eTools
05-Apr-2025 01:16:13 ET
Documents
Created (ET) Year DCN Rev Group Title Author (Affiliation) Uploaded (ET) Actions
04-Jan-2010 ET
2009 199 1 Security The Role of a Media Independent Authenticator Lily Chen (NIST)
04-Jan-2010 14:26:52 ET
Download
30-Dec-2009 ET
2009 199 0 Security The Role of a Media Independent Authenticator Lily Chen (NIST)
30-Dec-2009 16:16:40 ET
Download
18-Nov-2009 ET
2009 179 1 Security Tentative IEEE 802.21a document structure Lily Chen (NIST)
18-Nov-2009 15:59:17 ET
Download
17-Nov-2009 ET
2009 179 0 Security Tentative IEEE 802.21a document structure Lily Chen (NIST)
17-Nov-2009 14:16:55 ET
Download
29-Oct-2009 ET
2009 165 1 Security Meida specific vs media independent Lily Chen (NIST)
29-Oct-2009 21:08:01 ET
Download
15-Oct-2009 ET
2009 165 0 Security Meida specific vs media independent Lily Chen (NIST)
15-Oct-2009 09:51:24 ET
Download
23-Sep-2009 ET
2009 155 1 Security Initiate an Exercise to Generate a 21a Document Lily Chen (NIST)
23-Sep-2009 18:05:38 ET
Download
23-Sep-2009 ET
2009 155 0 Security Initiate an Exercise to Generate a 21a Document Lily Chen (NIST)
23-Sep-2009 16:13:55 ET
Download
23-Sep-2009 ET
2009 148 2 Security A Study on IEEE 802.11r Approach Lily Chen (NIST)
23-Sep-2009 16:09:54 ET
Download
18-Sep-2009 ET
2009 148 1 Security A Study on IEEE 802.11r Approach Lily Chen (NIST)
18-Sep-2009 15:28:56 ET
Download
18-Sep-2009 ET
2009 148 0 Security A Study on IEEE 802.11r Approach Lily Chen (NIST)
18-Sep-2009 15:27:17 ET
Download
02-Jul-2009 ET
2009 60 2 Security TGa_Proposal_Lily_Chen Lily Chen (NIST)
02-Jul-2009 14:58:28 ET
Download
13-May-2009 ET
2009 85 0 Security Observations on 802.21a proposals Lily Chen (NIST)
13-May-2009 15:08:56 ET
Download
10-Sep-2008 ET
2008 253 1 Security A Study on 3GPP and 3GPP-WLAN Interworking Lily Chen (NIST)
10-Sep-2008 14:50:44 ET
Download
04-Sep-2008 ET
2008 253 0 Security A Study on 3GPP and 3GPP-WLAN Interworking Lily Chen (NIST)
04-Sep-2008 18:35:54 ET
Download
11-Jul-2008 ET
2008 181 2 Security MIH Security Use Case Lily Chen (NIST)
11-Jul-2008 14:52:06 ET
Download
19-Jun-2008 ET
2008 181 1 Security MIH Security Use Case Lily Chen (NIST)
19-Jun-2008 08:45:56 ET
Download
16-Jun-2008 ET
2008 181 0 Security MIH Security Use Case Lily Chen (NIST)
16-Jun-2008 10:18:58 ET
Download
02-Jun-2008 ET
2008 170 0 Security MIH Security Use Cases Lily Chen (NIST)
02-Jun-2008 11:17:59 ET
Download
15-May-2008 ET
2008 151 2 Security MIH Security Use Case Discussion Lily Chen (NIST)
15-May-2008 18:17:03 ET
Download
15-May-2008 ET
2008 151 1 Security MIH Security Use Case Discussion Lily Chen (NIST)
15-May-2008 15:41:20 ET
Download
15-May-2008 ET
