Created (ET) |
Year |
DCN |
Rev |
Group |
Title |
Author (Affiliation) ▼ |
Uploaded (ET) |
Actions |
26-Aug-2008 ET |
2008 |
172 |
1 |
Security |
21-08-0012-02-0sec-mih-security-technical-report |
Shubhranshu (Samsung) |
26-Aug-2008 02:28:28 ET |
Download |
18-Jun-2008 ET |
2008 |
107 |
2 |
Security |
Threat Modeling and analysis for MIH Protocol Security |
Shubhranshu (Samsung) |
18-Jun-2008 05:26:58 ET |
Download |
05-Jun-2008 ET |
2008 |
107 |
1 |
Security |
Threat Modeling and analysis for MIH Protocol Security |
Shubhranshu (Samsung) |
05-Jun-2008 07:03:06 ET |
Download |
02-Jun-2008 ET |
2008 |
172 |
0 |
Security |
21-08-0012-02-0sec-mih-security-technical-report |
Shubhranshu (Samsung) |
02-Jun-2008 14:44:04 ET |
Download |
13-May-2008 ET |
2008 |
141 |
0 |
Security |
Change_Request_for_TR |
Shubhranshu (Samsung) |
13-May-2008 10:27:41 ET |
Download |
02-Apr-2008 ET |
2008 |
102 |
0 |
Security |
Common Use Cases and Threats |
Shubhranshu, Marc and Subir |
02-Apr-2008 09:45:22 ET |
Download |
13-Jan-2010 ET |
2010 |
27 |
0 |
Security |
Summary of Comparison Alternatives MIA/MSA |
R. Marin-Lopez(UMU), Yoshihiro Ohba (Toshiba) |
13-Jan-2010 15:42:55 ET |
Download |
29-Oct-2009 ET |
2009 |
164 |
1 |
Security |
Detailed analysis on MIA/MSA architecture |
R. Marin-Lopez(UMU), F. Bernal (UMU) |
29-Oct-2009 11:34:05 ET |
Download |
15-Oct-2009 ET |
2009 |
164 |
0 |
Security |
Detailed analysis on MIA/MSA architecture |
R. Marin-Lopez(UMU), F. Bernal (UMU) |
15-Oct-2009 07:35:38 ET |
Download |
13-Jan-2010 ET |
2010 |
26 |
0 |
Security |
Comparison of architecture alternatives-key hierarchy |
R. Marin-Lopez(UMU) |
13-Jan-2010 15:39:40 ET |
Download |
16-Apr-2008 ET |
2008 |
107 |
0 |
Security |
Threat Modeling and analysis for MIH Protocol Security |
Rahul, Shubhranshu, and et al... |
16-Apr-2008 09:53:20 ET |
Download |
13-Sep-2009 ET |
2009 |
126 |
2 |
Security |
Interface Discussion |
Rafa Marin (University of Murcia) |
13-Sep-2009 13:12:19 ET |
Download |
01-Sep-2009 ET |
2009 |
139 |
0 |
Security |
TGa_Proposal_EAP_FRM_Comments |
Rafa Marin (University of Murcia) |
01-Sep-2009 14:22:38 ET |
Download |
01-Sep-2009 ET |
2009 |
126 |
1 |
Security |
Interface Discussion |
Rafa Marin (University of Murcia) |
01-Sep-2009 14:16:40 ET |
Download |
05-Jul-2009 ET |
2009 |
104 |
1 |
Security |
TGa_Proposal_Rafa_Marin |
Rafa Marin (University of Murcia) |
05-Jul-2009 12:25:57 ET |
Download |
16-Feb-2010 ET |
2010 |
41 |
0 |
Security |
Proactive Auth. & MIH Security |
Rafa Marin-Lopez (UMU), S. Das(Telcordia), F. Bernal (UMU), Lily Chen (NIST), K. Randall (Randall Consulting) |
16-Feb-2010 07:33:55 ET |
Download |
16-Feb-2010 ET |
