: Implementors' test data | Mr. Sahlin, Bengt |
TS 35.218 | Specification of the 3GPP Confidentiality and Integrity Algorithms UEA2 & UIA2; Document 4: Design conformance test data | Mr. Sahlin, Bengt |
TS 35.221 | Specification of the 3GPP Confidentiality and Integrity Algorithms EEA3 & EIA3; Document 1: EEA3 and EIA3 specifications | Ms. Qi, Yuan |
TS 35.222 | Specification of the 3GPP Confidentiality and Integrity Algorithms EEA3 & EIA3; Document 2: ZUC specification | Ms. Qi, Yuan |
TS 35.223 | Specification of the 3GPP Confidentiality and Integrity Algorithms EEA3 & EIA3; Document 3: Implementors' test data | Ms. Qi, Yuan |
TS 35.231 | Specification of the TUAK algorithm set: A second example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 1: Algorithm specification | Mr. Evans, Tim P. |
TS 35.232 | Specification of the TUAK algorithm set: A second example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 2: Implementers’ test data | Mr. Evans, Tim P. |
TS 35.233 | Specification of the TUAK algorithm set: A second example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 3: Design conformance test data | Mr. Evans, Tim P. |
TS 35.234 | Specification of the MILENAGE-256 algorithm set: An example set of 256-bit 3GPP Authentication and Key Generation functions f1, f1*, f2, f3, f4, f5, f5* and f5**; Document 1: General | Mrs. Pauliac, Mireille |
TS 35.235 | Specification of the MILENAGE-256 algorithm set: An example set of 256-bit 3GPP Authentication and Key Generation functions f1, f1*, f2, f3, f4, f5, f5* and f5**; Document 2: Algorithm Specification | Mrs. Pauliac, Mireille |
TS 35.236 | Specification of the MILENAGE-256 algorithm set: An example set of 256-bit 3GPP Authentication and Key Generation functions f1, f1*, f2, f3, f4, f5, f5* and f5**; Document 3: Implementors’ Test Data and Design Conformance Test Data | Mrs. Pauliac, Mireille |
TS 35.237 | Specification of the MILENAGE-256 algorithm set: An example set of 256-bit 3GPP Authentication and Key Generation functions f1, f1*, f2, f3, f4, f5, f5* and f5**; Document 4: Summary and Results of Design and Evaluation | Mrs. Pauliac, Mireille |
TS 35.240 | Specification of the Snow 5G based 256-bits algorithm set: specification of the 256-NEA4 encryption, the 256-NIA4 integrity, and the 256-NCA4 authenticated encryption algorithm for 5G; Document 1: algorithm specification | Mr. Orkopoulos, Stawros |
TS 35.241 | Specification of the Snow 5G based 256-bits algorithm set: Specification of the 256-NEA4 encryption, the 256-NIA4 integrity algorithm, and the 256-NCA4 authenticated encryption algorithm for 5G; Document 2: implementation test data | Mr. Orkopoulos, Stawros |
TS 35.242 | Specification of the Snow 5G based 256-bits algorithm set: Specification of the 256-NEA4 encryption, the 256-NIA4 integrity, and the 256-NCA4 authenticated encryption algorithm for 5G; Document 3: design conformance test data | Mr. Orkopoulos, Stawros |
TS 35.243 | Specification of the AES based 256-bits algorithm set: Specification of the 256-NEA5 encryption, the 256-NIA5 integrity, and the 256-NCA5 authenticated encryption algorithm for 5G; Document 1: algorithm specification | Mr. Orkopoulos, Stawros |
TS 35.244 | Specification of the AES based 256-bits algorithm set: Specification of the 256-NEA5 encryption, the 256-NIA5 integrity, and the 256-NCA5 authenticated encryption algorithm for 5G; Document 2: implementation test data | Mr. Orkopoulos, Stawros |
TS 35.245 | Specification of the AES based 256-bits algorithm set: Specification of the 256-NEA5 encryption, the 256-NIA5 integrity, and the 256-NCA5 authenticated encryption algorithm for 5G; Document 3: design conformance test data | Mr. Orkopoulos, Stawros |
TS 35.246 | Specification of the ZUC based 256-bits algorithm set: Specification of the 256-NEA6 encryption, the 256-NIA6 integrity, and the 256-NCA6 authenticated encryption algorithm for 5G; Document 1: algorithm specification | Mr. Orkopoulos, Stawros |
TS 35.247 | Specification of the ZUC based 256-bits algorithm set: Specification of the 256-NEA6 encryption, the 256-NIA6 integrity, and the 256-NCA6 authenticated encryption algorithm for 5G; Document 2: implementation test data | Mr. Orkopoulos, Stawros |