2008 151 0 Security MIH Security Use Case Discussion Lily Chen (NIST)
15-May-2008 14:32:43 ET
Download
12-May-2008 ET
2008 129 1 Security MIH Security - Use Case Issue Discussions Lily Chen (NIST)
12-May-2008 09:36:28 ET
Download
12-May-2008 ET
2008 130 0 Security MIH Security Use Case Samples Lily Chen (NIST)
12-May-2008 09:35:30 ET
Download
30-Apr-2008 ET
2008 121 0 Security MIH Security Use Case Discussion Topics Lily Chen (NIST)
30-Apr-2008 08:27:58 ET
Download
02-Jul-2009 ET
2009 60 1 Security TGa_Proposal_Lily_Chen Lily (NIST)
02-Jul-2009 14:56:04 ET
Download
03-Apr-2008 ET
2008 12 1 Security MIH_Security_Technical_Report Marc Meylemans (Intel)
03-Apr-2008 17:00:48 ET
Download
09-Jan-2008 ET
2008 12 0 Security MIH_Security_Technical_Report Marc Meylemans (Intel)
09-Jan-2008 00:53:52 ET
Download
15-May-2008 ET
2008 145 2 Security Security_TR_Issue_List michael glenn williams (nokia)
15-May-2008 14:56:35 ET
Download
02-Apr-2008 ET
2008 104 0 Security Minutes of April 2 2008 ad hoc Michael G. Williams (Nokia)
02-Apr-2008 21:25:15 ET
Download
07-Jan-2008 ET
2008 11 0 Security MIH_Services_Security Michael G. Williams (Nokia)
07-Jan-2008 18:11:18 ET
Download
14-Feb-2008 ET
2007 463 0 Security Mih_protocol_security N/A
25-Dec-2007 23:10:54 ET
Download
14-Feb-2008 ET
2007 461 0 Security Dec13_teleconference_minutes N/A
18-Dec-2007 14:40:02 ET
Download
14-Feb-2008 ET
2007 448 0 Security Jan2007_security_sg_tr_contribution_instructions N/A
10-Dec-2007 19:19:35 ET
Download
14-Feb-2008 ET
2007 446 0 Security Securty_sg_report N/A
20-Nov-2007 20:10:20 ET
Download
14-Feb-2008 ET
2007 435 0 Security Secure_handover_with_qos N/A
14-Nov-2007 20:17:38 ET
Download
14-Feb-2008 ET
2007 404 0 Security Nov06_teleconference_minutes N/A
06-Nov-2007 23:25:25 ET
Download
14-Feb-2008 ET
2007 402 2 Security Mih_key_hierarchy_v2 N/A
09-Nov-2007 13:10:30 ET
Download
14-Feb-2008 ET
2007 402 0 Security Mih_key_hierarchy_v2 N/A
05-Nov-2007 19:59:38 ET
Download
14-Feb-2008 ET
2007 399 0 Security Ssg_closing_notes N/A
15-Nov-2007 13:46:38 ET
Download
14-Feb-2008 ET
2007 398 0 Security Ssg_5c_discussion N/A
15-Nov-2007 13:46:38 ET
Download
14-Feb-2008 ET
2007 393 0 Security Security_sg_notes N/A
11-Nov-2007 23:19:37 ET
Download
14-Feb-2008 ET
2007 392 3 Security Security_sg_agenda N/A
14-Nov-2007 13:09:22 ET
Download
14-Feb-2008 ET
2007 392 2 Security Security_sg_agenda N/A
13-Nov-2007 08:25:22 ET
Download
14-Feb-2008 ET
2007 392 1 Security Security_sg_agenda N/A
12-Nov-2007 15:26:22 ET
Download
14-Feb-2008 ET
2007 392 0 Security Security_sg_agenda N/A
11-Nov-2007 23:19:37 ET
Download
14-Feb-2008 ET
2007 391 0 Security Use_case_scenario N/A
15-Nov-2007 13:44:36 ET
