id
stringlengths
4
12
title
stringlengths
8
250
type
stringclasses
2 values
version
stringclasses
612 values
working_group
stringclasses
30 values
url
stringlengths
65
81
scope
stringlengths
0
65.7k
32.842
Telecommunication management; Study on network management of virtualized networks
TR
13.1.0
S5
https://www.3gpp.org/ftp/Specs/archive/32_series/32.842/32842-d10.zip
The present document studies the network management of virtualized 3GPP specified core networks based on the architectural framework in ETSI GS NFV-MAN 001 [2]. It studies the network management of mobile networks that include virtualized core networks functions. It also identifies the potential impacts on the existing 3GPP management architecture and to propose potential solutions for the network management of fully virtualized networks and mixed networks. The objectives of this study are: - Study the use cases and concepts for the network management of virtualized networks, which are applicable to 3GPP, taking into account the relevant use cases from ETSI. - Analyse and classify the network management scenarios when all instances of 3GPP-defined network elements in a subsystem/domain are virtualized according to the architectural framework in ETSI GS NFV-MAN 001 [2] (i.e. in fully virtualized networks). - Identify the requirements for potential solutions for the network management of virtualized networks when all instances of 3GPP-defined network elements in a subsystem/domain are virtualized according to the architectural framework in ETSI GS NFV-MAN 001 [2] (i.e. in fully virtualized networks). - Analyse and classify the network management scenarios when some instances of 3GPP-defined network elements in a subsystem/domain are virtualized according to the architectural framework in ETSI GS NFV-MAN 001 [2] (i.e. in mixed networks). - Identify the requirements for potential solutions for the network management of virtualized networks when some instances of 3GPP-defined network elements in a subsystem/domain are virtualized according to the architectural framework in ETSI GS NFV-MAN 001 [2] (i.e. in mixed networks). Study whether or not a single management system for mixed networks is required. - Identify the potential impacts on the existing 3GPP Management reference model. - Analyse the existing 3GPP Management reference model, interfaces, protocols and procedures to determine what can be re-used, adapted or extended and whether new IRPs are needed for network management of virtualized networks. - Propose enhancements or extensions to the 3GPP Management reference model, if an impact is foreseen. - If needed, solution(s) for a single management system for mixed networks should be studied. - Provide recommendations for the standardization of the network management of fully virtualized networks and mixed networks, based on the result of the analysis and the potentially identified impacts, enhancements or extensions.
32.843
Telecommunication management; Charging management; Study on Inter-Public-Land-Mobile-Network (PLMN) Packet Switched (PS) domain online charging
TR
13.0.0
S5
https://www.3gpp.org/ftp/Specs/archive/32_series/32.843/32843-d00.zip
The present document studies PS domain Online Charging in a roaming context, when the Gateway node implementing the IP access to the PDN for data traffic, pertains to the VPLMN, whereas the Online Charging System (OCS) pertains to the HPLMN. The study will focus, in a first phase, on high level scenarios for Flow Based Charging, relying on defined TS 23.203 [207] PCC roaming architectures with Gy crossing PLMNs, in order to investigate the following aspects: - Information availability in both PLMNs - Inter-PLMN connection mechanisms for Diameter messages - Impacts on Inter-operator charging - Whether a "proxy OCS" is needed The two following configurations will be addressed: - Gy between OCS residing in HPLMN and PCEF located in PGW VPLMN, for Local Breakout Roaming configuration defined by TS 23.401 [208] and TS 23.203 [207]. - Gy between OCS residing in HPLMN and PCEF located in IP-Edge fixed broadband access owned by a Convergent fixed-mobile VPLMN, for Non Seamless WLAN Offload (NSWO) 3GPP UEs traffic defined by annex S of TS 23.203 [207]. During this first phase, the study will also investigate a basic set of Online Charging features and parameters, to be used in an inter-PLMN situation. Based on conclusions and recommendations for the first phase, the second phase of the study will address the inter-PLMN Gyn Reference Point for the support of Application Based Charging.
