Created (ET) |
Year |
DCN |
Rev |
Group |
Title ▲ |
Author (Affiliation) |
Uploaded (ET) |
Actions |
06-Sep-2010 ET |
2010 |
123 |
1 |
Security |
option-A-for-work-item-I |
Dapeng Liu(China Mobile) |
06-Sep-2010 13:54:27 ET |
Download |
28-Jun-2010 ET |
2010 |
123 |
0 |
Security |
option-A-for-work-item-I |
Dapeng Liu(China Mobile) |
28-Jun-2010 09:33:52 ET |
Download |
28-Jun-2010 ET |
2010 |
84 |
1 |
Security |
Option I for Work Item 2 |
Lily Chen (NIST) |
28-Jun-2010 16:49:41 ET |
Download |
05-May-2010 ET |
2010 |
84 |
0 |
Security |
Option I for Work Item 2 |
Lily Chen (NIST) |
05-May-2010 17:15:17 ET |
Download |
10-Nov-2010 ET |
2010 |
209 |
1 |
Security |
Option III Draft updates |
Fernando Bernal (UMU), Rafa Marin-Lopez(UMU) |
10-Nov-2010 06:33:47 ET |
Download |
05-Nov-2010 ET |
2010 |
209 |
0 |
Security |
Option III Draft updates |
Fernando Bernal (UMU), Rafa Marin-Lopez(UMU) |
05-Nov-2010 08:34:51 ET |
Download |
02-Nov-2010 ET |
2010 |
78 |
8 |
Security |
Option III: EAP over MIH service authentication |
Fernando Bernal (UMU), Rafa Marin-Lopez(UMU) |
02-Nov-2010 08:52:55 ET |
Download |
15-Sep-2010 ET |
2010 |
78 |
7 |
Security |
Option III: EAP over MIH service authentication |
Fernando Bernal (UMU), Rafa Marin-Lopez(UMU) |
15-Sep-2010 17:50:26 ET |
Download |
13-Sep-2010 ET |
2010 |
78 |
6 |
Security |
Option III: EAP over MIH service authentication |
Fernando Bernal (UMU), Rafa Marin-Lopez(UMU) |
13-Sep-2010 19:29:21 ET |
Download |
13-Sep-2010 ET |
2010 |
78 |
5 |
Security |
Option III: EAP over MIH service authentication |
Fernando Bernal (UMU), Rafa Marin-Lopez(UMU) |
13-Sep-2010 15:09:25 ET |
Download |
09-Sep-2010 ET |
2010 |
78 |
4 |
Security |
Option III: EAP over MIH service authentication |
Fernando Bernal (UMU), Rafa Marin-Lopez(UMU) |
09-Sep-2010 12:31:16 ET |
Download |
23-Aug-2010 ET |
2010 |
78 |
3 |
Security |
Option III: EAP over MIH service authentication |
Fernando Bernal (UMU), Rafa Marin-Lopez(UMU) |
23-Aug-2010 13:40:44 ET |
Download |
28-Jun-2010 ET |
2010 |
78 |
2 |
Security |
Option III: EAP over MIH service authentication |
Fernando Bernal (UMU), Rafa Marin-Lopez(UMU) |
28-Jun-2010 17:11:16 ET |
Download |
22-Jun-2010 ET |
2010 |
78 |
1 |
Security |
Option III: EAP over MIH service authentication |
Fernando Bernal (UMU), Rafa Marin-Lopez(UMU) |
22-Jun-2010 08:32:42 ET |
Download |
15-Apr-2010 ET |
2010 |
78 |
0 |
Security |
Option III: EAP over MIH service authentication |
Fernando Bernal (UMU), Rafa Marin-Lopez(UMU) |
15-Apr-2010 08:05:58 ET |
Download |
28-Sep-2010 ET |
2010 |
204 |
0 |
Security |
Option III: EAP to conduct service authentication and MIH packet protection: FLAGS and MIHS. |
Fernando Bernal(UMU), Rafa Marin-Lopez(UMU) |
28-Sep-2010 08:49:05 ET |
Download |
02-Nov-2010 ET |
2010 |
207 |
0 |
Security |
Option III: EAP to conduct service authentication and MIH packet protection: ISSUES |