2010 |
41 |
1 |
Security |
Proactive Auth. & MIH Security |
Rafa Marin-Lopez (UMU), S. Das(Telcordia), F. Bernal (UMU), K. Randall (Randall Consulting) |
16-Feb-2010 08:28:54 ET |
Download |
03-May-2009 ET |
2009 |
64 |
0 |
Security |
TGa_Proposal_Rafa_Marin |
Rafael Marin-Lopez (UMU) |
03-May-2009 13:28:45 ET |
Download |
22-Apr-2009 ET |
2009 |
60 |
0 |
Security |
TGa_Proposal_Lily_Chen |
NIST |
01-May-2009 08:35:59 ET |
Download |
22-Apr-2009 ET |
2009 |
59 |
0 |
Security |
TGa_Proposal_Antonio_Izquierdo |
NIST |
01-May-2009 08:36:19 ET |
Download |
02-Jun-2009 ET |
2009 |
99 |
0 |
Security |
May Telecon minutes |
Nada Golmie (NIST) |
02-Jun-2009 09:55:15 ET |
Download |
14-Feb-2008 ET |
2007 |
463 |
0 |
Security |
Mih_protocol_security |
N/A |
25-Dec-2007 23:10:54 ET |
Download |
14-Feb-2008 ET |
2007 |
461 |
0 |
Security |
Dec13_teleconference_minutes |
N/A |
18-Dec-2007 14:40:02 ET |
Download |
14-Feb-2008 ET |
2007 |
448 |
0 |
Security |
Jan2007_security_sg_tr_contribution_instructions |
N/A |
10-Dec-2007 19:19:35 ET |
Download |
14-Feb-2008 ET |
2007 |
446 |
0 |
Security |
Securty_sg_report |
N/A |
20-Nov-2007 20:10:20 ET |
Download |
14-Feb-2008 ET |
2007 |
435 |
0 |
Security |
Secure_handover_with_qos |
N/A |
14-Nov-2007 20:17:38 ET |
Download |
14-Feb-2008 ET |
2007 |
404 |
0 |
Security |
Nov06_teleconference_minutes |
N/A |
06-Nov-2007 23:25:25 ET |
Download |
14-Feb-2008 ET |
2007 |
402 |
2 |
Security |
Mih_key_hierarchy_v2 |
N/A |
09-Nov-2007 13:10:30 ET |
Download |
14-Feb-2008 ET |
2007 |
402 |
0 |
Security |
Mih_key_hierarchy_v2 |
N/A |
05-Nov-2007 19:59:38 ET |
Download |
14-Feb-2008 ET |
2007 |
399 |
0 |
Security |
Ssg_closing_notes |
N/A |
15-Nov-2007 13:46:38 ET |
Download |
14-Feb-2008 ET |
2007 |
398 |
0 |
Security |
Ssg_5c_discussion |
N/A |
15-Nov-2007 13:46:38 ET |
Download |
14-Feb-2008 ET |
2007 |
393 |
0 |
Security |
Security_sg_notes |
N/A |
11-Nov-2007 23:19:37 ET |
Download |
14-Feb-2008 ET |
2007 |
392 |
3 |
Security |
Security_sg_agenda |
N/A |
14-Nov-2007 13:09:22 ET |
Download |
14-Feb-2008 ET |
2007 |
392 |
2 |
Security |
Security_sg_agenda |
N/A |
13-Nov-2007 08:25:22 ET |
Download |
14-Feb-2008 ET |
2007 |
392 |
1 |
Security |
Security_sg_agenda |
N/A |
12-Nov-2007 15:26:22 ET |
Download |
14-Feb-2008 ET |
2007 |
392 |
0 |
Security |
Security_sg_agenda |
N/A |
11-Nov-2007 23:19:37 ET |
Download |
14-Feb-2008 ET |
2007 |
391 |
0 |
Security |
Use_case_scenario |
N/A |
15-Nov-2007 13:44:36 ET |
Download |
14-Feb-2008 ET |
2007 |
390 |
0 |
Security |
Mih_security_tr_use_case_scenarios |
N/A |
05-Nov-2007 21:34:07 ET |
Download |
14-Feb-2008 ET |
2007 |
386 |
0 |
Security |