32.849
Study on Charging aspects of Roaming End-to-end scenarios with VoLTE IMS and interconnecting networks
TR
13.0.0
S5
https://www.3gpp.org/ftp/Specs/archive/32_series/32.849/32849-d00.zip
The objective of this study item is to document missing elements and information with regard to the roaming architecture for Voice over IMS with Local Breakout. The present document collects and evaluates end-to-end roaming scenarios under different aspects of charging. The main scenarios presented will include mobile originating calls with and without the use of the loopback mechanism and mobile terminating call scenarios. It will analyse operator requirements in consideration of the roaming scenarios and the existing Charging specifications The conclusions are presented in a further clause with assumptions made and proposed further proceedings on that issues.
32.850
Study on determination of completeness of charging information in IMS
TR
2.0.0
S5
https://www.3gpp.org/ftp/Specs/archive/32_series/32.850/32850-200.zip
32.855
Study on OAM support for Licensed Shared Access (LSA)
TR
1.0.0
S5
https://www.3gpp.org/ftp/Specs/archive/32_series/32.855/32855-100.zip
32.861
Telecommunication management; Study on application and partitioning of Interface N (Itf-N)
TR
13.0.0
S5
https://www.3gpp.org/ftp/Specs/archive/32_series/32.861/32861-d00.zip
The present document examines IRP requirements selected from existing IRPs' requirement and identifies one or more subsets of these requirements. It also studies the grouping of IRP functionality to recommend which functionality is needed in a network management context to satisfy every given subset of requirements.
32.862
Study on Key Quality Indicators (KQIs) for service experience
TR
1.0.0
S5
https://www.3gpp.org/ftp/Specs/archive/32_series/32.862/32862-100.zip
32.863
Telecommunication management; Fixed Mobile Convergence (FMC) metadefinitions for measurements and Key Performance Indicators (KPIs)
TR
13.0.0
S5
https://www.3gpp.org/ftp/Specs/archive/32_series/32.863/32863-d00.zip
The present document defines the metadata for Performance Management (PM) performance measurements (KPIs/counters). The definition would enforce consistency in description/definition of all standardized performance measurements (counters/KPIs) by various SDOs and organizations (or Multi-SDO) involved in the Management of Converged Networks [6]. This consistency would facilitate encoding and decoding of performance measurements (counters/KPIs) exchanged (via management protocols) and/or stored in (database or files). The metadata related to PM operations/notifications is not part of this PM measurement metadata. The present document takes into account the recommendations from the Fixed Mobile Convergence (FMC) model repertoire [2] developed by the Multi-SDO JWG on Model Alignment.
32.901
Telecommunication management; Study on User Data Convergence (UDC) information model handling and provisioning: Example use cases
TR
13.0.0
S5
https://www.3gpp.org/ftp/Specs/archive/32_series/32.901/32901-d00.zip
33.102
3G security; Security architecture
TS
13.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.102/33102-d00.zip
33.105
3G Security; Cryptographic algorithm requirements
TS
13.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.105/33105-d00.zip
33.106
3G security; Lawful interception requirements
TS
13.4.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.106/33106-d40.zip
33.107
3G security; Lawful interception architecture and functions
TS
13.8.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.107/33107-d80.zip
33.108
3G security; Handover interface for Lawful Interception (LI)
TS
13.7.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.108/33108-d70.zip
33.110
Key establishment between a Universal Integrated Circuit Card (UICC) and a terminal
TS
13.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.110/33110-d00.zip
33.116
Security Assurance Specification (SCAS) for the MME network product class
TS
1.3.1
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.116/33116-131.zip
33.117
Catalogue of general security assurance requirements
TS
1.4.1
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.117/33117-141.zip
33.141
Presence service; Security
TS
13.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.141/33141-d00.zip
33.179
Security of Mission Critical Push To Talk (MCPTT) over LTE
TS
13.12.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.179/33179-dc0.zip
The present document specifies the security architecture, procedures and information flows needed to protect the mission critical push to talk (MCPTT) service. The architecture includes mechanisms for authentication, protection of MCPTT signalling and protection of MCPTT media. Security for both MCPTT group calls and MCPTT private calls operating in on-network and off-network modes of operation is specified. The functional architecture for MCPTT is defined in 3GPP TS 23.179 [2], the corresponding service requirements are defined in 3GPP TS 22.179 [3]. The MCPTT service can be used for public safety applications and also for general commercial applications e.g. utility companies and railways. As the security model is based on the public safety environment, some security features may not be applicable to MCPTT for commercial purposes.