Download
14-Feb-2008 ET
2007 390 0 Security Mih_security_tr_use_case_scenarios N/A
05-Nov-2007 21:34:07 ET
Download
14-Feb-2008 ET
2007 386 0 Security 802_21_security_sg_minutes_2007_sept_interim N/A
01-Nov-2007 00:45:40 ET
Download
14-Feb-2008 ET
2007 357 2 Security Mih_security_sg_tr_contribution_instructions N/A
13-Oct-2007 02:43:20 ET
Download
14-Feb-2008 ET
2007 357 1 Security Mih_security_sg_tr_contribution_instructions N/A
01-Oct-2007 10:33:55 ET
Download
14-Feb-2008 ET
2007 357 0 Security Mih_security_sg_tr_contribution_instructions N/A
28-Sep-2007 09:22:39 ET
Download
14-Feb-2008 ET
2007 344 0 Security Security_sg_report N/A
20-Sep-2007 17:14:43 ET
Download
14-Feb-2008 ET
2007 343 1 Security Security_sg_notes N/A
19-Sep-2007 18:54:12 ET
Download
14-Feb-2008 ET
2007 343 0 Security Security_sg_notes N/A
19-Sep-2007 14:21:26 ET
Download
14-Feb-2008 ET
2007 301 1 Security Security_architecture N/A
20-Sep-2007 01:19:18 ET
Download
14-Feb-2008 ET
2007 301 0 Security Security_architecture N/A
14-Sep-2007 16:50:17 ET
Download
14-Feb-2008 ET
2007 299 0 Security Security Sg Scenarios N/A
14-Sep-2007 05:38:04 ET
Download
14-Feb-2008 ET
2007 291 0 Security Hokey Preauth Ps N/A
13-Sep-2007 20:13:34 ET
Download
02-Jun-2009 ET
2009 99 0 Security May Telecon minutes Nada Golmie (NIST)
02-Jun-2009 09:55:15 ET
Download
22-Apr-2009 ET
2009 60 0 Security TGa_Proposal_Lily_Chen NIST
01-May-2009 08:35:59 ET
Download
22-Apr-2009 ET
2009 59 0 Security TGa_Proposal_Antonio_Izquierdo NIST
01-May-2009 08:36:19 ET
Download
03-May-2009 ET
2009 64 0 Security TGa_Proposal_Rafa_Marin Rafael Marin-Lopez (UMU)
03-May-2009 13:28:45 ET
Download
16-Feb-2010 ET
2010 41 1 Security Proactive Auth. & MIH Security Rafa Marin-Lopez (UMU), S. Das(Telcordia), F. Bernal (UMU), K. Randall (Randall Consulting)
16-Feb-2010 08:28:54 ET
Download
16-Feb-2010 ET
2010 41 0 Security Proactive Auth. & MIH Security Rafa Marin-Lopez (UMU), S. Das(Telcordia), F. Bernal (UMU), Lily Chen (NIST), K. Randall (Randall Consulting)
16-Feb-2010 07:33:55 ET
Download
13-Sep-2009 ET
2009 126 2 Security Interface Discussion Rafa Marin (University of Murcia)
13-Sep-2009 13:12:19 ET
Download
01-Sep-2009 ET
2009 139 0 Security TGa_Proposal_EAP_FRM_Comments Rafa Marin (University of Murcia)
01-Sep-2009 14:22:38 ET
Download
01-Sep-2009 ET
2009 126 1 Security Interface Discussion Rafa Marin (University of Murcia)
01-Sep-2009 14:16:40 ET
Download
05-Jul-2009 ET
2009 104 1 Security TGa_Proposal_Rafa_Marin Rafa Marin (University of Murcia)
05-Jul-2009 12:25:57 ET
Download
16-Apr-2008 ET
2008 107 0 Security Threat Modeling and analysis for MIH Protocol Security Rahul, Shubhranshu, and et al...
