DOCUMENT:
|
K_enb generation at idle mobility
|
Doc.Name
|
S3a070917
|
Allocations:
|
Content Type:
|
File Name:
|
S3a070917.zip
|
|
|
Source:
|
ZTE Corporation,Ericsson
|
Abstract:
|
For idle mode mobility, to save the processing resource of MME, K_enb may shall not be generated.
|
The file is uploaded
|
|
DOCUMENT:
|
Algorithm ID Discussion
|
Doc.Name
|
S3a070918
|
Allocations:
|
Content Type:
|
File Name:
|
S3a070918.zip
|
|
|
Source:
|
ZTE Corporation, Nokia Siemens Networks, Nokia
|
The file is uploaded
|
|
DOCUMENT:
|
Algorithm ID PCR
|
Doc.Name
|
S3a070919
|
Allocations:
|
Content Type:
|
File Name:
|
S3a070919.zip
|
|
|
Source:
|
ZTE Corporation, Nokia Siemens Networks, Nokia
|
The file is uploaded
|
|
DOCUMENT:
|
update NAS keys
|
Doc.Name
|
S3a070920
|
Allocations:
|
Content Type:
|
File Name:
|
S3a070920.zip
|
|
|
Source:
|
ZTE corporation
|
Abstract:
|
In this contribution, we give a new input for deriving NAS keys and a optional m ethod to update NAS keys.
|
The file is uploaded
|
|
DOCUMENT:
|
Draft LS reply to status of security discussions in RAN2
|
Doc.Name
|
S3a070921
|
Allocations:
|
Content Type:
|
File Name:
|
S3a070921.zip
|
|
|
Source:
|
Ericsson
|
The file is uploaded
|
|
DOCUMENT:
|
System support for 256 bit keys
|
Doc.Name
|
S3a070922
|
Allocations:
|
Content Type:
|
File Name:
|
S3a070922.zip
|
|
|
Source:
|
Ericsson, Gemalto, Alcatel-Lucent
|
Abstract:
|
This contribution describes a simple and efficient way to implement 256bit syste m support and provides a migration strategy.
|
The file is uploaded
|
|
DOCUMENT:
|
pCR K_eNB freshness parameters
|
Doc.Name
|
S3a070923
|
Allocations:
|
Content Type:
|
File Name:
|
S3a070923.zip
|
|
|
Source:
|
Ericsson, Nokia, Nokia Siemens Networks
|
Abstract:
|
The agreements at SA3#49 that regarding freshness of the K_eNB was recorded in t he slide-set S3-070905, and later in the document S3a070916 submitted to this me eting. This pCR implements these agreements in TS 33.abc.
|
The file is uploaded
|
|
DOCUMENT:
|
Draft LS on outstanding NAS messages w.r.t. K_eNB freshness parameters
|
Doc.Name
|
S3a070924
|
Allocations:
|
Content Type:
|
File Name:
|
S3a070924.zip
|
|
|
Source:
|
Ericsson, Nokia, Nokia Siemens Networks
|
Abstract:
|
This document contains a draft LS to RAN2, RAN3, SA2 and CT1 asking the question whether the assumptions with respect to the number of NAS messages that can be outstanding during different procedures are correct. The assumptions are listed in S3a070916.
|
The file is uploaded
|
|
DOCUMENT:
|
IKE version in NDS/IP for EPS
|
Doc.Name
|
S3a070925
|
Allocations:
|
Content Type:
|
File Name:
|
S3a070925.zip
|
|
|
Source:
|
Ericsson
|
Abstract:
|
It has been discussed in SA3 whether IKEv1 or IKEv2 should be used to establish keys for transport network security in EPS. This contribution sheds some light o n the differences between these two protocols.
|
The file is uploaded
|
|
DOCUMENT:
|
EPS and pre-Rel-8 HLR interworking
|
Doc.Name
|
S3a070926
|
Allocations:
|
Content Type:
|
File Name:
|
S3a070926.zip
|
|
|
Source:
|
Ericsson
|
Abstract:
|
This contribution proposes a way forward for interworking between EPS and Pre-Re l-8 HLR.
|
The file is uploaded
|
|
DOCUMENT:
|
Observations on RAND and 256-bit keys in E-UTRAN
|
Doc.Name
|
S3a070927
|
Allocations:
|
Content Type:
|
File Name:
|
S3a070927.zip
|
|
|
Source:
|
Ericsson
|
Abstract:
|
This contribution analyses potential threats from 128 bit RAND, the potential th reat being that “full” 256-bit security is not achieved due to the restricted le ngth of RAND.