33.187
Security aspects of Machine-Type Communications (MTC) and other mobile data applications communications enhancements
TS
13.0.1
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.187/33187-d01.zip
33.203
3G security; Access security for IP-based services
TS
13.4.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.203/33203-d40.zip
33.204
3G Security; Network Domain Security (NDS); Transaction Capabilities Application Part (TCAP) user security
TS
13.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.204/33204-d00.zip
33.210
Network Domain Security (NDS); IP network layer security
TS
13.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.210/33210-d00.zip
33.220
Generic Authentication Architecture (GAA); Generic Bootstrapping Architecture (GBA)
TS
13.2.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.220/33220-d20.zip
33.221
Generic Authentication Architecture (GAA); Support for subscriber certificates
TS
13.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.221/33221-d00.zip
33.222
Generic Authentication Architecture (GAA); Access to network application functions using Hypertext Transfer Protocol over Transport Layer Security (HTTPS)
TS
13.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.222/33222-d00.zip
33.223
Generic Authentication Architecture (GAA); Generic Bootstrapping Architecture (GBA) Push function
TS
13.1.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.223/33223-d10.zip
33.224
Generic Authentication Architecture (GAA); Generic Bootstrapping Architecture (GBA) push layer
TS
13.1.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.224/33224-d10.zip
33.234
3G security; Wireless Local Area Network (WLAN) interworking security
TS
13.1.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.234/33234-d10.zip
33.246
3G Security; Security of Multimedia Broadcast/Multicast Service (MBMS)
TS
13.1.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.246/33246-d10.zip
33.259
Key establishment between a UICC hosting device and a remote device
TS
13.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.259/33259-d00.zip
33.303
Proximity-based Services (ProSe); Security aspects
TS
13.5.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.303/33303-d50.zip
33.310
Network Domain Security (NDS); Authentication Framework (AF)
TS
13.2.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.310/33310-d20.zip
33.320
Security of Home Node B (HNB) / Home evolved Node B (HeNB)
TS
13.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.320/33320-d00.zip
33.328
IP Multimedia Subsystem (IMS) media plane security
TS
13.1.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.328/33328-d10.zip
33.401
3GPP System Architecture Evolution (SAE); Security architecture
TS
13.5.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.401/33401-d50.zip
33.402
3GPP System Architecture Evolution (SAE); Security aspects of non-3GPP accesses
TS
13.1.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.402/33402-d10.zip
33.832
Study on IMS Enhanced Spoofed Call Prevention and Detection
TR
0.3.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.832/33832-030.zip
The present document evaluates the IETF STIR working group active drafts for use in 3GPP networks for spoofed call detection and make recommendations on what aspects of IETF STIR active drafts should be incorporated into 3GPP IMS security specifications. Additionally 3GPP technology specific aspects not considered or addressed in the IETF STIR Working Group will be identified and studied such as service interactions and deployment scenarios including (but not limited to): • * Roaming • * Business line trunking/PBX • * CS to IMS transition scenarios
33.833
Study on security issues to support Proximity Services (ProSe)
TR
13.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.833/33833-d00.zip
The present document contains a study of the security aspects of Proximity Services (ProSe) and an evaluation of possible technical solutions needed to support such services. The Stage 1 requirements for these services are defined in TS 22.278 [2] and TS 22.115 [3]. These requirements include a list of general requirements on ProSe Security, Authorization and Privacy (TS 22.278 [2] clause 9.4), which are taken into consideration when developing the security key issues, security requirements and security solutions in the present document. Different possible Stage 2 solutions for Proximity Services are studied in TR 23.703 [4]. Normative provisions/requirements are included in the present specification solely for the purposes of studying solutions and are not to be considered as implying normative requirements on 3GPP entities. NOTE: Lawful Interception (LI) aspects are not covered in this document.
