Created (ET) |
Year |
DCN |
Rev |
Group |
Title |
Author (Affiliation) ▼ |
Uploaded (ET) |
Actions |
16-Jan-2013 ET |
2013 |
127 |
3 |
TGai |
FILS Authentication Protocol Fragmentation Vulnerability Notes |
Rob Sun (Huawei) |
16-Jan-2013 20:43:48 ET |
Download |
15-Jan-2013 ET |
2013 |
127 |
2 |
TGai |
FILS Authentication Protocol Fragmentation Vulnerability Notes |
Rob Sun (Huawei) |
15-Jan-2013 20:25:29 ET |
Download |
15-Jan-2013 ET |
2013 |
127 |
1 |
TGai |
FILS Authentication Protocol Fragmentation Vulnerability Notes |
Rob Sun (Huawei) |
15-Jan-2013 18:45:15 ET |
Download |
15-Jan-2013 ET |
2013 |
127 |
0 |
TGai |
FILS Authentication Protocol Fragmentation Vulnerability Notes |
Rob Sun (Huawei) |
15-Jan-2013 17:08:12 ET |
Download |
14-Nov-2012 ET |
2012 |
1282 |
2 |
TGai |
Normative text for FILS authentication scheme and State machine |
Rob Sun (Huawei) |
14-Nov-2012 11:30:18 ET |
Download |
14-Nov-2012 ET |
2012 |
1281 |
2 |
TGai |
FILS authentication and state machine |
Rob Sun (Huawei) |
14-Nov-2012 11:29:07 ET |
Download |
13-Nov-2012 ET |
2012 |
1282 |
1 |
TGai |
Normative text for FILS authentication scheme and State machine |
Rob Sun (Huawei) |
13-Nov-2012 11:45:34 ET |
Download |
13-Nov-2012 ET |
2012 |
1281 |
1 |
TGai |
FILS authentication and state machine |
Rob Sun (Huawei) |
13-Nov-2012 11:37:30 ET |
Download |
03-Nov-2012 ET |
2012 |
1282 |
0 |
TGai |
Normative text for FILS authentication scheme and State machine |
Rob Sun (Huawei) |
06-Nov-2012 21:35:25 ET |
Download |
03-Nov-2012 ET |
2012 |
1281 |
0 |
TGai |
FILS authentication and state machine |
Rob Sun (Huawei) |
06-Nov-2012 21:34:50 ET |
Download |
15-Mar-2012 ET |
2012 |
278 |
3 |
TGai |
FILS presentation on FILS presentation on High Level Security Requirements |
Rob Sun (Huawei) |
15-Mar-2012 15:18:33 ET |
Download |
14-Mar-2012 ET |
2012 |
278 |
2 |
TGai |
FILS presentation on FILS presentation on High Level Security Requirements |
Rob Sun (Huawei) |
14-Mar-2012 15:49:10 ET |
Download |
14-Mar-2012 ET |
2012 |
278 |
1 |
TGai |
FILS presentation on FILS presentation on High Level Security Requirements |
Rob Sun (Huawei) |
14-Mar-2012 14:33:49 ET |
Download |
02-Mar-2012 ET |
2012 |
248 |
0 |
TGai |
High Level FILS Security Requirements for Specification Frame Work Document |
Rob Sun (Huawei) |
06-Mar-2012 11:21:31 ET |
Download |
18-Jan-2012 ET |
2012 |
41 |
1 |
TGai |
Performance analysis of 802.11 EAP authentication and authorization |
Rob Sun (Huawei) |
18-Jan-2012 13:25:26 ET |
Download |
18-Jan-2012 ET |
2012 |
40 |
2 |
TGai |
Text for FILS authentication protocol |
Rob Sun (Huawei) |
18-Jan-2012 08:52:22 ET |
Download |
18-Jan-2012 ET |
2012 |
40 |
1 |
TGai |
Text for FILS authentication protocol |
Rob Sun (Huawei) |
