The Mobile
Broadband Standard

GPRS

EDGE

EDGE+

W-CDMA

UMTS

HSPA

HSPA+

LTE

LTE-Advanced

LTE-Advanced Pro

3GPP Specifications per TSG/WG


3GPP Specifications for group: S3 (showing rapporteur)

Click on spec number for details

TR 01.31 Fraud Information Gathering System (FIGS); Service requirements; Stage 0 Mr. Sahlin, Bengt
TR 01.33 Lawful Interception requirements for GSM Mr. Spalt, Bernhard
TS 01.61 General Packet Radio Service (GPRS); GPRS ciphering algorithm requirements Prof. Walker, Michael
TS 02.09 Security aspects Mr. Christoffersson, Per
TS 02.31 Fraud Information Gathering System (FIGS); Service description; Stage 1 Mr. Sahlin, Bengt
TS 02.32 Immediate Service Termination (IST); Service description; Stage 1 Mr. Sahlin, Bengt
TS 02.33 Lawful Interception (LI); Stage 1 Mr. Spalt, Bernhard
TS 03.20 Security-related network functions Mr. Nguyen Ngoc, Sebastien
TS 03.20ext Security-related fetwork functions (Ext) Mr. Nguyen Ngoc, Sebastien
TS 03.31 Fraud Information Gathering System (FIGS); Service description; Stage 2 Mr. Sahlin, Bengt
TS 03.33 3G Security; Lawful Interception; Stage 2 Mr. Spalt, Bernhard
TS 03.35 Immediate Service Termination (IST); Stage 2 Mr. Sahlin, Bengt
TR 10.20 Lawful Interception requirements for GSM Mr. Mckibben, Bernie
TS 21.133 3G security; Security threats and requirements Mr. Christoffersson, Per
TS 22.031 3G Security; Fraud Information Gathering System (FIGS); Service description; Stage 1 Mr. Bleckert, Peter
TS 22.032 Immediate Service Termination (IST); Service description; Stage 1 Mr. Bleckert, Peter
TS 23.031 3G Security; Fraud Information Gathering System (FIGS); Technical realization; Stage 2 Mr. Sahlin, Bengt
TS 23.035 Immediate Service Termination (IST); Stage 2 Mr. Sahlin, Bengt
TS 33.102 3G security; Security architecture Dr. Horn, Guenther
TS 33.103 3G security; Integration guidelines Mr. Blanchard, Colin
TS 33.105 3G Security; Cryptographic algorithm requirements Mr. Chikazawa, Takeshi
TS 33.106 3G security; Lawful interception requirements Mr. Jaspers, Koen
TS 33.107 3G security; Lawful interception architecture and functions Mr. Jaspers, Koen
TS 33.108 3G security; Handover interface for Lawful Interception (LI) Mr. Rao, Nagaraja
TS 33.110 Key establishment between a Universal Integrated Circuit Card (UICC) and a terminal Mrs. Pauliac, Mireille
TS 33.116 Security Assurance Specification (SCAS) for the MME network product class Dr. Zugenmaier, Alf
TS 33.117 Catalogue of general security assurance requirements Dr. Zugenmaier, Alf
TS 33.120 Security Objectives and Principles Mr. Sahlin, Bengt
TS 33.126 Lawful Interception (LI) requirements Mr. Jaspers, Koen
TS 33.127 Lawful Interception (LI) architecture and functions Mr. Jaspers, Koen
TS 33.128 Handover interface for Lawful Interception (LI) Mr. Rao, Nagaraja
TS 33.141 Presence service; Security Mr. Mattsson, John
TS 33.179 Security of Mission Critical Push To Talk (MCPTT) over LTE Mr. Haigh, Peter
TS 33.180 Security of the mission critical service Mr. Haigh, Peter
TS 33.185 Security aspect for LTE support of V2X services Mr. Wong, Marcus
TS 33.187 Security aspects of Machine-Type Communications (MTC) and other mobile data applications communications enhancements Mr. Rajadurai, Rajavelsamy
TS 33.200 3G Security; Network Domain Security (NDS); Mobile Application Part (MAP) application layer security Dr. Escott, Adrian
TS 33.203 3G security; Access security for IP-based services Dr. Prasad, Anand
TS 33.204 3G Security; Network Domain Security (NDS); Transaction Capabilities Application Part (TCAP) user security Dr. Horn, Guenther
TS 33.210 3G security; Network Domain Security (NDS); IP network layer security Mr. Kohalmi, Steve