33.849
Study on subscriber privacy impact in 3GPP
TR
1.1.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.849/33849-110.zip
33.860
Study on Enhanced General Packet Radio Service (EGPRS) access security enhancements with relation to cellular Internet of Things (IoT)
TR
13.1.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.860/33860-d10.zip
The present document contains a study of the EGPRS access security in relation to cellular IoT, and an evaluation of possible technical security enhancements needed to support such services. Different possible deployment scenarios for Cellular IoT, and related stage 2 solutions are being studied in TR 45.820 [2]. The scope of this study is limited to investigate the feasibility of improving the access security aspects of Gb mode. In more detail, the scope includes: 1) Investigate potential security threats, such as man in the middle attacks. 2) Investigate potential security enhancements between the UE and SGSN to mitigate said threats. 3) Define what security procedures and security algorithms that are recommended to be used by for Cellular IoT devices in Gb mode. This may be procedures and algorithms already specified in earlier 3GPP releases or it could be new procedures and algorithms being introduced as part of this feasibility study. 4) The potential security enhancements as part of this study item should aim at minimising the impacts to the GPRS core network.
33.863
Study on battery efficient security for very low throughput Machine Type Communication (MTC) devices
TR
1.2.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.863/33863-120.zip
33.872
Study on security enhancements to Web Real Time Communication (WebRTC) access to IP Multimedia Subsystem (IMS)
TR
13.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.872/33872-d00.zip
The present document contains a study on security issues following the potential modifications of the IMS architecture and stage 2 procedures as required by the support of eWebRTCi (Enhancements to WEBRTC interoperability). In particular, the present document focuses on: • Support for end to end WebRTC security, subject to regulatory constraints, that avoids conversion between WebRTC and IMS security protocols , including the feasibility of end to end security aspects • Third-party WebRTC access in the case where the 3rd party allocates IMS identities from a block where the associated subscription corresponds to a class of users supported by the WebRTC environment (e.g., enterprise associates) rather than a single end user
33.879
Study on security enhancements for Mission Critical Push To Talk (MCPTT) over LTE
TR
13.1.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.879/33879-d10.zip
The present document contains a study of the security aspects of the Mission-Critical Push-To-Talk (MCPTT) service and its interaction with the network. This includes an analysis of the threats to the service, the security requirements to mitigate those threats and an evaluation of possible technical solutions designed to meet the security requirements of the service. The Stage 1 requirements for the service are defined in TS 22.179 [2]. An evaluation of Stage 2 architectural solutions for MCPTT is performed in TR 23.779 [3] and TS 23.179 [10]. This study will include consideration of relevant 3GPP specifications, particularly for ProSe (TS 33.303 [4], TS 23.303 [5]) and GCSE (TS 23.468 [6]). The focus of the present document is to support public-safety use cases of MCPTT. Commercial scenarios are not specifically considered and some features may not be applicable to them.
33.889
Study on security aspects of Machine-Type Communications (MTC) architecture and feature enhancements
TR
13.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.889/33889-d00.zip
The present document captures requirements, solution alternatives, evaluations and conclusions for the SA2-led Rel-13 Features: • GROUPE (Group based Enhancements) [4], • MONTE (Monitoring Enhancements) [5] and • AESE (Architecture Enhancements for Service Capability Exposure [3]. The present document captures the conclusions of the study on security and privacy implications for the requirements identified in Stage 1 and Stage 2 specifications for the above mentioned Rel-13 MTC features. Based on the outcome of the present document, any new normative text will be incorporated in TS 33.187 [2] and/or suitable existing SA3 specifications. Editor’s Note: SA3 is supposed to work only on security solutions for architectural solutions that are covered in SA2 Rel-13 TRs TR 23.769[4], TR 23.789[5], TR 23.708 [3].