802_21_security_sg_minutes_2007_sept_interim |
N/A |
01-Nov-2007 00:45:40 ET |
Download |
14-Feb-2008 ET |
2007 |
357 |
2 |
Security |
Mih_security_sg_tr_contribution_instructions |
N/A |
13-Oct-2007 02:43:20 ET |
Download |
14-Feb-2008 ET |
2007 |
357 |
1 |
Security |
Mih_security_sg_tr_contribution_instructions |
N/A |
01-Oct-2007 10:33:55 ET |
Download |
14-Feb-2008 ET |
2007 |
357 |
0 |
Security |
Mih_security_sg_tr_contribution_instructions |
N/A |
28-Sep-2007 09:22:39 ET |
Download |
14-Feb-2008 ET |
2007 |
344 |
0 |
Security |
Security_sg_report |
N/A |
20-Sep-2007 17:14:43 ET |
Download |
14-Feb-2008 ET |
2007 |
343 |
1 |
Security |
Security_sg_notes |
N/A |
19-Sep-2007 18:54:12 ET |
Download |
14-Feb-2008 ET |
2007 |
343 |
0 |
Security |
Security_sg_notes |
N/A |
19-Sep-2007 14:21:26 ET |
Download |
14-Feb-2008 ET |
2007 |
301 |
1 |
Security |
Security_architecture |
N/A |
20-Sep-2007 01:19:18 ET |
Download |
14-Feb-2008 ET |
2007 |
301 |
0 |
Security |
Security_architecture |
N/A |
14-Sep-2007 16:50:17 ET |
Download |
14-Feb-2008 ET |
2007 |
299 |
0 |
Security |
Security Sg Scenarios |
N/A |
14-Sep-2007 05:38:04 ET |
Download |
14-Feb-2008 ET |
2007 |
291 |
0 |
Security |
Hokey Preauth Ps |
N/A |
13-Sep-2007 20:13:34 ET |
Download |
02-Apr-2008 ET |
2008 |
104 |
0 |
Security |
Minutes of April 2 2008 ad hoc |
Michael G. Williams (Nokia) |
02-Apr-2008 21:25:15 ET |
Download |
07-Jan-2008 ET |
2008 |
11 |
0 |
Security |
MIH_Services_Security |
Michael G. Williams (Nokia) |
07-Jan-2008 18:11:18 ET |
Download |
15-May-2008 ET |
2008 |
145 |
2 |
Security |
Security_TR_Issue_List |
michael glenn williams (nokia) |
15-May-2008 14:56:35 ET |
Download |
03-Apr-2008 ET |
2008 |
12 |
1 |
Security |
MIH_Security_Technical_Report |
Marc Meylemans (Intel) |
03-Apr-2008 17:00:48 ET |
Download |
09-Jan-2008 ET |
2008 |
12 |
0 |
Security |
MIH_Security_Technical_Report |
Marc Meylemans (Intel) |
09-Jan-2008 00:53:52 ET |
Download |
02-Jul-2009 ET |
2009 |
60 |
1 |
Security |
TGa_Proposal_Lily_Chen |
Lily (NIST) |
02-Jul-2009 14:56:04 ET |
Download |
17-May-2011 ET |
2011 |
89 |
1 |
Security |
Resolution for Comment #28 |
Lily Chen (NIST) |
17-May-2011 12:28:11 ET |
Download |
17-May-2011 ET |
2011 |
89 |
0 |
Security |
Resolution for Comment #28 |
Lily Chen (NIST) |
17-May-2011 11:31:18 ET |
Download |
16-Mar-2011 ET |
2011 |
26 |
2 |
Security |
Security TLVs |
Lily Chen (NIST) |
16-Mar-2011 21:08:36 ET |
Download |
11-Mar-2011 ET |
2011 |
26 |
1 |
Security |
Security TLVs |
Lily Chen (NIST) |
11-Mar-2011 14:23:18 ET |
Download |
08-Mar-2011 ET |
2011 |
27 |
0 |
Security |
Security protection and fragmentation |
Lily Chen (NIST) |
