Created (ET) |
Year |
DCN |
Rev |
Group |
Title |
Author (Affiliation) ▲ |
Uploaded (ET) |
Actions |
04-Jan-2010 ET |
2009 |
199 |
1 |
Security |
The Role of a Media Independent Authenticator |
Lily Chen (NIST) |
04-Jan-2010 14:26:52 ET |
Download |
30-Dec-2009 ET |
2009 |
199 |
0 |
Security |
The Role of a Media Independent Authenticator |
Lily Chen (NIST) |
30-Dec-2009 16:16:40 ET |
Download |
18-Nov-2009 ET |
2009 |
179 |
1 |
Security |
Tentative IEEE 802.21a document structure |
Lily Chen (NIST) |
18-Nov-2009 15:59:17 ET |
Download |
17-Nov-2009 ET |
2009 |
179 |
0 |
Security |
Tentative IEEE 802.21a document structure |
Lily Chen (NIST) |
17-Nov-2009 14:16:55 ET |
Download |
29-Oct-2009 ET |
2009 |
165 |
1 |
Security |
Meida specific vs media independent |
Lily Chen (NIST) |
29-Oct-2009 21:08:01 ET |
Download |
15-Oct-2009 ET |
2009 |
165 |
0 |
Security |
Meida specific vs media independent |
Lily Chen (NIST) |
15-Oct-2009 09:51:24 ET |
Download |
23-Sep-2009 ET |
2009 |
155 |
1 |
Security |
Initiate an Exercise to Generate a 21a Document |
Lily Chen (NIST) |
23-Sep-2009 18:05:38 ET |
Download |
23-Sep-2009 ET |
2009 |
155 |
0 |
Security |
Initiate an Exercise to Generate a 21a Document |
Lily Chen (NIST) |
23-Sep-2009 16:13:55 ET |
Download |
23-Sep-2009 ET |
2009 |
148 |
2 |
Security |
A Study on IEEE 802.11r Approach |
Lily Chen (NIST) |
23-Sep-2009 16:09:54 ET |
Download |
18-Sep-2009 ET |
2009 |
148 |
1 |
Security |
A Study on IEEE 802.11r Approach |
Lily Chen (NIST) |
18-Sep-2009 15:28:56 ET |
Download |
18-Sep-2009 ET |
2009 |
148 |
0 |
Security |
A Study on IEEE 802.11r Approach |
Lily Chen (NIST) |
18-Sep-2009 15:27:17 ET |
Download |
02-Jul-2009 ET |
2009 |
60 |
2 |
Security |
TGa_Proposal_Lily_Chen |
Lily Chen (NIST) |
02-Jul-2009 14:58:28 ET |
Download |
13-May-2009 ET |
2009 |
85 |
0 |
Security |
Observations on 802.21a proposals |
Lily Chen (NIST) |
13-May-2009 15:08:56 ET |
Download |
10-Sep-2008 ET |
2008 |
253 |
1 |
Security |
A Study on 3GPP and 3GPP-WLAN Interworking |
Lily Chen (NIST) |
10-Sep-2008 14:50:44 ET |
Download |
04-Sep-2008 ET |
2008 |
253 |
0 |
Security |
A Study on 3GPP and 3GPP-WLAN Interworking |
Lily Chen (NIST) |
04-Sep-2008 18:35:54 ET |
Download |
11-Jul-2008 ET |
2008 |
181 |
2 |
Security |
MIH Security Use Case |
Lily Chen (NIST) |
11-Jul-2008 14:52:06 ET |
Download |
19-Jun-2008 ET |
2008 |
181 |
1 |
Security |
MIH Security Use Case |
Lily Chen (NIST) |
19-Jun-2008 08:45:56 ET |
Download |
16-Jun-2008 ET |
2008 |
181 |
0 |
Security |
MIH Security Use Case |
Lily Chen (NIST) |
16-Jun-2008 10:18:58 ET |
Download |
02-Jun-2008 ET |
2008 |
170 |
0 |
Security |
MIH Security Use Cases |
Lily Chen (NIST) |
02-Jun-2008 11:17:59 ET |