33.897
Study on isolated E-UTRAN operation for public safety; Security aspects
TR
13.1.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.897/33897-d10.zip
The present document contains the results of a Stage 2 study and evaluation of possible 3GPP security solutions in support of Isolated E-UTRAN Operation for Public Safety (IOPS). The solutions are based on the Stage 1 requirements in 3GPP TS 22.346 [2], the architectural enhancements to support IOPS presented in the Stage 2 study report 3GPP TR 23.797 [3] and resulting informative Annex K in 3GPP TS 23.401 [10]. For the current release of specification the solution in 3GPP TS 23.401 [10] is based on a Local EPC with no backhaul. The present document identifies key issues, security threats, deduces security requirements and presents proposed security solutions for IOPS. Throughout this Technical Report the terms 'IOPS network' and 'Isolated E-UTRAN' are used synonymously.
33.905
Recommendations for Trusted Open Platforms
TR
13.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.905/33905-d00.zip
33.916
Security Assurance Methodology (SECAM) for 3GPP network products
TR
1.3.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.916/33916-130.zip
33.919
3G Security; Generic Authentication Architecture (GAA); System description
TR
13.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.919/33919-d00.zip
33.924
Identity management and 3GPP security interworking; Identity management and Generic Authentication Architecture (GAA) interworking
TR
13.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.924/33924-d00.zip
33.926
Security Assurance Specification (SCAS) threats and critical assets in 3GPP network product classes
TR
13.1.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.926/33926-d10.zip
33.937
Study of mechanisms for Protection against Unsolicited Communication for IMS (PUCI)
TR
13.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.937/33937-d00.zip
33.969
Study on security aspects of Public Warning System (PWS)
TR
13.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.969/33969-d00.zip
33.980
Liberty Alliance and 3GPP security interworking; Interworking of Liberty Alliance Identity Federation Framework (ID-FF), Identity Web Services Framework (ID-WSF) and Generic Authentication Architecture (GAA)
TR
13.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.980/33980-d00.zip
33.995
Study on security aspects of integration of Single Sign-On (SSO) frameworks with 3GPP operator-controlled resources and mechanisms
TR
13.0.1
S3
https://www.3gpp.org/ftp/Specs/archive/33_series/33.995/33995-d01.zip
34.108
Common test environments for User Equipment (UE); Conformance testing
TS
13.1.0
R5
https://www.3gpp.org/ftp/Specs/archive/34_series/34.108/34108-d10.zip
34.109
Terminal logical test interface; Special conformance testing functions
TS
13.0.0
R2
https://www.3gpp.org/ftp/Specs/archive/34_series/34.109/34109-d00.zip
34.121-1
User Equipment (UE) conformance specification; Radio transmission and reception (FDD); Part 1: Conformance specification
TS
13.2.0
R5
https://www.3gpp.org/ftp/Specs/archive/34_series/34.121-1/34121-1-d20.zip
34.121-2
User Equipment (UE) conformance specification; Radio transmission and reception (FDD); Part 2: Implementation Conformance Statement (ICS)
TS
13.1.0
R5
https://www.3gpp.org/ftp/Specs/archive/34_series/34.121-2/34121-2-d10.zip
34.123-1
User Equipment (UE) conformance specification; Part 1: Protocol conformance specification
TS
13.1.0
R5
https://www.3gpp.org/ftp/Specs/archive/34_series/34.123-1/34123-1-d10.zip
34.123-2
User Equipment (UE) conformance specification; Part 2: Implementation conformance statement (ICS) proforma specification
TS
13.1.0
R5
https://www.3gpp.org/ftp/Specs/archive/34_series/34.123-2/34123-2-d10.zip
34.123-3
User Equipment (UE) conformance specification; Part 3: Abstract test suite (ATS)
TS
13.4.0
R5
https://www.3gpp.org/ftp/Specs/archive/34_series/34.123-3/34123-3-d40.zip
34.124
Electromagnetic compatibility (EMC) requirements for mobile terminals and ancillary equipment
TS
13.0.0
R4
https://www.3gpp.org/ftp/Specs/archive/34_series/34.124/34124-d00.zip
34.131
Test Specification for C-language binding to (Universal) Subscriber Interface Module ((U)SIM) Application Programming Interface (API)