|
The file is uploaded
|
|
DOCUMENT:
|
Agreements of K_eNB freshness parameters and related issues
|
Doc.Name
|
S3a070928
|
Allocations:
|
Content Type:
|
File Name:
|
S3a070928.zip
|
|
|
Source:
|
Ericsson, Nokia, Nokia Siemens Networks
|
Abstract:
|
It was decided at SA3#49 that a document describing the agreements regarding ref resh of K_eNB and related issues that were listed in the slide-set S3-070905 in a more elaborate form would be useful. This contribution provides that text. Th is document is an update of S3a070916.
|
The file is uploaded
|
|
DOCUMENT:
|
Key-change-on-the-fly
|
Doc.Name
|
S3a070929
|
Allocations:
|
Content Type:
|
File Name:
|
S3a070929.zip
|
|
|
Source:
|
Nokia, Nokia Siemens Networks
|
Abstract:
|
This document describes the key change-on-the-fly use cases with the goal to dec ide whether it is necessary or desired to be able to update AS keys independentl y from NAS keys.
|
The file is uploaded
|
|
DOCUMENT:
|
Co-existence of authentication schemes - cover page and comm ents
|
Doc.Name
|
S3a070930
|
Allocations:
|
Content Type:
|
File Name:
|
S3a070930.zip
|
|
|
Source:
|
BT, CableLabs, Ericsson, Nokia, Nokia Siemens Networks, Telecom Italia
|
The file is uploaded
|
|
DOCUMENT:
|
Co-existence of authentication schemes
|
Doc.Name
|
S3a070931
|
Allocations:
|
Content Type:
|
File Name:
|
S3a070931.zip
|
|
|
Source:
|
BT, CableLabs, Ericsson, Nokia, Nokia Siemens Networks, Telecom Italia
|
The file is uploaded
|
|
DOCUMENT:
|
Correction of integrity protection indicator Rel-7
|
Doc.Name
|
S3a070932
|
Allocations:
|
Content Type:
|
File Name:
|
S3a070932.zip
|
|
|
Source:
|
Nokia, Nokia Siemens Networks
|
The file is uploaded
|
|
DOCUMENT:
|
Correction of integrity protection indicator Rel-8
|
Doc.Name
|
S3a070933
|
Allocations:
|
Content Type:
|
File Name:
|
S3a070933.zip
|
|
|
Source:
|
Nokia, Nokia Siemens Networks
|
The file is uploaded
|
|
DOCUMENT:
|
Stage 2 text on place for nonce generation
|
Doc.Name
|
S3a070934
|
Allocations:
|
Content Type:
|
File Name:
|
S3a070934.zip
|
|
|
Source:
|
CableLabs, Nokia, Nokia Siemens Networks
|
The file is uploaded
|
|
DOCUMENT:
|
SIP Digest password change
|
Doc.Name
|
S3a070935
|
Allocations:
|
Content Type:
|
File Name:
|
S3a070935.zip
|
|
|
Source:
|
Nokia, Nokia Siemens Networks, Vodafone
|
The file is uploaded
|
|
DOCUMENT:
|
Support for dynamic SIP Digest password change
|
Doc.Name
|
S3a070936
|
Allocations:
|
Content Type:
|
File Name:
|
S3a070936.zip
|
|
|
Source:
|
Nokia, Nokia Siemens Networks, Vodafone
|
The file is uploaded
|
|
DOCUMENT:
|
Inclusion of NASS-IMS-bundled authentication scheme in Commo n IMS
|
Doc.Name
|
S3a070937
|
Allocations:
|
Content Type:
|
File Name:
|
S3a070937.zip
|
|
|
Source:
|
Ericsson, Nokia, Nokia Siemens Networks
|
The file is uploaded
|
|
DOCUMENT:
|
Migration path for 256-EPS AKA
|
Doc.Name
|
S3a070938
|
Allocations:
|
Content Type:
|
File Name:
|
S3a070938.zip
|
|
|
Source:
|
Gemalto
|
Abstract:
|
Description of migration path for 256-EPS AKA
|
The file is uploaded
|
|
DOCUMENT:
|
UICC-based EPS key hierarchy
|
Doc.Name
|
S3a070939
|
Allocations:
|
Content Type:
|
File Name:
|
S3a070939.zip
|
|
|
Source:
|
Gemalto
|
Abstract:
|
Description of possibility to derive EPS Key Hierarchy in the UICC
|
The file is uploaded
|
|
DOCUMENT:
|
Coexistence of authentication schemes
|
Doc.Name
|
S3a070940
|
Allocations:
|
Content Type:
|
File Name:
|
S3a070940.zip
|
|
|
Source:
|
Huawei
|
Abstract:
|
In last SA3 #49 meeting, the coexistence issue of different authentication schem es in a common-IMS environment was discussed in S3-070680/S3-070681.