TS 35.248 | Specification of the ZUC based 256-bits algorithm set: Specification of the 256-NEA6 encryption, the 256-NIA6 integrity, and the 256-NCA6 authenticated encryption algorithm for 5G; Document 3: design conformance test data | Mr. Orkopoulos, Stawros |
TR 35.909 | 3G Security; Specification of the MILENAGE algorithm set: an example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 5: Summary and results of design and evaluation | Prof. Walker, Michael |
TR 35.919 | Specification of the 3GPP Confidentiality and Integrity Algorithms UEA2 & UIA2; Document 5: Design and evaluation report | Mr. Sahlin, Bengt |
TR 35.924 | Specification of the 3GPP Confidentiality and Integrity Algorithms EEA3 & EIA3; Document 4: Design and Evaluation Report | Ms. Qi, Yuan |
TR 35.934 | Specification of the TUAK algorithm set: A second example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 4: Report on the design and evaluation | Mr. Barry, Aguibou |
TR 35.935 | Specification of the TUAK algorithm set: A second example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 5: Performance evaluation | Mr. Barry, Aguibou |
TR 35.936 | Specification of the TUAK algorithm set: A second example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2 ,f3, f4, f5 and f5*; Document 6: Security assessment | Mr. Barry, Aguibou |
TR 35.937 | Specification of the MILENAGE-256 algorithm set: An example set of 256-bit 3GPP Authentication and Key Generation functions f1, f1*, f2, f3, f4, f5, f5* and f5**; Document 4: Summary and Results of Design and Evaluation | Mrs. Pauliac, Mireille |
TR 41.031 | Fraud Information Gathering System (FIGS); Service requirements; Stage 0 | Mr. Sahlin, Bengt |
TR 41.033 | Lawful Interception requirements for GSM | Mr. Leadbeater, Alex |
TS 41.061 | General Packet Radio Service (GPRS); GPRS ciphering algorithm requirements | Mr. Sahlin, Bengt |
TS 42.009 | Security aspects | Mr. Sahlin, Bengt |
TS 42.033 | Lawful Interception; Stage 1 | Mr. Leadbeater, Alex |
TS 43.020 | Security related network functions | Mr. Sahlin, Bengt |
TS 43.033 | 3G security; Lawful Interception; Stage 2 | Mr. Leadbeater, Alex |
TS 55.205 | Specification of the GSM-MILENAGE algorithms: An example algorithm set for the GSM Authentication and Key Generation Functions A3 and A8 | Mr. Evans, Tim P. |
TS 55.216 | 3G Security; Specification of the A5/3 encryption algorithms for GSM and ECSD, and the GEA3 encryption algorithm for GPRS; Document 1: A5/3 and GEA3 specifications | Mr. Sahlin, Bengt |
TS 55.217 | 3G Security; Specification of the A5/3 encryption algorithms for GSM and ECSD, and the GEA3 encryption algorithm for GPRS; Document 2: Implementors' test data | Mr. Sahlin, Bengt |
TS 55.218 | 3G Security; Specification of the A5/3 encryption algorithms for GSM and ECSD, and the GEA3 encryption algorithm for GPRS; Document 3: Design conformance test data | Mr. Sahlin, Bengt |
TS 55.226 | 3G Security; Specification of the A5/4 Encryption Algorithms for GSM and ECSD, and the GEA4 Encryption Algorithm for GPRS | Dr. Prasad, Anand |
TS 55.236 | Specification of A8_V MILENAGE Algorithm: An example algorithm for the key generation function A8_V | Miss Jerichow, Anja |
TS 55.241 | Specification of the GIA4 integrity algorithm for General Packet Radio Service (GPRS); GIA4 specification | Mr. Evans, Tim P. |
TS 55.242 | Specification of the GIA4 integrity algorithm for General Packet Radio Service (GPRS); Implementers' test data | Mr. Evans, Tim P. |
TS 55.243 | Specification of the GIA4 integrity algorithm for General Packet Radio Service (GPRS); Design conformance test data | Mr. Evans, Tim P. |
TS 55.251 | Specification of the GEA5 and GIA5 encryption algorithms for General Packet Radio Service (GPRS); GEA5 and GIA5 algorithm specification | Mr. Evans, Tim P. |
TS 55.252 | Specification of the GEA5 encryption and GIA5 integrity algorithms for General Packet Radio Service (GPRS); Implementers' test data | Mr. Evans, Tim P. |
TS 55.253 | Specification of the GEA5 encryption and GIA5 integrity algorithms for General Packet Radio Service (GPRS); Design conformance test data | Mr. Evans, Tim P. |
TR 55.919 | 3G Security; Specification of the A5/3 encryption algorithms for GSM and ECSD, and the GEA3 encryption algorithm for GPRS; Document 4: Design and evaluation report | Mr. Sahlin, Bengt |