TS 33.216 Security Assurance Specification (SCAS) for evolved Node B (eNB) network product class Mr. Wong, Marcus
TS 33.220 Generic Authentication Architecture (GAA); Generic Bootstrapping Architecture (GBA) Dr. Horn, Guenther
TS 33.221 Generic Authentication Architecture (GAA); Support for subscriber certificates Dr. Horn, Guenther
TS 33.222 Generic Authentication Architecture (GAA); Access to network application functions using Hypertext Transfer Protocol over Transport Layer Security (HTTPS) Mr. Lehtovirta, Vesa
TS 33.223 Generic Authentication Architecture (GAA); Generic Bootstrapping Architecture (GBA) Push function Dr. Holtmanns, Silke
TS 33.224 Generic Authentication Architecture (GAA); Generic Bootstrapping Architecture (GBA) push layer Dr. Blom, Rolf
TS 33.234 3G security; Wireless Local Area Network (WLAN) interworking security Mr. Lehtovirta, Vesa
TS 33.246 3G Security; Security of Multimedia Broadcast/Multicast Service (MBMS) Dr. Escott, Adrian
TS 33.250 Security Assurance Specification for PGW network product class Mr. Peng, Jin
TS 33.259 Key establishment between a UICC hosting device and a remote device Mr. Lehtovirta, Vesa
TS 33.269 Public Warning System (PWS) security architecture Mr. Mattsson, John
TS 33.303 Proximity-based Services (ProSe); Security aspects Dr. Escott, Adrian
TS 33.310 Network Domain Security (NDS); Authentication Framework (AF) Dr. Horn, Guenther
TS 33.320 Security of Home Node B (HNB) / Home evolved Node B (HeNB) Mr. Wong, Marcus
TS 33.328 IP Multimedia Subsystem (IMS) media plane security Mr. Evans, Tim P.
TS 33.401 3GPP System Architecture Evolution (SAE); Security architecture Dr. Prasad, Anand
TS 33.402 3GPP System Architecture Evolution (SAE); Security aspects of non-3GPP accesses Dr. Horn, Guenther
TS 33.501 Security architecture and procedures for 5G System Dr. Zugenmaier, Alf
TR 33.769 Feasibility Study on Security Aspects of Machine-Type Communications Enhancements to facilitate communications with Packet Data Networks and Applications Mr. Rajadurai, Rajavelsamy
TR 33.803 Coexistence between TISPAN and 3GPP authentication schemes Miss Fouquet, Sylvie
TR 33.804 Single Sign On (SSO) application security for Common IP Multimedia Subsystem (IMS) based on Session Initiation Protocol (SIP) Digest Dr. Holtmanns, Silke
TR 33.805 Study on security assurance methodology for 3GPP network products Mr. Habermacher, Loic
TR 33.810 3G Security; Network Domain Security / Authentication Framework (NDS/AF); Feasibility Study to support NDS/IP evolution Mr. Sahlin, Bengt
TR 33.812 Feasibility study on the security aspects of remote provisioning and change of subscription for Machine to Machine (M2M) equipment Mr. Lehtovirta, Vesa
TR 33.816 Feasibility study on LTE relay node security Dr. Escott, Adrian
TR 33.817 Feasibility study on (Universal) Subscriber Interface Module (U)SIM security reuse by peripheral devices on local interfaces Dr. Yaqub, Raziq
TR 33.820 Security of Home Node B (HNB) / Home evolved Node B (HeNB) Mr. Yang, Yangmei
TR 33.821 Rationale and track of security decisions in Long Term Evolution (LTE) RAN / 3GPP System Architecture Evolution (SAE) Dr. Zhang, Dajiang
TR 33.822 Security aspects for inter-access mobility between non 3GPP and 3GPP access network Dr. Zhang, Dajiang
TR 33.823 Security for usage of Generic Bootstrapping Architecture (GBA) with a User Equipment (UE) browser Dr. Holtmanns, Silke
TR 33.826 Study on Lawful Interception Service Evolution Mr. Jacobson, Terry
TR 33.827 Study on providing for Lawful Interception (LI) in the S8 Home Routeing (S8HR) architecture for Voice over LTE (VoLTE) Mr. Schumacher, Greg
TR 33.828 IP Multimedia Subsystem (IMS) media plane security Mr. Howard, Peter