18-Jan-2012 08:23:44 ET |
Download |
17-Jan-2012 ET |
2012 |
39 |
3 |
TGai |
FILS Authentication Protocol |
Rob Sun (Huawei) |
17-Jan-2012 19:43:51 ET |
Download |
12-Jan-2012 ET |
2012 |
39 |
2 |
TGai |
FILS Authentication Protocol |
Rob Sun (Huawei) |
12-Jan-2012 10:57:46 ET |
Download |
12-Jan-2012 ET |
2012 |
39 |
1 |
TGai |
FILS Authentication Protocol |
Rob Sun (Huawei) |
12-Jan-2012 10:24:30 ET |
Download |
11-Jan-2012 ET |
2012 |
41 |
0 |
TGai |
Performance analysis of 802.11 EAP authentication and authorization |
Rob Sun (Huawei) |
12-Jan-2012 10:26:26 ET |
Download |
11-Jan-2012 ET |
2012 |
40 |
0 |
TGai |
Text for FILS authentication protocol |
Rob Sun (Huawei) |
12-Jan-2012 10:23:05 ET |
Download |
11-Jan-2012 ET |
2012 |
39 |
0 |
TGai |
FILS Authentication Protocol |
Rob Sun (Huawei) |
12-Jan-2012 10:20:50 ET |
Download |
21-Dec-2011 ET |
2011 |
1436 |
3 |
TGai |
Security requirements for TGai |
Robert Sun (Huawei);Yunbo li(Huawei); Edward Au(Huawei); Phil Barber(Huawei) |
21-Dec-2011 14:19:47 ET |
Download |
07-Nov-2011 ET |
2011 |
1436 |
2 |
TGai |
Security requirements for TGai |
Robert Sun (Huawei);Yunbo li(Huawei); Edward Au(Huawei); Phil Barber(Huawei) |
07-Nov-2011 13:56:49 ET |
Download |
02-Nov-2011 ET |
2011 |
1436 |
1 |
TGai |
Security requirements for TGai |
Robert Sun (Huawei);Yunbo li(Huawei); Edward Au(Huawei); Phil Barber(Huawei) |
02-Nov-2011 13:51:06 ET |
Download |
01-Nov-2011 ET |
2011 |
1436 |
0 |
TGai |
Security requirements for TGai |
Robert Sun (Huawei);Yunbo li(Huawei); Edward Au(Huawei); Phil Barber(Huawei) |
01-Nov-2011 21:22:24 ET |
Download |
16-Apr-2012 ET |
2012 |
499 |
0 |
TGai |
TGai second vice chair candidate |
Robert Stacey (Apple) |
16-Apr-2012 20:59:41 ET |
Download |
06-Mar-2012 ET |
2012 |
296 |
0 |
TGai |
FILS association |
Robert Stacey (Apple) |
10-Mar-2012 19:13:28 ET |
Download |
21-Sep-2011 ET |
2011 |
1306 |
1 |
TGai |
security-discussions |
Robert Moskowitz (Verizon) |
21-Sep-2011 20:10:12 ET |
Download |
20-Sep-2011 ET |
2011 |
1306 |
0 |
TGai |
security-discussions |
Robert Moskowitz (Verizon) |
21-Sep-2011 12:35:43 ET |
Download |
21-Jul-2011 ET |
2011 |
1066 |
2 |
TGai |
Fast Security Setup |
Robert Moskowitz (Verizon) |
21-Jul-2011 16:41:12 ET |
Download |
21-Jul-2011 ET |
2011 |
1066 |
1 |
TGai |
Fast Security Setup |
Robert Moskowitz (Verizon) |
21-Jul-2011 14:15:21 ET |
Download |
20-Jul-2011 ET |
2011 |
1066 |
0 |
TGai |
Fast Security Setup |
Robert Moskowitz (Verizon) |
21-Jul-2011 10:15:00 ET |
Download |
10-May-2011 ET |
2011 |
756 |
0 |
TGai |
IP addess assignment in FIA |
Robert Moskowitz (Verizon) |
10-May-2011 17:19:21 ET |
Download |
14-Jan-2015 ET |
2015 |
165 |
0 |
TGai |
suggested-resolutions-aead-security-comments-lb204-xls |