Download |
15-May-2008 ET |
2008 |
151 |
2 |
Security |
MIH Security Use Case Discussion |
Lily Chen (NIST) |
15-May-2008 18:17:03 ET |
Download |
15-May-2008 ET |
2008 |
151 |
1 |
Security |
MIH Security Use Case Discussion |
Lily Chen (NIST) |
15-May-2008 15:41:20 ET |
Download |
15-May-2008 ET |
2008 |
151 |
0 |
Security |
MIH Security Use Case Discussion |
Lily Chen (NIST) |
15-May-2008 14:32:43 ET |
Download |
12-May-2008 ET |
2008 |
129 |
1 |
Security |
MIH Security - Use Case Issue Discussions |
Lily Chen (NIST) |
12-May-2008 09:36:28 ET |
Download |
12-May-2008 ET |
2008 |
130 |
0 |
Security |
MIH Security Use Case Samples |
Lily Chen (NIST) |
12-May-2008 09:35:30 ET |
Download |
30-Apr-2008 ET |
2008 |
121 |
0 |
Security |
MIH Security Use Case Discussion Topics |
Lily Chen (NIST) |
30-Apr-2008 08:27:58 ET |
Download |
02-Jul-2009 ET |
2009 |
60 |
1 |
Security |
TGa_Proposal_Lily_Chen |
Lily (NIST) |
02-Jul-2009 14:56:04 ET |
Download |
03-Apr-2008 ET |
2008 |
12 |
1 |
Security |
MIH_Security_Technical_Report |
Marc Meylemans (Intel) |
03-Apr-2008 17:00:48 ET |
Download |
09-Jan-2008 ET |
2008 |
12 |
0 |
Security |
MIH_Security_Technical_Report |
Marc Meylemans (Intel) |
09-Jan-2008 00:53:52 ET |
Download |
15-May-2008 ET |
2008 |
145 |
2 |
Security |
Security_TR_Issue_List |
michael glenn williams (nokia) |
15-May-2008 14:56:35 ET |
Download |
02-Apr-2008 ET |
2008 |
104 |
0 |
Security |
Minutes of April 2 2008 ad hoc |
Michael G. Williams (Nokia) |
02-Apr-2008 21:25:15 ET |
Download |
07-Jan-2008 ET |
2008 |
11 |
0 |
Security |
MIH_Services_Security |
Michael G. Williams (Nokia) |
07-Jan-2008 18:11:18 ET |
Download |
14-Feb-2008 ET |
2007 |
463 |
0 |
Security |
Mih_protocol_security |
N/A |
25-Dec-2007 23:10:54 ET |
Download |
14-Feb-2008 ET |
2007 |
461 |
0 |
Security |
Dec13_teleconference_minutes |
N/A |
18-Dec-2007 14:40:02 ET |
Download |
14-Feb-2008 ET |
2007 |
448 |
0 |
Security |
Jan2007_security_sg_tr_contribution_instructions |
N/A |
10-Dec-2007 19:19:35 ET |
Download |
14-Feb-2008 ET |
2007 |
446 |
0 |
Security |
Securty_sg_report |
N/A |
20-Nov-2007 20:10:20 ET |
Download |
14-Feb-2008 ET |
2007 |
435 |
0 |
Security |
Secure_handover_with_qos |
N/A |
14-Nov-2007 20:17:38 ET |
Download |
14-Feb-2008 ET |
2007 |
404 |
0 |
Security |
Nov06_teleconference_minutes |
N/A |
06-Nov-2007 23:25:25 ET |
Download |
14-Feb-2008 ET |
2007 |
402 |
2 |
Security |
Mih_key_hierarchy_v2 |
N/A |
09-Nov-2007 13:10:30 ET |
Download |
14-Feb-2008 ET |
2007 |
402 |
0 |
Security |
Mih_key_hierarchy_v2 |
N/A |
05-Nov-2007 19:59:38 ET |
Download |
14-Feb-2008 ET |
2007 |
399 |
0 |
Security |
Ssg_closing_notes |
N/A |
15-Nov-2007 13:46:38 ET |
Download |
14-Feb-2008 ET |
2007 |
398 |