TR 33.829 Extended IP Multimedia Subsystem (IMS) media plane security features Mr. Howard, Peter
TR 33.830 Feasibility study on IMS firewall traversal Mr. Kumar, Prashant
TR 33.831 Study on security on spoofed call detection and prevention (Stage 2) Mr. Li, Xiangjun
TR 33.832 Study on IMS Enhanced Spoofed Call Prevention and Detection Mr. Schumacher, Greg
TR 33.833 Study on security issues to support Proximity Services (ProSe) Dr. Escott, Adrian
TR 33.838 Study on Protection against Unsolicited Communication for IMS (PUCI) Dr. Prasad, Anand
TS 33.842 Study on Lawful Interception (LI) service in 5G Mr. McQuaid, Gerald
TR 33.843 Study on security aspect of architecture enhancements to Proximity Services (ProSe) User Equipment (UE)-to-network relay Mr. Wong, Marcus
TR 33.844 Security Study on IP Multimedia Subsystem (IMS) based peer-to-peer content distribution services; Stage 2 Dr. Qing, Yu
TR 33.849 Study on subscriber privacy impact in 3GPP Dr. Gao, Feng
TR 33.859 Study on the Introduction of Key Hierarchy in Universal Terrestrial Radio Access Network (UTRAN) Mr. Norrman, Karl
TR 33.860 Study on Enhanced General Packet Radio Service (EGPRS) access security enhancements with relation to cellular Internet of Things (IoT) Mr. Torvinen, Vesa
TR 33.863 Study on battery efficient security for very low throughput Machine Type Communication (MTC) devices Mr. Evans, Tim P.
TR 33.865 Security Aspects of WLAN Network Selection for 3GPP Terminals Ms. Xu, Lydia
TR 33.868 Study on security aspects of Machine-Type Communications (MTC) and other mobile data applications communications enhancements Mr. Rajadurai, Rajavelsamy
TR 33.871 Study on security for Web Real Time Communications (WebRTC) IP Multimedia Subsystem (IMS) client access to IMS Mr. Ohlsson, Oscar
TR 33.872 Study on security enhancements to Web Real Time Communication (WebRTC) access to IP Multimedia Subsystem (IMS) Mr. Lehtovirta, Vesa
TR 33.879 Study on security enhancements for Mission Critical Push To Talk (MCPTT) over LTE Mr. Haigh, Peter
TR 33.880 Study on Mission Critical Security Enhancements Mr. Haigh, Peter
TR 33.885 Study on security aspects for LTE support of V2X services Mr. Wong, Marcus
TR 33.888 Study on security issues to support Group Communication System Enablers (GCSE) for LTE Mr. Merkel, Jürgen
TR 33.889 Study on security aspects of Machine-Type Communications (MTC) architecture and feature enhancements Mr. Rajadurai, Rajavelsamy
TS 33.897 Study on isolated E-UTRAN operation for public safety; Security aspects Dr. Piggin, Paul
TR 33.899 Study on the security aspects of the next generation system Mr. Torvinen, Vesa
TR 33.901 Criteria for cryptographic Algorithm design process Dr. Blom, Rolf
TR 33.902 Formal Analysis of the 3G Authentication Protocol Dr. Horn, Guenther
TR 33.905 Recommendations for Trusted Open Platforms Dr. Holtmanns, Silke
TR 33.908 3G Security; General report on the design, specification and evaluation of 3GPP standard confidentiality and integrity algorithms Prof. Walker, Michael
TR 33.909 3G Security; Report on the design and evaluation of the MILENAGE algorithm set; Deliverable 5: An example algorithm for the 3GPP authentication and key generation functions Prof. Walker, Michael
TR 33.916 Security Assurance Methodology (SCAS) for 3GPP network products Dr. Zugenmaier, Alf
TR 33.918 Generic Authentication Architecture (GAA); Early implementation of Hypertext Transfer Protocol over Transport Layer Security (HTTPS) connection between a Universal Integrated Circuit Card (UICC) and a Network Application Function (NAF) Mr. Seif, Jacques
TR 33.919 3G Security; Generic Authentication Architecture (GAA); System description Mrs. Van Moffaert, Annelies