Rene Struik (Struik Security Consultancy) |
14-Jan-2015 14:56:19 ET |
Download |
14-Jan-2015 ET |
2015 |
164 |
0 |
TGai |
suggested-resolutions-aead-security-comments-lb204-text |
Rene Struik (Struik Security Consultancy) |
14-Jan-2015 14:23:42 ET |
Download |
19-Mar-2014 ET |
2014 |
295 |
4 |
TGai |
suggested-resolutions-remaining-security-comments-LB198 |
Rene Struik (Struik Security Consultancy) |
19-Mar-2014 02:36:49 ET |
Download |
19-Mar-2014 ET |
2014 |
295 |
3 |
TGai |
suggested-resolutions-remaining-security-comments-LB198 |
Rene Struik (Struik Security Consultancy) |
19-Mar-2014 00:05:41 ET |
Download |
18-Mar-2014 ET |
2014 |
295 |
2 |
TGai |
suggested-resolutions-remaining-security-comments-LB198 |
Rene Struik (Struik Security Consultancy) |
18-Mar-2014 20:40:02 ET |
Download |
18-Mar-2014 ET |
2014 |
417 |
3 |
TGai |
resolution-of-cids-11-2-3-to-7-without-siv |
Rene Struik (Struik Security Consultancy) |
18-Mar-2014 04:26:37 ET |
Download |
18-Mar-2014 ET |
2014 |
417 |
2 |
TGai |
resolution-of-cids-11-2-3-to-7-without-siv |
Rene Struik (Struik Security Consultancy) |
18-Mar-2014 04:13:46 ET |
Download |
18-Mar-2014 ET |
2014 |
417 |
1 |
TGai |
resolution-of-cids-11-2-3-to-7-without-siv |
Rene Struik (Struik Security Consultancy) |
18-Mar-2014 03:31:50 ET |
Download |
18-Mar-2014 ET |
2014 |
417 |
0 |
TGai |
resolution-of-cids-11-2-3-to-7-without-siv |
Rene Struik (Struik Security Consultancy) |
18-Mar-2014 03:27:30 ET |
Download |
17-Mar-2014 ET |
2014 |
295 |
1 |
TGai |
suggested-resolutions-remaining-security-comments-LB198 |
Rene Struik (Struik Security Consultancy) |
17-Mar-2014 22:36:31 ET |
Download |
11-Mar-2014 ET |
2014 |
295 |
0 |
TGai |
suggested-resolutions-remaining-security-comments-LB198 |
Rene Struik (Struik Security Consultancy) |
11-Mar-2014 09:57:34 ET |
Download |
23-Jan-2014 ET |
2014 |
184 |
1 |
TGai |
some-security-motions-TGai |
Rene Struik (Struik Security Consultancy) |
23-Jan-2014 17:14:11 ET |
Download |
23-Jan-2014 ET |
2014 |
184 |
0 |
TGai |
some-security-motions-TGai |
Rene Struik (Struik Security Consultancy) |
23-Jan-2014 17:04:33 ET |
Download |
23-Jan-2014 ET |
2014 |
183 |
0 |
TGai |
suggested-resolution-security-comment-CID-2222 |
Rene Struik (Struik Security Consultancy) |
23-Jan-2014 16:33:43 ET |
Download |
23-Jan-2014 ET |
2014 |
180 |
0 |
TGai |
suggested-resolution-security-comment-CID-2983 |
Rene Struik (Struik Security Consultancy) |
23-Jan-2014 14:51:41 ET |
Download |
17-Sep-2013 ET |
2013 |
1193 |
1 |
TGai |
suggested-resolutions-security-comments-LB198 |
Rene Struik (Struik Security Consultancy) |
17-Sep-2013 16:34:28 ET |
Download |
17-Sep-2013 ET |
2013 |
1193 |
0 |
TGai |
suggested-resolutions-security-comments-LB198 |