Fernando Bernal (UMU), Rafa Marin-Lopez(UMU) |
02-Nov-2010 08:55:39 ET |
Download |
31-Aug-2010 ET |
2010 |
120 |
3 |
Security |
Option III presentation |
Fernando Bernal, Rafa Marin-Lopez |
31-Aug-2010 07:22:37 ET |
Download |
14-Jul-2010 ET |
2010 |
120 |
2 |
Security |
Option III presentation |
Fernando Bernal, Rafa Marin-Lopez |
14-Jul-2010 10:53:17 ET |
Download |
28-Jun-2010 ET |
2010 |
120 |
1 |
Security |
Option III presentation |
Fernando Bernal, Rafa Marin-Lopez |
28-Jun-2010 17:05:19 ET |
Download |
22-Jun-2010 ET |
2010 |
120 |
0 |
Security |
Option III presentation |
Fernando Bernal, Rafa Marin-Lopez |
22-Jun-2010 08:38:33 ET |
Download |
13-Sep-2010 ET |
2010 |
79 |
3 |
Security |
Option II: use (D)TLS to protect MIH. |
Subir Das (Telcordia) |
13-Sep-2010 14:53:06 ET |
Download |
08-Sep-2010 ET |
2010 |
79 |
2 |
Security |
Option II: use (D)TLS to protect MIH. |
Subir Das (Telcordia) |
08-Sep-2010 23:41:16 ET |
Download |
28-Jun-2010 ET |
2010 |
79 |
1 |
Security |
Option II: use (D)TLS to protect MIH. |
Subir Das (Telcordia) |
28-Jun-2010 17:37:31 ET |
Download |
15-Apr-2010 ET |
2010 |
79 |
0 |
Security |
Option II: use (D)TLS to protect MIH. |
Subir Das (Telcordia) |
15-Apr-2010 18:10:56 ET |
Download |
12-Aug-2010 ET |
2010 |
169 |
0 |
Security |
Options for Security IEs |
Lily Chen (NIST) |
12-Aug-2010 14:27:50 ET |
Download |
09-Feb-2009 ET |
2009 |
28 |
0 |
Security |
P802.21a Five Criteria |
Yoshihiro Ohba (Toshiba) |
09-Feb-2009 13:37:37 ET |
Download |
19-Jan-2009 ET |
2009 |
10 |
0 |
Security |
p802 21a PAR |
Yoshihiro Ohba (Toshiba) |
19-Jan-2009 16:48:08 ET |
Download |
16-Jul-2008 ET |
2008 |
223 |
1 |
Security |
PAR_Feedback_Response |
Yoshihiro Ohba (Toshiba) |
16-Jul-2008 12:20:00 ET |
Download |
16-Jul-2008 ET |
2008 |
223 |
0 |
Security |
PAR_Feedback_Response |
Yoshihiro Ohba (Toshiba) |
16-Jul-2008 09:46:05 ET |
Download |
16-Jul-2008 ET |
2008 |
225 |
2 |
Security |
par for security extensions |
Yoshihiro Ohba (Toshiba) |
16-Jul-2008 18:33:04 ET |
Download |
16-Jul-2008 ET |
2008 |
225 |
1 |
Security |
par for security extensions |
Yoshihiro Ohba (Toshiba) |
16-Jul-2008 13:24:59 ET |
Download |
16-Jul-2008 ET |
2008 |
225 |
0 |
Security |
par for security extensions |
Yoshihiro Ohba (Toshiba) |
16-Jul-2008 12:19:35 ET |
Download |
13-Jun-2008 ET |
2008 |
178 |
1 |
Security |
PAR for Security Extensions |
Vivek Gupta (Intel Corporation) |
13-Jun-2008 16:58:18 ET |
Download |
13-Jun-2008 ET |
2008 |
178 |
0 |
Security |
PAR for Security Extensions |
Vivek Gupta (Intel Corporation) |
13-Jun-2008 12:50:28 ET |
Download |
18-May-2011 ET |
2011 |
77 |
1 |
Security |
PICS Proforma |
David Cypher (NIST), Lily Chen (NIST), Yoshihiro Ohba (Toshiba) |
18-May-2011 17:02:03 ET |
Download |
13-May-2011 ET |
2011 |
77 |
0 |
Security |
PICS Proforma |