0 |
Security |
Ssg_5c_discussion |
N/A |
15-Nov-2007 13:46:38 ET |
Download |
14-Feb-2008 ET |
2007 |
393 |
0 |
Security |
Security_sg_notes |
N/A |
11-Nov-2007 23:19:37 ET |
Download |
14-Feb-2008 ET |
2007 |
392 |
3 |
Security |
Security_sg_agenda |
N/A |
14-Nov-2007 13:09:22 ET |
Download |
14-Feb-2008 ET |
2007 |
392 |
2 |
Security |
Security_sg_agenda |
N/A |
13-Nov-2007 08:25:22 ET |
Download |
14-Feb-2008 ET |
2007 |
392 |
1 |
Security |
Security_sg_agenda |
N/A |
12-Nov-2007 15:26:22 ET |
Download |
14-Feb-2008 ET |
2007 |
392 |
0 |
Security |
Security_sg_agenda |
N/A |
11-Nov-2007 23:19:37 ET |
Download |
14-Feb-2008 ET |
2007 |
391 |
0 |
Security |
Use_case_scenario |
N/A |
15-Nov-2007 13:44:36 ET |
Download |
14-Feb-2008 ET |
2007 |
390 |
0 |
Security |
Mih_security_tr_use_case_scenarios |
N/A |
05-Nov-2007 21:34:07 ET |
Download |
14-Feb-2008 ET |
2007 |
386 |
0 |
Security |
802_21_security_sg_minutes_2007_sept_interim |
N/A |
01-Nov-2007 00:45:40 ET |
Download |
14-Feb-2008 ET |
2007 |
357 |
2 |
Security |
Mih_security_sg_tr_contribution_instructions |
N/A |
13-Oct-2007 02:43:20 ET |
Download |
14-Feb-2008 ET |
2007 |
357 |
1 |
Security |
Mih_security_sg_tr_contribution_instructions |
N/A |
01-Oct-2007 10:33:55 ET |
Download |
14-Feb-2008 ET |
2007 |
357 |
0 |
Security |
Mih_security_sg_tr_contribution_instructions |
N/A |
28-Sep-2007 09:22:39 ET |
Download |
14-Feb-2008 ET |
2007 |
344 |
0 |
Security |
Security_sg_report |
N/A |
20-Sep-2007 17:14:43 ET |
Download |
14-Feb-2008 ET |
2007 |
343 |
1 |
Security |
Security_sg_notes |
N/A |
19-Sep-2007 18:54:12 ET |
Download |
14-Feb-2008 ET |
2007 |
343 |
0 |
Security |
Security_sg_notes |
N/A |
19-Sep-2007 14:21:26 ET |
Download |
14-Feb-2008 ET |
2007 |
301 |
1 |
Security |
Security_architecture |
N/A |
20-Sep-2007 01:19:18 ET |
Download |
14-Feb-2008 ET |
2007 |
301 |
0 |
Security |
Security_architecture |
N/A |
14-Sep-2007 16:50:17 ET |
Download |
14-Feb-2008 ET |
2007 |
299 |
0 |
Security |
Security Sg Scenarios |
N/A |
14-Sep-2007 05:38:04 ET |
Download |
14-Feb-2008 ET |
2007 |
291 |
0 |
Security |
Hokey Preauth Ps |
N/A |
13-Sep-2007 20:13:34 ET |
Download |
02-Jun-2009 ET |
2009 |
99 |
0 |
Security |
May Telecon minutes |
Nada Golmie (NIST) |
02-Jun-2009 09:55:15 ET |
Download |
22-Apr-2009 ET |
2009 |
60 |
0 |
Security |
TGa_Proposal_Lily_Chen |
NIST |
01-May-2009 08:35:59 ET |
Download |
22-Apr-2009 ET |
2009 |
59 |
0 |
Security |
TGa_Proposal_Antonio_Izquierdo |
NIST |
01-May-2009 08:36:19 ET |
Download |
03-May-2009 ET |
2009 |
64 |
0 |
Security |
TGa_Proposal_Rafa_Marin |
Rafael Marin-Lopez (UMU) |
03-May-2009 13:28:45 ET |
Download |
16-Feb-2010 ET |
2010 |
41 |
1 |
Security |
Proactive Auth. & MIH Security |