Rene Struik (Struik Security Consultancy) |
17-Sep-2013 13:40:04 ET |
Download |
16-Jul-2013 ET |
2013 |
885 |
0 |
TGai |
Resolution-CID-1006-1255-1334-1006-1256-1371-1396-1377-1388-1387-1384 |
Rene Struik (Struik Security Consultancy) |
16-Jul-2013 17:42:47 ET |
Download |
16-May-2013 ET |
2013 |
581 |
4 |
TGai |
fils-flexible-use-of-aead |
Rene Struik (Struik Security Consultancy) |
16-May-2013 18:18:42 ET |
Download |
16-May-2013 ET |
2013 |
582 |
4 |
TGai |
fils-flexible-use-of-aead-text |
Rene Struik (Struik Security Consultancy) |
16-May-2013 18:11:28 ET |
Download |
16-May-2013 ET |
2013 |
581 |
3 |
TGai |
fils-flexible-use-of-aead |
Rene Struik (Struik Security Consultancy) |
16-May-2013 13:43:54 ET |
Download |
16-May-2013 ET |
2013 |
582 |
3 |
TGai |
fils-flexible-use-of-aead-text |
Rene Struik (Struik Security Consultancy) |
16-May-2013 13:43:25 ET |
Download |
16-May-2013 ET |
2013 |
582 |
2 |
TGai |
fils-flexible-use-of-aead-text |
Rene Struik (Struik Security Consultancy) |
16-May-2013 13:19:48 ET |
Download |
16-May-2013 ET |
2013 |
581 |
2 |
TGai |
fils-flexible-use-of-aead |
Rene Struik (Struik Security Consultancy) |
16-May-2013 13:17:46 ET |
Download |
15-May-2013 ET |
2013 |
582 |
1 |
TGai |
fils-flexible-use-of-aead-text |
Rene Struik (Struik Security Consultancy) |
15-May-2013 18:24:16 ET |
Download |
15-May-2013 ET |
2013 |
581 |
1 |
TGai |
fils-flexible-use-of-aead |
Rene Struik (Struik Security Consultancy) |
15-May-2013 18:23:43 ET |
Download |
14-May-2013 ET |
2013 |
582 |
0 |
TGai |
fils-flexible-use-of-aead-text |
Rene Struik (Struik Security Consultancy) |
14-May-2013 22:46:39 ET |
Download |
14-May-2013 ET |
2013 |
581 |
0 |
TGai |
fils-flexible-use-of-aead |
Rene Struik (Struik Security Consultancy) |
14-May-2013 22:47:39 ET |
Download |
14-May-2013 ET |
2013 |
201 |
10 |
TGai |
fils-handling-of-large-objects |
Rene Struik (Struik Security Consultancy) |
14-May-2013 21:51:08 ET |
Download |
14-May-2013 ET |
2013 |
201 |
9 |
TGai |
fils-handling-of-large-objects |
Rene Struik (Struik Security Consultancy) |
14-May-2013 21:45:27 ET |
Download |
14-May-2013 ET |
2013 |
311 |
2 |
TGai |
Proposed Resolutions for Assigned Security CIDs |
Rene Struik (Struik Security Consultancy) |
14-May-2013 21:33:34 ET |
Download |
13-May-2013 ET |
2013 |
201 |
8 |
TGai |
fils-handling-of-large-objects |
Rene Struik (Struik Security Consultancy) |
13-May-2013 19:56:58 ET |
Download |
13-May-2013 ET |
2013 |
201 |
7 |
TGai |
fils-handling-of-large-objects |
Rene Struik (Struik Security Consultancy) |
13-May-2013 18:16:02 ET |
Download |
13-May-2013 ET |
2013 |
311 |
1 |
TGai |
Proposed Resolutions for Assigned Security CIDs |
Rene Struik (Struik Security Consultancy) |
13-May-2013 17:10:05 ET |
Download |