08-Mar-2011 16:52:11 ET |
Download |
08-Mar-2011 ET |
2011 |
26 |
0 |
Security |
Security TLVs |
Lily Chen (NIST) |
08-Mar-2011 16:51:23 ET |
Download |
08-Mar-2011 ET |
2011 |
25 |
0 |
Security |
Supported Ciphersuites |
Lily Chen (NIST) |
08-Mar-2011 16:50:25 ET |
Download |
11-Jan-2011 ET |
2011 |
2 |
1 |
Security |
AES-CCM Mode |
Lily Chen (NIST) |
11-Jan-2011 20:46:18 ET |
Download |
07-Jan-2011 ET |
2011 |
2 |
0 |
Security |
AES-CCM Mode |
Lily Chen (NIST) |
07-Jan-2011 16:16:43 ET |
Download |
20-Sep-2010 ET |
2010 |
203 |
0 |
Security |
KDFs in 802.21a |
Lily Chen (NIST) |
20-Sep-2010 14:38:43 ET |
Download |
17-Aug-2010 ET |
2010 |
170 |
0 |
Security |
Comments on Option ii work item 2 |
Lily Chen (NIST) |
17-Aug-2010 00:39:30 ET |
Download |
12-Aug-2010 ET |
2010 |
169 |
0 |
Security |
Options for Security IEs |
Lily Chen (NIST) |
12-Aug-2010 14:27:50 ET |
Download |
15-Jul-2010 ET |
2010 |
153 |
0 |
Security |
Presentation on draft 21a document proposal |
Lily Chen (NIST) |
15-Jul-2010 13:23:51 ET |
Download |
14-Jul-2010 ET |
2010 |
148 |
0 |
Security |
21a draft standard proposal |
Lily Chen (NIST) |
14-Jul-2010 17:49:24 ET |
Download |
14-Jul-2010 ET |
2010 |
124 |
2 |
Security |
Presentation for Work Item 2 Option 1 |
Lily Chen (NIST) |
14-Jul-2010 11:48:03 ET |
Download |
09-Jul-2010 ET |
2010 |
124 |
1 |
Security |
Presentation for Work Item 2 Option 1 |
Lily Chen (NIST) |
09-Jul-2010 16:13:07 ET |
Download |
28-Jun-2010 ET |
2010 |
124 |
0 |
Security |
Presentation for Work Item 2 Option 1 |
Lily Chen (NIST) |
28-Jun-2010 16:51:40 ET |
Download |
28-Jun-2010 ET |
2010 |
84 |
1 |
Security |
Option I for Work Item 2 |
Lily Chen (NIST) |
28-Jun-2010 16:49:41 ET |
Download |
28-Jun-2010 ET |
2010 |
122 |
0 |
Security |
Meeting Minutes of June 22 Teleconference |
Lily Chen (NIST) |
28-Jun-2010 08:26:02 ET |
Download |
28-Jun-2010 ET |
2010 |
121 |
1 |
Security |
Meeting Minutes of May 22 Teleconference |
Lily Chen (NIST) |
28-Jun-2010 08:24:33 ET |
Download |
25-Jun-2010 ET |
2010 |
121 |
0 |
Security |
Meeting Minutes of May 22 Teleconference |
Lily Chen (NIST) |
25-Jun-2010 15:35:00 ET |
Download |
16-Jun-2010 ET |
2010 |
119 |
0 |
Security |
Minutes of June 15 Teleconference |
Lily Chen (NIST) |
16-Jun-2010 17:06:14 ET |
Download |
12-May-2010 ET |
2010 |
100 |
2 |
Security |
Issue Summary |
Lily Chen (NIST) |
12-May-2010 06:06:12 ET |
Download |
12-May-2010 ET |
2010 |
100 |
1 |
Security |
Issue Summary |
Lily Chen (NIST) |
12-May-2010 03:14:06 ET |
Download |
11-May-2010 ET |
2010 |
100 |
0 |
Security |
Issue Summary |
Lily Chen (NIST) |
11-May-2010 08:03:04 ET |
Download |
05-May-2010 ET |
2010 |
84 |
0 |