David Cypher (NIST) |
13-May-2011 11:13:31 ET |
Download |
17-Mar-2011 ET |
2011 |
54 |
0 |
Security |
PICS related questions |
Yoshihiro Ohba (Toshiba) |
17-Mar-2011 02:38:56 ET |
Download |
14-Jul-2010 ET |
2010 |
124 |
2 |
Security |
Presentation for Work Item 2 Option 1 |
Lily Chen (NIST) |
14-Jul-2010 11:48:03 ET |
Download |
09-Jul-2010 ET |
2010 |
124 |
1 |
Security |
Presentation for Work Item 2 Option 1 |
Lily Chen (NIST) |
09-Jul-2010 16:13:07 ET |
Download |
28-Jun-2010 ET |
2010 |
124 |
0 |
Security |
Presentation for Work Item 2 Option 1 |
Lily Chen (NIST) |
28-Jun-2010 16:51:40 ET |
Download |
15-Jul-2010 ET |
2010 |
153 |
0 |
Security |
Presentation on draft 21a document proposal |
Lily Chen (NIST) |
15-Jul-2010 13:23:51 ET |
Download |
13-Nov-2009 ET |
2009 |
102 |
3 |
Security |
Proactive Authentication and MIH Security |
Subir Das (Telcordia) |
13-Nov-2009 17:23:23 ET |
Download |
12-Sep-2009 ET |
2009 |
102 |
2 |
Security |
Proactive Authentication and MIH Security |
Subir Das (Telcordia) |
12-Sep-2009 22:14:10 ET |
Download |
05-Jul-2009 ET |
2009 |
102 |
1 |
Security |
Proactive Authentication and MIH Security |
Subir Das (Telcordia) |
05-Jul-2009 20:50:50 ET |
Download |
05-Jul-2009 ET |
2009 |
102 |
0 |
Security |
Proactive Authentication and MIH Security |
Subir Das (Telcordia) |
05-Jul-2009 10:42:29 ET |
Download |
04-May-2010 ET |
2010 |
82 |
0 |
Security |
Proactive Authentication Through EAP (MSA is the authenticator) |
Dapeng Liu(China Mobile) |
04-May-2010 09:04:57 ET |
Download |
16-Feb-2010 ET |
2010 |
41 |
1 |
Security |
Proactive Auth. & MIH Security |
Rafa Marin-Lopez (UMU), S. Das(Telcordia), F. Bernal (UMU), K. Randall (Randall Consulting) |
16-Feb-2010 08:28:54 ET |
Download |
16-Feb-2010 ET |
2010 |
41 |
0 |
Security |
Proactive Auth. & MIH Security |
Rafa Marin-Lopez (UMU), S. Das(Telcordia), F. Bernal (UMU), Lily Chen (NIST), K. Randall (Randall Consulting) |
16-Feb-2010 07:33:55 ET |
Download |
18-Mar-2010 ET |
2010 |
49 |
3 |
Security |
Proposal Summary |
Lily Chen (NIST) |
18-Mar-2010 10:59:22 ET |
Download |
17-Mar-2010 ET |
2010 |
49 |
2 |
Security |
Proposal Summary |
Lily Chen (NIST) |
17-Mar-2010 09:24:56 ET |
Download |
12-Mar-2010 ET |
2010 |
49 |
1 |
Security |
Proposal Summary |
Lily Chen (NIST) |
12-Mar-2010 17:14:39 ET |
Download |
12-Mar-2010 ET |
2010 |
49 |
0 |
Security |
Proposal Summary |
Lily Chen (NIST) |
12-Mar-2010 13:31:44 ET |
Download |
15-Mar-2011 ET |
2011 |
21 |
1 |
Security |
proposed remedies |
Yoshihiro Ohba (Toshiba) |
15-Mar-2011 09:00:56 ET |
Download |
27-Feb-2011 ET |
2011 |
21 |
0 |
Security |
proposed remedies |
Yoshihiro Ohba (Toshiba) |
01-Mar-2011 06:32:13 ET |
Download |
17-Aug-2010 ET |
2010 |
171 |
0 |
Security |
Q&A |
Subir Das (Telcordia) |
17-Aug-2010 08:54:29 ET |
Download |
17-May-2011 ET |
2011 |
89 |
1 |
Security |