04-May-2013 ET |
2013 |
475 |
0 |
TGai |
Comments on 802.11ai, Draft D0.5 |
Rene Struik (Struik Security Consultancy) |
04-May-2013 00:08:04 ET |
Download |
23-Apr-2013 ET |
2013 |
201 |
6 |
TGai |
fils-handling-of-large-objects |
Rene Struik (Struik Security Consultancy) |
23-Apr-2013 09:58:46 ET |
Download |
21-Mar-2013 ET |
2013 |
201 |
5 |
TGai |
fils-handling-of-large-objects |
Rene Struik (Struik Security Consultancy) |
21-Mar-2013 07:01:00 ET |
Download |
21-Mar-2013 ET |
2013 |
201 |
4 |
TGai |
fils-handling-of-large-objects |
Rene Struik (Struik Security Consultancy) |
21-Mar-2013 04:10:57 ET |
Download |
19-Mar-2013 ET |
2013 |
201 |
3 |
TGai |
fils-handling-of-large-objects |
Rene Struik (Struik Security Consultancy) |
19-Mar-2013 15:48:54 ET |
Download |
19-Mar-2013 ET |
2013 |
201 |
2 |
TGai |
fils-handling-of-large-objects |
Rene Struik (Struik Security Consultancy) |
19-Mar-2013 13:33:33 ET |
Download |
15-Mar-2013 ET |
2013 |
311 |
0 |
TGai |
Proposed Resolutions for Assigned Security CIDs |
Rene Struik (Struik Security Consultancy) |
21-Mar-2013 03:57:05 ET |
Download |
05-Feb-2013 ET |
2013 |
201 |
1 |
TGai |
fils-handling-of-large-objects |
Rene Struik (Struik Security Consultancy) |
05-Feb-2013 17:44:27 ET |
Download |
05-Feb-2013 ET |
2013 |
201 |
0 |
TGai |
fils-handling-of-large-objects |
Rene Struik (Struik Security Consultancy) |
05-Feb-2013 17:00:37 ET |
Download |
16-Jan-2013 ET |
2013 |
143 |
1 |
TGai |
fils-capabilities-indications-ip-address-assignment-revised-proposal |
Rene Struik (Struik Security Consultancy) |
16-Jan-2013 19:05:52 ET |
Download |
16-Jan-2013 ET |
2013 |
143 |
0 |
TGai |
fils-capabilities-indications-ip-address-assignment-revised-proposal |
Rene Struik (Struik Security Consultancy) |
16-Jan-2013 18:59:48 ET |
Download |
07-Jan-2013 ET |
2013 |
39 |
0 |
TGai |
TGai Draft D0.2 Review Comments |
Rene Struik (Struik Security Consultancy) |
14-Jan-2013 15:53:53 ET |
Download |
14-Nov-2012 ET |
2012 |
1385 |
1 |
TGai |
fils-AEAD-mode |
Rene Struik (Struik Security Consultancy) |
14-Nov-2012 18:53:44 ET |
Download |
13-Nov-2012 ET |
2012 |
52 |
6 |
TGai |
fils-authentication-with-certified-public-keys |
Rene Struik (Struik Security Consultancy) |
13-Nov-2012 14:43:19 ET |
Download |
13-Nov-2012 ET |
2012 |
1385 |
0 |
TGai |
fils-AEAD-mode |
Rene Struik (Struik Security Consultancy) |
13-Nov-2012 14:18:23 ET |
Download |
12-Nov-2012 ET |
2012 |
52 |
5 |
TGai |
fils-authentication-with-certified-public-keys |
Rene Struik (Struik Security Consultancy) |
12-Nov-2012 10:42:08 ET |
Download |
05-Nov-2012 ET |
2012 |
52 |
4 |
TGai |
fils-authentication-with-certified-public-keys |
Rene Struik (Struik Security Consultancy) |
05-Nov-2012 23:40:05 ET |
Download |
30-Oct-2012 ET |