|
The file is uploaded
|
|
DOCUMENT:
|
CR for Coexistence of authentication schemes
|
Doc.Name
|
S3a070941
|
Allocations:
|
Content Type:
|
File Name:
|
S3a070941.zip
|
|
|
Source:
|
Huawei
|
The file is uploaded
|
|
DOCUMENT:
|
Trust the information of P-Access-Network-Info Header
|
Doc.Name
|
S3a070942
|
Allocations:
|
Content Type:
|
File Name:
|
S3a070942.zip
|
|
|
Source:
|
Huawei
|
Abstract:
|
Both SA2/SA3 and CT1/CT4 has raised requirements to certify by IMS entities the P-Access-Network-Info (PANI) header. This header may be inserted by either the U E or the P-CSCF. However, currently the value inserted by the UE in the P-Access -Network-Info header may not be considered as trusted information by the IMS. This contribution will give some proposes on how to solve this issue.
|
The file is uploaded
|
|
DOCUMENT:
|
Security handling on idle mode mobility
|
Doc.Name
|
S3a070943
|
Allocations:
|
Content Type:
|
File Name:
|
S3a070943.zip
|
|
|
Source:
|
Huawei
|
Abstract:
|
In last SA3#49 meeting, contributions S3-070684(idle mode mobility within EUTRAN ) and S3-070685(idle mode mobility from UTRAN to EUTRAN) are discussed. The main concern is whether the UE’s security capabilities should be carried in the TAU request message. The conclusion is “There was some discussion on how to handle a case of handover. It was decided that there is need for more rationale on why t his procedure is necessary, and the contribution must re-submitted revised.” This contribution will make further clarifications on this issue.
|
The file is uploaded
|
|
DOCUMENT:
|
Update of section 7.4.11 Key handling on idle mode mobility
|
Doc.Name
|
S3a070944
|
Allocations:
|
Content Type:
|
File Name:
|
S3a070944.zip
|
|
|
Source:
|
Huawei
|
Abstract:
|
This contribution will propose some updates for TAU procedure in TR 33.821 secti on 7.4.11.3.
|
The file is uploaded
|
|
DOCUMENT:
|
Key handling on idle mode mobility from UTRAN to E-UTRAN
|
Doc.Name
|
S3a070945
|
Allocations:
|
Content Type:
|
File Name:
|
S3a070945.zip
|
|
|
Source:
|
Huawei
|
Abstract:
|
In 3GPP TS 23.401 v1.4.1 section 5.3.3.2, TAU procedure from UTRAN to E-UTRAN is introduced. But there is no such a corresponding security part in TR 33.821. This contribution will propose to add a new section to reflect this in TR 33.821 .
|
The file is uploaded
|
|
DOCUMENT:
|
Preventing active IMSI attack in SAE/LTE
|
Doc.Name
|
S3a070946
|
Allocations:
|
Content Type:
|
File Name:
|
S3a070946.zip
|
|
|
Source:
|
Huawei
|
The file is uploaded
|
|
DOCUMENT:
|
Proposed Reply LS to RAN3 about LTE-active key update
|
Doc.Name
|
S3a070947
|
Allocations:
|
Content Type:
|
File Name:
|
S3a070947.zip
|
|
|
Source:
|
Huawei
|
The file is uploaded
|
|
DOCUMENT:
|
skeleton of H(e)NB security TR_HW
|
Doc.Name
|
S3a070948
|
Allocations:
|
Content Type:
|
File Name:
|
S3a070948.zip
|
|
|
Source:
|
Huawei
|
The file is uploaded
|
|
DOCUMENT:
|
H(e)NB threat analysis
|
Doc.Name
|
S3a070949
|
Allocations:
|
Content Type:
|
File Name:
|
S3a070949.zip
|
|
|
Source:
|
Nokia, Nokia Siemens Networks
|
Abstract:
|
The contribution contains a start of the threat analysis for the work on H(e)NB security Study Item
|
The file is uploaded
|
|
DOCUMENT:
|
Draft Reply to LS C1-073192 on Handling of IMEI(SV) on E-UTR AN
|
Doc.Name
|
S3a070950
|
Allocations:
|
Content Type:
|
File Name:
|
S3a070950.zip
|
|
|
Source:
|
Nokia, Nokia Siemens Networks
|
Abstract:
|
Draft LS with proposed answers to CT1 LS.