Rafa Marin-Lopez (UMU), S. Das(Telcordia), F. Bernal (UMU), K. Randall (Randall Consulting) |
16-Feb-2010 08:28:54 ET |
Download |
16-Feb-2010 ET |
2010 |
41 |
0 |
Security |
Proactive Auth. & MIH Security |
Rafa Marin-Lopez (UMU), S. Das(Telcordia), F. Bernal (UMU), Lily Chen (NIST), K. Randall (Randall Consulting) |
16-Feb-2010 07:33:55 ET |
Download |
13-Sep-2009 ET |
2009 |
126 |
2 |
Security |
Interface Discussion |
Rafa Marin (University of Murcia) |
13-Sep-2009 13:12:19 ET |
Download |
01-Sep-2009 ET |
2009 |
139 |
0 |
Security |
TGa_Proposal_EAP_FRM_Comments |
Rafa Marin (University of Murcia) |
01-Sep-2009 14:22:38 ET |
Download |
01-Sep-2009 ET |
2009 |
126 |
1 |
Security |
Interface Discussion |
Rafa Marin (University of Murcia) |
01-Sep-2009 14:16:40 ET |
Download |
05-Jul-2009 ET |
2009 |
104 |
1 |
Security |
TGa_Proposal_Rafa_Marin |
Rafa Marin (University of Murcia) |
05-Jul-2009 12:25:57 ET |
Download |
16-Apr-2008 ET |
2008 |
107 |
0 |
Security |
Threat Modeling and analysis for MIH Protocol Security |
Rahul, Shubhranshu, and et al... |
16-Apr-2008 09:53:20 ET |
Download |
13-Jan-2010 ET |
2010 |
26 |
0 |
Security |
Comparison of architecture alternatives-key hierarchy |
R. Marin-Lopez(UMU) |
13-Jan-2010 15:39:40 ET |
Download |
29-Oct-2009 ET |
2009 |
164 |
1 |
Security |
Detailed analysis on MIA/MSA architecture |
R. Marin-Lopez(UMU), F. Bernal (UMU) |
29-Oct-2009 11:34:05 ET |
Download |
15-Oct-2009 ET |
2009 |
164 |
0 |
Security |
Detailed analysis on MIA/MSA architecture |
R. Marin-Lopez(UMU), F. Bernal (UMU) |
15-Oct-2009 07:35:38 ET |
Download |
13-Jan-2010 ET |
2010 |
27 |
0 |
Security |
Summary of Comparison Alternatives MIA/MSA |
R. Marin-Lopez(UMU), Yoshihiro Ohba (Toshiba) |
13-Jan-2010 15:42:55 ET |
Download |
02-Apr-2008 ET |
2008 |
102 |
0 |
Security |
Common Use Cases and Threats |
Shubhranshu, Marc and Subir |
02-Apr-2008 09:45:22 ET |
Download |
23-Sep-2009 ET |
2009 |
159 |
0 |
Security |
WiMAX Access Network Security |
Shubhranshu (Samsung) |
23-Sep-2009 23:18:18 ET |
Download |
29-Jun-2009 ET |
2009 |
101 |
0 |
Security |
Jun 24 Teleconf Minutes |
Shubhranshu (Samsung) |
29-Jun-2009 04:26:30 ET |
Download |
10-Jun-2009 ET |
2009 |
62 |
1 |
Security |
Solution Proposal for TGa |
Shubhranshu (Samsung) |
10-Jun-2009 08:33:51 ET |
Download |
03-May-2009 ET |
2009 |
62 |
0 |
Security |
Solution Proposal for TGa |
Shubhranshu (Samsung) |
04-May-2009 02:57:28 ET |
Download |
20-Jan-2009 ET |
2009 |
14 |
0 |
Security |
Security TR |
Shubhranshu (Samsung) |
20-Jan-2009 05:29:48 ET |
Download |
02-Dec-2008 ET |
2008 |
172 |
2 |
Security |
21-08-0012-02-0sec-mih-security-technical-report |
Shubhranshu (Samsung) |
02-Dec-2008 01:42:23 ET |