2012 |
1243 |
1 |
TGai |
Discussion of Outstanding TGai Security Topics |
Rene Struik (Struik Security Consultancy) |
30-Oct-2012 18:38:39 ET |
Download |
25-Oct-2012 ET |
2012 |
1243 |
0 |
TGai |
Discussion of Outstanding TGai Security Topics |
Rene Struik (Struik Security Consultancy) |
30-Oct-2012 01:17:32 ET |
Download |
19-Sep-2012 ET |
2012 |
1172 |
0 |
TGai |
suggested-edits-to-12-1164-02-00ai-tgai-spec-text-proposal-for-fils-authentication |
Rene Struik (Struik Security Consultancy) |
19-Sep-2012 22:34:20 ET |
Download |
19-Sep-2012 ET |
2012 |
1151 |
3 |
TGai |
Suggested edits to 12-1045-02-00ai-tgai-spec-text-proposal-for-fils-authentication-protocol-draft |
Rene Struik (Struik Security Consultancy) |
19-Sep-2012 22:25:12 ET |
Download |
19-Sep-2012 ET |
2012 |
1151 |
2 |
TGai |
Suggested edits to 12-1045-02-00ai-tgai-spec-text-proposal-for-fils-authentication-protocol-draft |
Rene Struik (Struik Security Consultancy) |
19-Sep-2012 17:10:52 ET |
Download |
19-Sep-2012 ET |
2012 |
1151 |
1 |
TGai |
Suggested edits to 12-1045-02-00ai-tgai-spec-text-proposal-for-fils-authentication-protocol-draft |
Rene Struik (Struik Security Consultancy) |
19-Sep-2012 15:45:00 ET |
Download |
18-Sep-2012 ET |
2012 |
1151 |
0 |
TGai |
Suggested edits to 12-1045-02-00ai-tgai-spec-text-proposal-for-fils-authentication-protocol-draft |
Rene Struik (Struik Security Consultancy) |
18-Sep-2012 16:33:28 ET |
Download |
31-Aug-2012 ET |
2012 |
794 |
3 |
TGai |
FILS-Authentication-with-Local-Authentication-and-Optional-Remote-Authorization |
Rene Struik (Struik Security Consultancy) |
31-Aug-2012 16:27:17 ET |
Download |
31-Aug-2012 ET |
2012 |
52 |
3 |
TGai |
fils-authentication-with-certified-public-keys |
Rene Struik (Struik Security Consultancy) |
31-Aug-2012 13:02:13 ET |
Download |
17-Jul-2012 ET |
2012 |
794 |
2 |
TGai |
FILS-Authentication-with-Local-Authentication-and-Optional-Remote-Authorization |
Rene Struik (Struik Security Consultancy) |
17-Jul-2012 15:14:45 ET |
Download |
17-Jul-2012 ET |
2012 |
794 |
1 |
TGai |
FILS-Authentication-with-Local-Authentication-and-Optional-Remote-Authorization |
Rene Struik (Struik Security Consultancy) |
17-Jul-2012 14:03:13 ET |
Download |
07-Jul-2012 ET |
2012 |
794 |
0 |
TGai |
FILS-Authentication-with-Local-Authentication-and-Optional-Remote-Authorization |
Rene Struik (Struik Security Consultancy) |
07-Jul-2012 02:27:27 ET |
Download |
15-May-2012 ET |
2011 |
1408 |
13 |
TGai |
Notes on TGai Security Properties |
Rene Struik (Struik Security Consultancy) |
15-May-2012 19:36:53 ET |
Download |
04-May-2012 ET |
2012 |
574 |
0 |
TGai |
Security-and-Ease-of-Use-Considerations-for-TGai |
Rene Struik (Struik Security Consultancy) |
04-May-2012 23:58:20 ET |
Download |