|
The file is uploaded
|
|
DOCUMENT:
|
pCR to TS 33.abc: Separation bit checking by the ME
|
Doc.Name
|
S3a070951
|
Allocations:
|
Content Type:
|
File Name:
|
S3a070951.zip
|
|
|
Source:
|
Nokia, Nokia Siemens Networks
|
Abstract:
|
TS 33.abc section 6.1.2 contains the HSS side of handling the separation bit of the AMF. The ME requirement is missing in the TS, and maintaining the HSS requirement wit hout the ME requirement does not make any sense. We propose to add the missing M E requirement (see TR 33.821 section 7.4.8.2)
|
The file is uploaded
|
|
DOCUMENT:
|
Updated WID SAES to include security building block
|
Doc.Name
|
S3a070952
|
Allocations:
|
Content Type:
|
File Name:
|
S3a070952.zip
|
|
|
Source:
|
Nokia, Nokia Siemens Networks
|
Abstract:
|
Updated WID: 3GPP System Architecture Evolution Specification (SAES) -- Updated to include SA3 building block for security
|
The file is uploaded
|
|
DOCUMENT:
|
Authentication Failure Reporting (AFR) functionality for EPS
|
Doc.Name
|
S3a070953
|
Allocations:
|
Content Type:
|
File Name:
|
S3a070953.zip
|
|
|
Source:
|
Nokia, Nokia Siemens Networks
|
Abstract:
|
TS 33.102 defines functionality for reporting authentication failures back to th e Home network. This contribution analyses the usefullness for EPS.
|
The file is uploaded
|
|
DOCUMENT:
|
Solutions for EPS interworking with a pre-Rel-8 HSS/HLR
|
Doc.Name
|
S3a070954
|
Allocations:
|
Content Type:
|
File Name:
|
S3a070954.zip
|
|
|
Source:
|
Vodafone, NSN, Nokia
|
Abstract:
|
This contribution evaluates several solutions to allow operators to offer E-UTRA N services to users on a pre-R8 HSS/HLR. The contribution proposes that the eval uation is sent to SA1, SA2 and CT4 for consideration and feedback.
|
The file is uploaded
|
|
DOCUMENT:
|
S1 and X2 reference point security in EPS
|
Doc.Name
|
S3a070955
|
Allocations:
|
Content Type:
|
File Name:
|
S3a070955.zip
|
|
|
Source:
|
Vodafone
|
Abstract:
|
This contribution proposes to add a new section on S1/X2 interface security to T R 33.821.
|
The file is uploaded
|
|
DOCUMENT:
|
Mandatory implementation of UP ciphering in eNB and UE
|
Doc.Name
|
S3a070956
|
Allocations:
|
Content Type:
|
File Name:
|
S3a070956.zip
|
|
|
Source:
|
Nokia, Nokia Siemens Networks
|
The file is uploaded
|
|
DOCUMENT:
|
WI07025 - UC in TISPAN - overview
|
Doc.Name
|
S3a070957
|
Allocations:
|
Content Type:
|
File Name:
|
S3a070957.zip
|
|
|
Source:
|
Rapporteur
|
Abstract:
|
Dear 3GPP,
in the attached slide-set you will find the latest overview of the work in TISPA N regarding the feasibility study on prevention of unsolicited communication in the NGN (WI07025)
Kind regards Thilo Ewald
|
The file is uploaded
|
|
DOCUMENT:
|
On algorithms negotiation and bidding down attack
|
Doc.Name
|
S3a070958
|
Allocations:
|
Content Type:
|
File Name:
|
S3a070958.zip
|
|
|
Source:
|
Nokia, Nokia Siemens Networks
|
Abstract:
|
There are some stage 2 level open issues regarding the algorithms handling in eU TRAN that should be resolved
|
The file is uploaded
|
|
DOCUMENT:
|
COUNTER check procedure for eUTRAN
|
Doc.Name
|
S3a070959
|
Allocations:
|
Content Type:
|
File Name:
|
S3a070959.zip
|
|
|
Source:
|
Nokia, Nokia Siemens Networks
|
Abstract:
|
In this contribution we propose to COUNTER CHECK for eUTRAN to provide detection of service theft attacks in the user plane for use cases, where user plane ciph ering is not in use and thus packet injection or deletion attacks can be perform ed successfully on cleartext user data
|
The file is uploaded
|
|
DOCUMENT:
|
KeNB handling during intra- and inter-eNB handovers
|
Doc.Name
|
S3a070960
|
Allocations:
|
Content Type:
|
File Name:
|
S3a070960.zip
|
|
|
Source:
|
Nokia, Nokia Siemens Networks
|
Abstract:
|
This contribution clarifies the Editor’s note in section 7.2.3 in TS 33.abc v0.2 .0 about C-RNTI binding with the keys and also proposes a unification scheme to the key derivations handled in different cases for the eNB, which receives the U E’s security context. The attached pCR also proposes to clarify the “fails conti nuously” issue identified in the RAN2 LS (R2-074549).