Security |
Option I for Work Item 2 |
Lily Chen (NIST) |
05-May-2010 17:15:17 ET |
Download |
04-May-2010 ET |
2010 |
83 |
0 |
Security |
May 4 Telecon Minutes |
Lily Chen (NIST) |
04-May-2010 13:57:19 ET |
Download |
16-Apr-2010 ET |
2010 |
81 |
0 |
Security |
April 15 Telecon Minutes |
Lily Chen (NIST) |
16-Apr-2010 08:44:24 ET |
Download |
18-Mar-2010 ET |
2010 |
49 |
3 |
Security |
Proposal Summary |
Lily Chen (NIST) |
18-Mar-2010 10:59:22 ET |
Download |
17-Mar-2010 ET |
2010 |
49 |
2 |
Security |
Proposal Summary |
Lily Chen (NIST) |
17-Mar-2010 09:24:56 ET |
Download |
12-Mar-2010 ET |
2010 |
49 |
1 |
Security |
Proposal Summary |
Lily Chen (NIST) |
12-Mar-2010 17:14:39 ET |
Download |
12-Mar-2010 ET |
2010 |
49 |
0 |
Security |
Proposal Summary |
Lily Chen (NIST) |
12-Mar-2010 13:31:44 ET |
Download |
02-Feb-2010 ET |
2010 |
37 |
0 |
Security |
Key Hierarchy Issues |
Lily Chen (NIST) |
02-Feb-2010 08:51:33 ET |
Download |
06-Jan-2010 ET |
2010 |
2 |
0 |
Security |
Key Hierarchy Discussion |
Lily Chen (NIST) |
06-Jan-2010 16:49:14 ET |
Download |
05-Jan-2010 ET |
2009 |
199 |
3 |
Security |
The Role of a Media Independent Authenticator |
Lily Chen (NIST) |
05-Jan-2010 13:09:41 ET |
Download |
05-Jan-2010 ET |
2009 |
199 |
2 |
Security |
The Role of a Media Independent Authenticator |
Lily Chen (NIST) |
05-Jan-2010 09:38:44 ET |
Download |
04-Jan-2010 ET |
2009 |
199 |
1 |
Security |
The Role of a Media Independent Authenticator |
Lily Chen (NIST) |
04-Jan-2010 14:26:52 ET |
Download |
30-Dec-2009 ET |
2009 |
199 |
0 |
Security |
The Role of a Media Independent Authenticator |
Lily Chen (NIST) |
30-Dec-2009 16:16:40 ET |
Download |
18-Nov-2009 ET |
2009 |
179 |
1 |
Security |
Tentative IEEE 802.21a document structure |
Lily Chen (NIST) |
18-Nov-2009 15:59:17 ET |
Download |
17-Nov-2009 ET |
2009 |
179 |
0 |
Security |
Tentative IEEE 802.21a document structure |
Lily Chen (NIST) |
17-Nov-2009 14:16:55 ET |
Download |
29-Oct-2009 ET |
2009 |
165 |
1 |
Security |
Meida specific vs media independent |
Lily Chen (NIST) |
29-Oct-2009 21:08:01 ET |
Download |
15-Oct-2009 ET |
2009 |
165 |
0 |
Security |
Meida specific vs media independent |
Lily Chen (NIST) |
15-Oct-2009 09:51:24 ET |
Download |
23-Sep-2009 ET |
2009 |
155 |
1 |
Security |
Initiate an Exercise to Generate a 21a Document |
Lily Chen (NIST) |
23-Sep-2009 18:05:38 ET |
Download |
23-Sep-2009 ET |
2009 |
155 |
0 |
Security |
Initiate an Exercise to Generate a 21a Document |
Lily Chen (NIST) |
23-Sep-2009 16:13:55 ET |
Download |
23-Sep-2009 ET |
2009 |
148 |
2 |
Security |
A Study on IEEE 802.11r Approach |
Lily Chen (NIST) |
23-Sep-2009 16:09:54 ET |
Download |