16-Apr-2008 09:53:20 ET
Download
13-Jan-2010 ET
2010 26 0 Security Comparison of architecture alternatives-key hierarchy R. Marin-Lopez(UMU)
13-Jan-2010 15:39:40 ET
Download
29-Oct-2009 ET
2009 164 1 Security Detailed analysis on MIA/MSA architecture R. Marin-Lopez(UMU), F. Bernal (UMU)
29-Oct-2009 11:34:05 ET
Download
15-Oct-2009 ET
2009 164 0 Security Detailed analysis on MIA/MSA architecture R. Marin-Lopez(UMU), F. Bernal (UMU)
15-Oct-2009 07:35:38 ET
Download
13-Jan-2010 ET
2010 27 0 Security Summary of Comparison Alternatives MIA/MSA R. Marin-Lopez(UMU), Yoshihiro Ohba (Toshiba)
13-Jan-2010 15:42:55 ET
Download
02-Apr-2008 ET
2008 102 0 Security Common Use Cases and Threats Shubhranshu, Marc and Subir
02-Apr-2008 09:45:22 ET
Download
23-Sep-2009 ET
2009 159 0 Security WiMAX Access Network Security Shubhranshu (Samsung)
23-Sep-2009 23:18:18 ET
Download
29-Jun-2009 ET
2009 101 0 Security Jun 24 Teleconf Minutes Shubhranshu (Samsung)
29-Jun-2009 04:26:30 ET
Download
10-Jun-2009 ET
2009 62 1 Security Solution Proposal for TGa Shubhranshu (Samsung)
10-Jun-2009 08:33:51 ET
Download
03-May-2009 ET
2009 62 0 Security Solution Proposal for TGa Shubhranshu (Samsung)
04-May-2009 02:57:28 ET
Download
20-Jan-2009 ET
2009 14 0 Security Security TR Shubhranshu (Samsung)
20-Jan-2009 05:29:48 ET
Download
02-Dec-2008 ET
2008 172 2 Security 21-08-0012-02-0sec-mih-security-technical-report Shubhranshu (Samsung)
02-Dec-2008 01:42:23 ET
Download
12-Nov-2008 ET
2008 308 0 Security ssg-tr-change-request Shubhranshu (Samsung)
12-Nov-2008 08:10:32 ET
Download
10-Sep-2008 ET
2008 268 1 Security WiMAX Access Network Security Shubhranshu (Samsung)
10-Sep-2008 16:11:04 ET
Download
10-Sep-2008 ET
2008 268 0 Security WiMAX Access Network Security Shubhranshu (Samsung)
10-Sep-2008 01:38:22 ET
Download
26-Aug-2008 ET
2008 172 1 Security 21-08-0012-02-0sec-mih-security-technical-report Shubhranshu (Samsung)
26-Aug-2008 02:28:28 ET
Download
18-Jun-2008 ET
2008 107 2 Security Threat Modeling and analysis for MIH Protocol Security Shubhranshu (Samsung)
18-Jun-2008 05:26:58 ET
Download
05-Jun-2008 ET
2008 107 1 Security Threat Modeling and analysis for MIH Protocol Security Shubhranshu (Samsung)
05-Jun-2008 07:03:06 ET
Download
02-Jun-2008 ET
2008 172 0 Security 21-08-0012-02-0sec-mih-security-technical-report Shubhranshu (Samsung)
02-Jun-2008 14:44:04 ET
Download
13-May-2008 ET
2008 141 0 Security Change_Request_for_TR Shubhranshu (Samsung)
13-May-2008 10:27:41 ET
Download
14-Jul-2008 ET
2008 209 0 Security Change Request to 21-08-0107-02-0sec Shubhranshu Singh (Samsung), Rahul Sinha (Samsung), John Hickey (Alcatel-Lucent)
14-Jul-2008 04:00:46 ET
Download
16-Mar-2011 ET
2011 47 1 Security Comment #229 remedy Subir Das (Telcordia)
16-Mar-2011 21:15:39 ET
Download
16-Mar-2011 ET
2011 47 0 Security Comment #229 remedy Subir Das (Telcordia)
16-Mar-2011 02:50:21 ET
Download
13-Sep-2010 ET
2010 79 3 Security Option II: use (D)TLS to protect MIH. Subir Das (Telcordia)
13-Sep-2010 14:53:06 ET
Download
08-Sep-2010 ET
2010 79 2 Security Option II: use (D)TLS to protect MIH. Subir Das (Telcordia)
08-Sep-2010 23:41:16 ET
Download
17-Aug-2010 ET
2010 171 0 Security Q&A Subir Das (Telcordia)
17-Aug-2010 08:54:29 ET
Download
28-Jun-2010 ET
2010 79 1 Security Option II: use (D)TLS to protect MIH. Subir Das (Telcordia)
28-Jun-2010 17:37:31 ET
Download
15-Apr-2010 ET
2010 79 0 Security Option II: use (D)TLS to protect MIH. Subir Das (Telcordia)
15-Apr-2010 18:10:56 ET
Download
08-Mar-2010 ET
2010 45 0 Security Telecon notes Subir Das (Telcordia)
08-Mar-2010 19:52:55 ET
Download
08-Mar-2010 ET
2010 44 0 Security January Interim Meeting Minutes Subir Das (Telcordia)
08-Mar-2010 19:51:49 ET
Download
21-Feb-2010 ET
2010 42 0 Security Teleconference Minutes Subir Das (Telcordia)
21-Feb-2010 11:11:42 ET
Download