Download |
12-Nov-2008 ET |
2008 |
308 |
0 |
Security |
ssg-tr-change-request |
Shubhranshu (Samsung) |
12-Nov-2008 08:10:32 ET |
Download |
10-Sep-2008 ET |
2008 |
268 |
1 |
Security |
WiMAX Access Network Security |
Shubhranshu (Samsung) |
10-Sep-2008 16:11:04 ET |
Download |
10-Sep-2008 ET |
2008 |
268 |
0 |
Security |
WiMAX Access Network Security |
Shubhranshu (Samsung) |
10-Sep-2008 01:38:22 ET |
Download |
26-Aug-2008 ET |
2008 |
172 |
1 |
Security |
21-08-0012-02-0sec-mih-security-technical-report |
Shubhranshu (Samsung) |
26-Aug-2008 02:28:28 ET |
Download |
18-Jun-2008 ET |
2008 |
107 |
2 |
Security |
Threat Modeling and analysis for MIH Protocol Security |
Shubhranshu (Samsung) |
18-Jun-2008 05:26:58 ET |
Download |
05-Jun-2008 ET |
2008 |
107 |
1 |
Security |
Threat Modeling and analysis for MIH Protocol Security |
Shubhranshu (Samsung) |
05-Jun-2008 07:03:06 ET |
Download |
02-Jun-2008 ET |
2008 |
172 |
0 |
Security |
21-08-0012-02-0sec-mih-security-technical-report |
Shubhranshu (Samsung) |
02-Jun-2008 14:44:04 ET |
Download |
13-May-2008 ET |
2008 |
141 |
0 |
Security |
Change_Request_for_TR |
Shubhranshu (Samsung) |
13-May-2008 10:27:41 ET |
Download |
14-Jul-2008 ET |
2008 |
209 |
0 |
Security |
Change Request to 21-08-0107-02-0sec |
Shubhranshu Singh (Samsung), Rahul Sinha (Samsung), John Hickey (Alcatel-Lucent) |
14-Jul-2008 04:00:46 ET |
Download |
16-Mar-2011 ET |
2011 |
47 |
1 |
Security |
Comment #229 remedy |
Subir Das (Telcordia) |
16-Mar-2011 21:15:39 ET |
Download |
16-Mar-2011 ET |
2011 |
47 |
0 |
Security |
Comment #229 remedy |
Subir Das (Telcordia) |
16-Mar-2011 02:50:21 ET |
Download |
13-Sep-2010 ET |
2010 |
79 |
3 |
Security |
Option II: use (D)TLS to protect MIH. |
Subir Das (Telcordia) |
13-Sep-2010 14:53:06 ET |
Download |
08-Sep-2010 ET |
2010 |
79 |
2 |
Security |
Option II: use (D)TLS to protect MIH. |
Subir Das (Telcordia) |
08-Sep-2010 23:41:16 ET |
Download |
17-Aug-2010 ET |
2010 |
171 |
0 |
Security |
Q&A |
Subir Das (Telcordia) |
17-Aug-2010 08:54:29 ET |
Download |
28-Jun-2010 ET |
2010 |
79 |
1 |
Security |
Option II: use (D)TLS to protect MIH. |
Subir Das (Telcordia) |
28-Jun-2010 17:37:31 ET |
Download |
15-Apr-2010 ET |
2010 |
79 |
0 |
Security |
Option II: use (D)TLS to protect MIH. |
Subir Das (Telcordia) |
15-Apr-2010 18:10:56 ET |
Download |
08-Mar-2010 ET |
2010 |
45 |
0 |
Security |
Telecon notes |
Subir Das (Telcordia) |
08-Mar-2010 19:52:55 ET |
Download |
08-Mar-2010 ET |
2010 |
44 |
0 |
Security |
January Interim Meeting Minutes |
Subir Das (Telcordia) |
08-Mar-2010 19:51:49 ET |
Download |
21-Feb-2010 ET |
2010 |
42 |
0 |
Security |
Teleconference Minutes |
Subir Das (Telcordia) |
21-Feb-2010 11:11:42 ET |
Download |