TS
13.0.0
C6
https://www.3gpp.org/ftp/Specs/archive/34_series/34.131/34131-d00.zip
34.229-1
Internet Protocol (IP) multimedia call control protocol based on Session Initiation Protocol (SIP) and Session Description Protocol (SDP); User Equipment (UE) conformance specification; Part 1: Protocol conformance specification
TS
13.5.0
R5
https://www.3gpp.org/ftp/Specs/archive/34_series/34.229-1/34229-1-d50.zip
34.229-2
Internet Protocol (IP) multimedia call control protocol based on Session Initiation Protocol (SIP) and Session Description Protocol (SDP); User Equipment (UE) conformance specification; Part 2: Implementation Conformance Statement (ICS) specification
TS
13.5.0
R5
https://www.3gpp.org/ftp/Specs/archive/34_series/34.229-2/34229-2-d50.zip
34.229-3
Internet Protocol (IP) multimedia call control protocol based on Session Initiation Protocol (SIP) and Session Description Protocol (SDP); User Equipment (UE) conformance specification; Part 3: Abstract test suite (ATS)
TS
13.5.0
R5
https://www.3gpp.org/ftp/Specs/archive/34_series/34.229-3/34229-3-d50.zip
34.926
Electromagnetic compatibility (EMC); Table of international requirements for mobile terminals and ancillary equipment
TR
13.0.0
R4
https://www.3gpp.org/ftp/Specs/archive/34_series/34.926/34926-d00.zip
35.203
3G Security; Specification of the 3GPP confidentiality and integrity algorithms; Document 3: Implementors' test data
TS
13.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/35_series/35.203/35203-d00.zip
35.202
3G Security; Specification of the 3GPP confidentiality and integrity algorithms; Document 2: Kasumi specification
TS
13.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/35_series/35.202/35202-d00.zip
35.201
3G Security; Specification of the 3GPP confidentiality and integrity algorithms; Document 1: f8 and f9 specification
TS
13.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/35_series/35.201/35201-d00.zip
35.204
3G Security; Specification of the 3GPP confidentiality and integrity algorithms; Document 4: Design conformance test data
TS
13.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/35_series/35.204/35204-d00.zip
35.205
3G Security; Specification of the MILENAGE algorithm set: An example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 1: General
TS
13.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/35_series/35.205/35205-d00.zip
35.206
3G Security; Specification of the MILENAGE algorithm set: An example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 2: Algorithm specification
TS
13.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/35_series/35.206/35206-d00.zip
35.207
3G Security; Specification of the MILENAGE algorithm set: An example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 3: Implementors' test data
TS
13.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/35_series/35.207/35207-d00.zip
35.208
3G Security; Specification of the MILENAGE algorithm set: An example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 4: Design conformance test data
TS
13.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/35_series/35.208/35208-d00.zip
35.215
Specification of the 3GPP Confidentiality and Integrity Algorithms UEA2 & UIA2; Document 1: UEA2 and UIA2 specifications
TS
13.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/35_series/35.215/35215-d00.zip
35.216
Specification of the 3GPP Confidentiality and Integrity Algorithms UEA2 & UIA2; Document 2: SNOW 3G specification
TS
13.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/35_series/35.216/35216-d00.zip
35.217
Specification of the 3GPP Confidentiality and Integrity Algorithms UEA2 & UIA2; Document 3: Implementors' test data
TS
13.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/35_series/35.217/35217-d00.zip
35.218
Specification of the 3GPP Confidentiality and Integrity Algorithms UEA2 & UIA2; Document 4: Design conformance test data
TS
13.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/35_series/35.218/35218-d00.zip
35.221
Specification of the 3GPP Confidentiality and Integrity Algorithms EEA3 & EIA3; Document 1: EEA3 and EIA3 specifications
TS
13.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/35_series/35.221/35221-d00.zip