|
The file is uploaded
|
|
DOCUMENT:
|
Proposed reply-LS to R2-075219
|
Doc.Name
|
S3a070961
|
Allocations:
|
Content Type:
|
File Name:
|
S3a070961.zip
|
|
|
Source:
|
Nokia, Nokia Siemens Networks
|
Abstract:
|
Proposed reply-LS to R2-075219
|
The file is uploaded
|
|
DOCUMENT:
|
P-TMSI signature generation from NAS keys
|
Doc.Name
|
S3a070962
|
Allocations:
|
Content Type:
|
File Name:
|
S3a070962.zip
|
|
|
Source:
|
Nokia, Nokia Siemens Networks
|
Abstract:
|
In idle mode mobility from eUTRAN to GERAN/UTRAN the new SGSN requests UE’s secu rity context from the old MME. This security context request from the new SGSN n eeds to be authenticated and authorized in the old MME
|
The file is uploaded
|
|
DOCUMENT:
|
EPS/eUTRAN Security Architecture Overview
|
Doc.Name
|
S3a070963
|
Allocations:
|
Content Type:
|
File Name:
|
S3a070963.zip
|
|
|
Source:
|
Nokia, Nokia Siemens Networks
|
Abstract:
|
The security architecture overview section 4 in TS 33.abc is currently empty. We propose to take the corresponding figure 1 and related text from TS 33.102 v7.1 .0 and extend it with minimal changes to reflect the eUTRAN/EPS security archite cture
|
The file is uploaded
|
|
DOCUMENT:
|
IMS media security: Use cases
|
Doc.Name
|
S3a070964
|
Allocations:
|
Content Type:
|
File Name:
|
S3a070964.zip
|
|
|
Source:
|
Ericsson
|
The file is uploaded
|
|
DOCUMENT:
|
A method to support 256 bits keys
|
Doc.Name
|
S3a070965
|
Allocations:
|
Content Type:
|
File Name:
|
S3a070965.zip
|
|
|
Source:
|
ZTE Corporation
|
Abstract:
|
In this contribution, we provide a method to support 256 bits keys in LTE/SAE.
|
The file is uploaded
|
|
DOCUMENT:
|
Integrity protection of Attach and Tau messages
|
Doc.Name
|
S3a070966
|
Allocations:
|
Content Type:
|
File Name:
|
S3a070966.zip
|
|
|
Source:
|
Qualcomm Europe
|
The file is uploaded
|
|
DOCUMENT:
|
Storing the NAS security context during detach
|
Doc.Name
|
S3a070967
|
Allocations:
|
Content Type:
|
File Name:
|
S3a070967.zip
|
|
|
Source:
|
Qualcomm Europe
|
The file is uploaded
|
|
DOCUMENT:
|
pCR for TS 33.abc on Security Mode command
|
Doc.Name
|
S3a070968
|
Allocations:
|
Content Type:
|
File Name:
|
S3a070968.zip
|
|
|
Source:
|
Nokia, Nokia Siemens Networks
|
The file is uploaded
|
|
DOCUMENT:
|
Draft reply to LS S2-075598 on Service Request
|
Doc.Name
|
S3a070969
|
Allocations:
|
Content Type:
|
File Name:
|
S3a070969.zip
|
|
|
Source:
|
Nokia, Nokia Siemens Networks
|
The file is uploaded
|
|
DOCUMENT:
|
pCR to TS 33.abc on integrity protection on the service requ est message
|
Doc.Name
|
S3a070970
|
Allocations:
|
Content Type:
|
File Name:
|
S3a070970.zip
|
|
|
Source:
|
Nokia, Nokia Siemens Networks
|
The file is uploaded
|
|
DOCUMENT:
|
Draft Reply LS to LS R2-074549 on the Security Status
|
Doc.Name
|
S3a070971
|
Allocations:
|
Content Type:
|
File Name:
|