TR 33.920 SIM card based Generic Bootstrapping Architecture (GBA); Early implementation feature Dr. Holtmanns, Silke
TR 33.924 Identity management and 3GPP security interworking; Identity management and Generic Authentication Architecture (GAA) interworking Dr. Holtmanns, Silke
TR 33.926 Security Assurance Specification (SCAS) threats and critical assets in 3GPP network product classes Mr. Wong, Marcus
TR 33.937 Study of mechanisms for Protection against Unsolicited Communication for IMS (PUCI) Dr. Prasad, Anand
TR 33.969 Study on security aspects of Public Warning System (PWS) Mr. Mattsson, John
TR 33.978 Security aspects of early IP Multimedia Subsystem (IMS) Mr. Howard, Peter
TR 33.980 Liberty Alliance and 3GPP security interworking; Interworking of Liberty Alliance Identity Federation Framework (ID-FF), Identity Web Services Framework (ID-WSF) and Generic Authentication Architecture (GAA) Dr. Holtmanns, Silke
TS 35.201 3G Security; Specification of the 3GPP confidentiality and integrity algorithms; Document 1: f8 and f9 specification Mr. Evans, Tim P.
TS 35.202 3G Security; Specification of the 3GPP confidentiality and integrity algorithms; Document 2: Kasumi specification Mr. Evans, Tim P.
TS 35.203 3G Security; Specification of the 3GPP confidentiality and integrity algorithms; Document 3: Implementors' test data Mr. Evans, Tim P.
TS 35.204 3G Security; Specification of the 3GPP confidentiality and integrity algorithms; Document 4: Design conformance test data Mr. Evans, Tim P.
TS 35.205 3G Security; Specification of the MILENAGE algorithm set: An example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 1: General Mr. Evans, Tim P.
TS 35.206 3G Security; Specification of the MILENAGE algorithm set: An example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 2: Algorithm specification Mr. Evans, Tim P.
TS 35.207 3G Security; Specification of the MILENAGE algorithm set: An example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 3: Implementors' test data Mr. Evans, Tim P.
TS 35.208 3G Security; Specification of the MILENAGE algorithm set: An example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 4: Design conformance test data Mr. Evans, Tim P.
TS 35.215 Specification of the 3GPP Confidentiality and Integrity Algorithms UEA2 & UIA2; Document 1: UEA2 and UIA2 specifications Mr. Sahlin, Bengt
TS 35.216 Specification of the 3GPP Confidentiality and Integrity Algorithms UEA2 & UIA2; Document 2: SNOW 3G specification Mr. Sahlin, Bengt
TS 35.217 Specification of the 3GPP Confidentiality and Integrity Algorithms UEA2 & UIA2; Document 3: Implementors' test data Mr. Sahlin, Bengt
TS 35.218 Specification of the 3GPP Confidentiality and Integrity Algorithms UEA2 & UIA2; Document 4: Design conformance test data Mr. Sahlin, Bengt
TS 35.221 Specification of the 3GPP Confidentiality and Integrity Algorithms EEA3 & EIA3; Document 1: EEA3 and EIA3 specifications Ms. Qi, Yuan
TS 35.222 Specification of the 3GPP Confidentiality and Integrity Algorithms EEA3 & EIA3; Document 2: ZUC specification Ms. Qi, Yuan
TS 35.223 Specification of the 3GPP Confidentiality and Integrity Algorithms EEA3 & EIA3; Document 3: Implementors' test data Ms. Qi, Yuan
TS 35.231 Specification of the TUAK algorithm set: A second example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 1: Algorithm specification Mr. Evans, Tim P.
TS 35.232 Specification of the TUAK algorithm set: A second example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 2: Implementers’ test data Mr. Evans, Tim P.
TS 35.233 Specification of the TUAK algorithm set: A second example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 3: Design conformance test data Mr. Evans, Tim P.