Resolution for Comment #28 |
Lily Chen (NIST) |
17-May-2011 12:28:11 ET |
Download |
17-May-2011 ET |
2011 |
89 |
0 |
Security |
Resolution for Comment #28 |
Lily Chen (NIST) |
17-May-2011 11:31:18 ET |
Download |
14-Jan-2010 ET |
2010 |
30 |
0 |
Security |
Secure Access and Delivery |
Vivek Gupta (Intel Corporation) |
14-Jan-2010 11:59:34 ET |
Download |
14-Feb-2008 ET |
2007 |
435 |
0 |
Security |
Secure_handover_with_qos |
N/A |
14-Nov-2007 20:17:38 ET |
Download |
14-Feb-2008 ET |
2007 |
301 |
1 |
Security |
Security_architecture |
N/A |
20-Sep-2007 01:19:18 ET |
Download |
14-Feb-2008 ET |
2007 |
301 |
0 |
Security |
Security_architecture |
N/A |
14-Sep-2007 16:50:17 ET |
Download |
23-Feb-2009 ET |
2009 |
29 |
1 |
Security |
security Feb 11 teleconf minutes |
Anthony Chan (Huawei Technologies) |
23-Feb-2009 14:06:34 ET |
Download |
17-Feb-2009 ET |
2009 |
29 |
0 |
Security |
security Feb 11 teleconf minutes |
Anthony Chan (Huawei Technologies) |
17-Feb-2009 18:48:58 ET |
Download |
25-Feb-2009 ET |
2009 |
31 |
0 |
Security |
security Feb 25 teleconf minutes |
Anthony Chan (Huawei Technologies) |
25-Feb-2009 12:42:59 ET |
Download |
19-Aug-2009 ET |
2009 |
137 |
0 |
Security |
Security proposal comments clarification |
Anirudh Bhatt (Samsung) |
19-Aug-2009 09:00:28 ET |
Download |
08-Mar-2011 ET |
2011 |
27 |
0 |
Security |
Security protection and fragmentation |
Lily Chen (NIST) |
08-Mar-2011 16:52:11 ET |
Download |
14-May-2008 ET |
2008 |
125 |
2 |
Security |
Security_SG_Aganda |
yohba@tari.toshiba.com |
14-May-2008 11:07:12 ET |
Download |
13-May-2008 ET |
2008 |
125 |
1 |
Security |
Security_SG_Aganda |
yohba@tari.toshiba.com |
13-May-2008 10:33:50 ET |
Download |
06-May-2008 ET |
2008 |
125 |
0 |
Security |
Security_SG_Aganda |
yohba@tari.toshiba.com |
06-May-2008 11:24:27 ET |
Download |
15-Jan-2008 ET |
2008 |
34 |
0 |
Security |
security_sg_agenda |
Yoshihiro Ohba (Toshiba) |
15-Jan-2008 19:52:51 ET |
Download |
03-Nov-2008 ET |
2008 |
288 |
0 |
Security |
security-sg-agenda |
Yoshihiro Ohba (Toshiba) |
03-Nov-2008 17:17:17 ET |
Download |
14-Feb-2008 ET |
2007 |
392 |
3 |
Security |
Security_sg_agenda |
N/A |
14-Nov-2007 13:09:22 ET |
Download |
14-Feb-2008 ET |
2007 |
392 |
2 |
Security |
Security_sg_agenda |
N/A |
13-Nov-2007 08:25:22 ET |
Download |
14-Feb-2008 ET |
2007 |
392 |
1 |
Security |
Security_sg_agenda |
N/A |
12-Nov-2007 15:26:22 ET |
Download |
14-Feb-2008 ET |
2007 |
392 |
0 |
Security |
Security_sg_agenda |
N/A |
11-Nov-2007 23:19:37 ET |
Download |
20-Mar-2008 ET |
2008 |
70 |
3 |
Security |
Security SG Agenda |
Yoshihiro Ohba (Toshiba) |
20-Mar-2008 12:43:30 ET |
Download |
17-Mar-2008 ET |
2008 |
70 |
2 |
Security |
Security SG Agenda |
Yoshihiro Ohba (Toshiba) |
18-Mar-2008 04:59:14 ET |
Download |
16-Mar-2008 ET |
2008 |
70 |
1 |
Security |
Security SG Agenda |
Yoshihiro Ohba (Toshiba) |