35.222
Specification of the 3GPP Confidentiality and Integrity Algorithms EEA3 & EIA3; Document 2: ZUC specification
TS
13.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/35_series/35.222/35222-d00.zip
35.223
Specification of the 3GPP Confidentiality and Integrity Algorithms EEA3 & EIA3; Document 3: Implementors' test data
TS
13.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/35_series/35.223/35223-d00.zip
35.231
Specification of the TUAK algorithm set: A second example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 1: Algorithm specification
TS
13.1.0
S3
https://www.3gpp.org/ftp/Specs/archive/35_series/35.231/35231-d10.zip
35.232
Specification of the TUAK algorithm set: A second example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 2: Implementers’ test data
TS
13.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/35_series/35.232/35232-d00.zip
35.233
Specification of the TUAK algorithm set: A second example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 3: Design conformance test data
TS
13.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/35_series/35.233/35233-d00.zip
35.909
3G Security; Specification of the MILENAGE algorithm set: an example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 5: Summary and results of design and evaluation
TR
13.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/35_series/35.909/35909-d00.zip
35.919
Specification of the 3GPP Confidentiality and Integrity Algorithms UEA2 & UIA2; Document 5: Design and evaluation report
TR
13.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/35_series/35.919/35919-d00.zip
35.924
Specification of the 3GPP Confidentiality and Integrity Algorithms EEA3 & EIA3; Document 4: Design and Evaluation Report
TR
13.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/35_series/35.924/35924-d00.zip
35.934
Specification of the TUAK algorithm set: A second example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 4: Report on the design and evaluation
TR
13.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/35_series/35.934/35934-d00.zip
35.935
Specification of the TUAK algorithm set: A second example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 5: Performance evaluation
TR
13.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/35_series/35.935/35935-d00.zip
35.936
Specification of the TUAK algorithm set: A second example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2 ,f3, f4, f5 and f5*; Document 6: Security assessment
TR
13.0.0
S3
https://www.3gpp.org/ftp/Specs/archive/35_series/35.936/35936-d00.zip
36.101
Evolved Universal Terrestrial Radio Access (E-UTRA); User Equipment (UE) radio transmission and reception
TS
13.25.0
R4
https://www.3gpp.org/ftp/Specs/archive/36_series/36.101/36101-dp0.zip
36.104
Evolved Universal Terrestrial Radio Access (E-UTRA); Base Station (BS) radio transmission and reception
TS
13.14.0
R4
https://www.3gpp.org/ftp/Specs/archive/36_series/36.104/36104-de0.zip
36.106
Evolved Universal Terrestrial Radio Access (E-UTRA); FDD repeater radio transmission and reception
TS
13.0.0
R4
https://www.3gpp.org/ftp/Specs/archive/36_series/36.106/36106-d00.zip
36.111
Location Measurement Unit (LMU) performance specification; Network based positioning systems in Evolved Universal Terrestrial Radio Access Network (E-UTRAN)
TS
13.0.0
R4
https://www.3gpp.org/ftp/Specs/archive/36_series/36.111/36111-d00.zip
36.112
Location Measurement Unit (LMU) conformance specification; Network based positioning systems in Evolved Universal Terrestrial Radio Access Network (E-UTRAN)
TS
13.0.1
R4
https://www.3gpp.org/ftp/Specs/archive/36_series/36.112/36112-d01.zip
36.113
Evolved Universal Terrestrial Radio Access (E-UTRA); Base Station (BS) and repeater ElectroMagnetic Compatibility (EMC)
TS
13.3.0
R4
https://www.3gpp.org/ftp/Specs/archive/36_series/36.113/36113-d30.zip
36.116
Evolved Universal Terrestrial Radio Access (E-UTRA); Relay radio transmission and reception
TS
13.0.1
R4
https://www.3gpp.org/ftp/Specs/archive/36_series/36.116/36116-d01.zip
36.117
Evolved Universal Terrestrial Radio Access (E-UTRA); Relay conformance testing
TS
13.0.1
R4
https://www.3gpp.org/ftp/Specs/archive/36_series/36.117/36117-d01.zip