TR 35.909 3G Security; Specification of the MILENAGE algorithm set: an example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 5: Summary and results of design and evaluation Prof. Walker, Michael
TR 35.919 Specification of the 3GPP Confidentiality and Integrity Algorithms UEA2 & UIA2; Document 5: Design and evaluation report Mr. Sahlin, Bengt
TR 35.924 Specification of the 3GPP Confidentiality and Integrity Algorithms EEA3 & EIA3; Document 4: Design and Evaluation Report Ms. Qi, Yuan
TR 35.934 Specification of the TUAK algorithm set: A second example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 4: Report on the design and evaluation Mr. Barry, Aguibou
TR 35.935 Specification of the TUAK algorithm set: A second example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 5: Performance evaluation Mr. Barry, Aguibou
TR 35.936 Specification of the TUAK algorithm set: A second example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2 ,f3, f4, f5 and f5*; Document 6: Security assessment Mr. Barry, Aguibou
TR 41.031 Fraud Information Gathering System (FIGS); Service requirements; Stage 0 Mr. Sahlin, Bengt
TR 41.033 Lawful Interception requirements for GSM Mr. Leadbeater, Alex
TS 41.061 General Packet Radio Service (GPRS); GPRS ciphering algorithm requirements Mr. Sahlin, Bengt
TS 42.009 Security aspects Mr. Sahlin, Bengt
TS 42.033 Lawful Interception; Stage 1 Mr. Leadbeater, Alex
TS 43.020 Security related network functions Mr. Sahlin, Bengt
TS 43.033 3G security; Lawful Interception; Stage 2 Mr. Leadbeater, Alex
TS 55.205 Specification of the GSM-MILENAGE algorithms: An example algorithm set for the GSM Authentication and Key Generation Functions A3 and A8 Mr. Evans, Tim P.
TS 55.216 3G Security; Specification of the A5/3 encryption algorithms for GSM and ECSD, and the GEA3 encryption algorithm for GPRS; Document 1: A5/3 and GEA3 specifications Mr. Sahlin, Bengt
TS 55.217 3G Security; Specification of the A5/3 encryption algorithms for GSM and ECSD, and the GEA3 encryption algorithm for GPRS; Document 2: Implementors' test data Mr. Sahlin, Bengt
TS 55.218 3G Security; Specification of the A5/3 encryption algorithms for GSM and ECSD, and the GEA3 encryption algorithm for GPRS; Document 3: Design conformance test data Mr. Sahlin, Bengt
TS 55.226 3G Security; Specification of the A5/4 Encryption Algorithms for GSM and ECSD, and the GEA4 Encryption Algorithm for GPRS Mr. Christoffersson, Per
TS 55.236 Specification of A8_V MILENAGE Algorithm: An example algorithm for the key generation function A8_V Dr. Horn, Guenther
TS 55.241 Specification of the GIA4 integrity algorithm for General Packet Radio Service (GPRS); GIA4 specification Mr. Evans, Tim P.
TS 55.242 Specification of the GIA4 integrity algorithm for General Packet Radio Service (GPRS); Implementers' test data Mr. Evans, Tim P.
TS 55.243 Specification of the GIA4 integrity algorithm for General Packet Radio Service (GPRS); Design conformance test data Mr. Evans, Tim P.
TS 55.251 Specification of the GEA5 encryption and GIA5 integrity algorithms for General Packet Radio Service (GPRS); GEA5 and GIA5 algorithm specification Mr. Evans, Tim P.
TS 55.252 Specification of the GEA5 encryption and GIA5 integrity algorithms for General Packet Radio Service (GPRS); Implementers' test data Mr. Evans, Tim P.
TS 55.253 Specification of the GEA5 encryption and GIA5 integrity algorithms for General Packet Radio Service (GPRS); Design conformance test data Mr. Evans, Tim P.
TR 55.919 3G Security; Specification of the A5/3 encryption algorithms for GSM and ECSD, and the GEA3 encryption algorithm for GPRS; Document 4: Design and evaluation report Mr. Sahlin, Bengt