16-Mar-2008 22:59:53 ET |
Download |
15-Mar-2008 ET |
2008 |
70 |
0 |
Security |
Security SG Agenda |
Yoshihiro Ohba (Toshiba) |
15-Mar-2008 15:24:12 ET |
Download |
08-Sep-2008 ET |
2008 |
257 |
0 |
Security |
Security_SG_Agenda |
Yoshihiro Ohba (Toshiba) |
08-Sep-2008 20:26:51 ET |
Download |
16-Jul-2008 ET |
2008 |
204 |
2 |
Security |
Security_SG_Agenda |
Yoshihiro Ohba (Toshiba) |
16-Jul-2008 12:22:42 ET |
Download |
15-Jul-2008 ET |
2008 |
204 |
1 |
Security |
Security_SG_Agenda |
Yoshihiro Ohba (Toshiba) |
15-Jul-2008 12:43:49 ET |
Download |
11-Jul-2008 ET |
2008 |
204 |
0 |
Security |
Security_SG_Agenda |
Yoshihiro Ohba (Toshiba) |
11-Jul-2008 18:31:54 ET |
Download |
17-Jan-2008 ET |
2008 |
44 |
0 |
Security |
security_sg_closing_notes |
Yoshihiro Ohba (Toshiba) |
17-Jan-2008 04:45:44 ET |
Download |
17-Jul-2008 ET |
2008 |
237 |
0 |
Security |
Security SG Closing Report July 2008 |
Yoshihiro Ohba (Toshiba) |
17-Jul-2008 06:55:48 ET |
Download |
16-May-2008 ET |
2008 |
155 |
0 |
Security |
Security_SG_Meeting_Report_May_2008 |
Yoshihiro Ohba (Toshiba) |
16-May-2008 01:07:35 ET |
Download |
13-Jan-2008 ET |
2008 |
25 |
1 |
Security |
security_sg_minutes_2007_nov |
Yoshihiro Ohba (Toshiba) |
13-Jan-2008 17:44:10 ET |
Download |
13-Jan-2008 ET |
2008 |
25 |
0 |
Security |
security_sg_minutes_2007_nov |
Yoshihiro Ohba (Toshiba) |
13-Jan-2008 17:33:55 ET |
Download |
16-Jul-2008 ET |
2008 |
224 |
0 |
Security |
Security_SG_Motions |
Yoshihiro Ohba (Toshiba) |
16-Jul-2008 13:58:01 ET |
Download |
14-Feb-2008 ET |
2007 |
393 |
0 |
Security |
Security_sg_notes |
N/A |
11-Nov-2007 23:19:37 ET |
Download |
14-Feb-2008 ET |
2007 |
343 |
1 |
Security |
Security_sg_notes |
N/A |
19-Sep-2007 18:54:12 ET |
Download |
14-Feb-2008 ET |
2007 |
343 |
0 |
Security |
Security_sg_notes |
N/A |
19-Sep-2007 14:21:26 ET |
Download |
13-Jan-2009 ET |
2008 |
301 |
3 |
Security |
Security SG Nov meeting minutes |
Yoshihiro Ohba (Toshiba) |
13-Jan-2009 10:56:42 ET |
Download |
13-Nov-2008 ET |
2008 |
301 |
2 |
Security |
Security SG Nov meeting minutes |
H Anthony Chan (Huawei Technologies) |
13-Nov-2008 10:23:02 ET |
Download |
12-Nov-2008 ET |
2008 |
301 |
1 |
Security |
Security SG Nov meeting minutes |
H Anthony Chan (Huawei Technologies) |
12-Nov-2008 11:30:41 ET |
Download |
11-Nov-2008 ET |
2008 |
301 |
0 |
Security |
Security SG Nov meeting minutes |
H |
11-Nov-2008 11:17:06 ET |
Download |
24-Oct-2008 ET |
2008 |
286 |
0 |
Security |
Security SG Oct 23 teleconference minutes |
H Anthony Chan (Huawei Technologies) |
24-Oct-2008 11:22:31 ET |
Download |
12-May-2008 ET |
2008 |
134 |
0 |
Security |
Security_SG_Opeining_Notes |
Yoshihiro Ohba (Toshiba) |
13-May-2008 01:06:57 ET |
Download |
18-Mar-2008 ET |
2008 |
82 |
0 |
Security |
security sg opening notes |
Yoshihiro Ohba (Toshiba) |
18-Mar-2008 05:00:23 ET |
Download |