S3a070971.zip
|
|
|
Source:
|
Nokia, Nokia Siemens Networks
|
The file is uploaded
|
|
DOCUMENT:
|
Draft Reply to LS R2-074587 and S2-075795 on Signalling for Paging
|
Doc.Name
|
S3a070972
|
Allocations:
|
Content Type:
|
File Name:
|
S3a070972.zip
|
|
|
Source:
|
Nokia, Nokia Siemens Networks
|
The file is uploaded
|
|
DOCUMENT:
|
A method of calculating P-TMSI signature like parameter for E-UTRAN to U-TRAN/GERAN mobility
|
Doc.Name
|
S3a070973
|
Allocations:
|
Content Type:
|
File Name:
|
S3a070973.zip
|
|
|
Source:
|
Qualcomm Europe
|
The file is uploaded
|
|
DOCUMENT:
|
Security procedure needed to satisfy ISR security requiremen ts
|
Doc.Name
|
S3a070974
|
Allocations:
|
Content Type:
|
File Name:
|
S3a070974.zip
|
|
|
Source:
|
Qualcomm Europe
|
The file is uploaded
|
|
DOCUMENT:
|
Re-keying for prepared eNode Bs
|
Doc.Name
|
S3a070975
|
Allocations:
|
Content Type:
|
File Name:
|
S3a070975.zip
|
|
|
Source:
|
Qualcomm Europe
|
The file is uploaded
|
|
DOCUMENT:
|
Recommendations for the Security Algorithms
|
Doc.Name
|
S3a070976
|
Allocations:
|
Content Type:
|
File Name:
|
S3a070976.zip
|
|
|
Source:
|
Qualcomm Europe
|
The file is uploaded
|
|
DOCUMENT:
|
EPS Active Re-keying procedures
|
Doc.Name
|
S3a070977
|
Allocations:
|
Content Type:
|
File Name:
|
S3a070977.zip
|
|
|
Source:
|
Qualcomm Europe
|
The file is uploaded
|
|
DOCUMENT:
|
DSMIPv6 security association establishment via IKEv2
|
Doc.Name
|
S3a070978
|
Allocations:
|
Content Type:
|
File Name:
|
S3a070978.zip
|
|
|
Source:
|
Qualcomm Europe
|
The file is uploaded
|
|
DOCUMENT:
|
Draft Agenda
|
Doc.Name
|
S3a070979
|
Allocations:
|
Content Type:
|
File Name:
|
S3a070979.zip
|
|
|
Source:
|
TB Chairman
|
The file is uploaded
|
|
DOCUMENT:
|
pseudo CR to TR 33.922 v0.1.0: new subclause on PMIP and acc ess authentication
|
Doc.Name
|
S3a070980
|
Allocations:
|
Content Type:
|
File Name:
|
S3a070980.zip
|
|
|
Source:
|
Alcatel-Lucent, Cisco, Ericsson, Motorola, Nokia, Nokia Siemens Networks, Nortel , Verizon Wireless, Vodafone
|
The file is uploaded
|
|
DOCUMENT:
|
pseudo CR to TS 33.xyz v0.0.0: text on PMIP
|
Doc.Name
|
S3a070981
|
Allocations:
|
Content Type:
|
File Name:
|
S3a070981.zip
|
|
|
Source:
|
Alcatel-Lucent, Cisco, Ericsson, Motorola, Nokia, Nokia Siemens Networks, Nortel , Verizon Wireless, Vodafone
|
The file is uploaded
|
|
DOCUMENT:
|
pseudo CR to TS 33.xyz v0.0.0: text on access authentication
|
Doc.Name
|
S3a070982
|
Allocations:
|
Content Type:
|
File Name:
|
S3a070982.zip
|
|
|
Source:
|
Alcatel-Lucent, Cisco, Ericsson, Motorola, Nokia, Nokia Siemens Networks, Nortel , Verizon Wireless, Vodafone
|
The file is uploaded
|
|
DOCUMENT:
|
Some security threats and requirements with H(e)NBs
|
Doc.Name
|
S3a070983
|
Allocations:
|
Content Type:
|
File Name:
|
S3a070983.zip
|
|
|
Source:
|
Qualcomm Europe
|
The file is uploaded
|
|