eTools
05-Apr-2025 10:06:40 ET
Documents
Created (ET) Year DCN Rev Group Title Author (Affiliation) Uploaded (ET) Actions
26-Aug-2008 ET
2008 172 1 Security 21-08-0012-02-0sec-mih-security-technical-report Shubhranshu (Samsung)
26-Aug-2008 02:28:28 ET
Download
18-Jun-2008 ET
2008 107 2 Security Threat Modeling and analysis for MIH Protocol Security Shubhranshu (Samsung)
18-Jun-2008 05:26:58 ET
Download
05-Jun-2008 ET
2008 107 1 Security Threat Modeling and analysis for MIH Protocol Security Shubhranshu (Samsung)
05-Jun-2008 07:03:06 ET
Download
02-Jun-2008 ET
2008 172 0 Security 21-08-0012-02-0sec-mih-security-technical-report Shubhranshu (Samsung)
02-Jun-2008 14:44:04 ET
Download
13-May-2008 ET
2008 141 0 Security Change_Request_for_TR Shubhranshu (Samsung)
13-May-2008 10:27:41 ET
Download
02-Apr-2008 ET
2008 102 0 Security Common Use Cases and Threats Shubhranshu, Marc and Subir
02-Apr-2008 09:45:22 ET
Download
13-Jan-2010 ET
2010 27 0 Security Summary of Comparison Alternatives MIA/MSA R. Marin-Lopez(UMU), Yoshihiro Ohba (Toshiba)
13-Jan-2010 15:42:55 ET
Download
29-Oct-2009 ET
2009 164 1 Security Detailed analysis on MIA/MSA architecture R. Marin-Lopez(UMU), F. Bernal (UMU)
29-Oct-2009 11:34:05 ET
Download
15-Oct-2009 ET
2009 164 0 Security Detailed analysis on MIA/MSA architecture R. Marin-Lopez(UMU), F. Bernal (UMU)
15-Oct-2009 07:35:38 ET
Download
13-Jan-2010 ET
2010 26 0 Security Comparison of architecture alternatives-key hierarchy R. Marin-Lopez(UMU)
13-Jan-2010 15:39:40 ET
Download
16-Apr-2008 ET
2008 107 0 Security Threat Modeling and analysis for MIH Protocol Security Rahul, Shubhranshu, and et al...
16-Apr-2008 09:53:20 ET
Download
13-Sep-2009 ET
2009 126 2 Security Interface Discussion Rafa Marin (University of Murcia)
13-Sep-2009 13:12:19 ET
Download
01-Sep-2009 ET
2009 139 0 Security TGa_Proposal_EAP_FRM_Comments Rafa Marin (University of Murcia)
01-Sep-2009 14:22:38 ET
Download
01-Sep-2009 ET
2009 126 1 Security Interface Discussion Rafa Marin (University of Murcia)
01-Sep-2009 14:16:40 ET
Download
05-Jul-2009 ET
2009 104 1 Security TGa_Proposal_Rafa_Marin Rafa Marin (University of Murcia)
05-Jul-2009 12:25:57 ET
Download
16-Feb-2010 ET
2010 41 0 Security Proactive Auth. & MIH Security Rafa Marin-Lopez (UMU), S. Das(Telcordia), F. Bernal (UMU), Lily Chen (NIST), K. Randall (Randall Consulting)
16-Feb-2010 07:33:55 ET
Download
16-Feb-2010 ET
2010 41 1 Security Proactive Auth. & MIH Security Rafa Marin-Lopez (UMU), S. Das(Telcordia), F. Bernal (UMU), K. Randall (Randall Consulting)
16-Feb-2010 08:28:54 ET
Download
03-May-2009 ET
2009 64 0 Security TGa_Proposal_Rafa_Marin Rafael Marin-Lopez (UMU)
03-May-2009 13:28:45 ET
Download
22-Apr-2009 ET
2009 60 0 Security TGa_Proposal_Lily_Chen NIST
01-May-2009 08:35:59 ET
Download
22-Apr-2009 ET
2009 59 0 Security TGa_Proposal_Antonio_Izquierdo NIST
01-May-2009 08:36:19 ET
Download
02-Jun-2009 ET
2009 99 0 Security May Telecon minutes Nada Golmie (NIST)
02-Jun-2009 09:55:15 ET
Download
14-Feb-2008 ET
2007 463 0 Security Mih_protocol_security N/A
25-Dec-2007 23:10:54 ET
Download
14-Feb-2008 ET
2007 461 0 Security Dec13_teleconference_minutes N/A
18-Dec-2007 14:40:02 ET
Download
14-Feb-2008 ET
2007 448 0 Security Jan2007_security_sg_tr_contribution_instructions N/A
10-Dec-2007 19:19:35 ET
Download
14-Feb-2008 ET
2007 446 0 Security Securty_sg_report N/A
20-Nov-2007 20:10:20 ET
Download
14-Feb-2008 ET
2007 435 0 Security Secure_handover_with_qos N/A
14-Nov-2007 20:17:38 ET
Download
14-Feb-2008 ET
2007 404 0 Security Nov06_teleconference_minutes N/A
06-Nov-2007 23:25:25 ET
Download
14-Feb-2008 ET
2007 402 2 Security Mih_key_hierarchy_v2 N/A
09-Nov-2007 13:10:30 ET
Download
14-Feb-2008 ET
2007 402 0 Security Mih_key_hierarchy_v2 N/A
05-Nov-2007 19:59:38 ET
Download
14-Feb-2008 ET
2007 399 0 Security Ssg_closing_notes N/A
15-Nov-2007 13:46:38 ET
Download
14-Feb-2008 ET
2007 398 0 Security Ssg_5c_discussion N/A
15-Nov-2007 13:46:38 ET
Download
14-Feb-2008 ET
2007 393 0 Security Security_sg_notes N/A
11-Nov-2007 23:19:37 ET
Download
14-Feb-2008 ET
2007 392 3 Security Security_sg_agenda N/A
14-Nov-2007 13:09:22 ET
Download
14-Feb-2008 ET
2007 392 2 Security Security_sg_agenda N/A
13-Nov-2007 08:25:22 ET
Download
14-Feb-2008 ET
2007 392 1 Security Security_sg_agenda N/A
12-Nov-2007 15:26:22 ET
Download
14-Feb-2008 ET
2007 392 0 Security Security_sg_agenda N/A
11-Nov-2007 23:19:37 ET
Download
14-Feb-2008 ET
2007 391 0 Security Use_case_scenario N/A
15-Nov-2007 13:44:36 ET
Download
14-Feb-2008 ET
2007 390 0 Security Mih_security_tr_use_case_scenarios N/A
05-Nov-2007 21:34:07 ET
Download
14-Feb-2008 ET
2007 386 0 Security 802_21_security_sg_minutes_2007_sept_interim N/A
01-Nov-2007 00:45:40 ET
Download
14-Feb-2008 ET
2007 357 2 Security Mih_security_sg_tr_contribution_instructions N/A
13-Oct-2007 02:43:20 ET
Download
14-Feb-2008 ET
2007 357 1 Security Mih_security_sg_tr_contribution_instructions N/A
01-Oct-2007 10:33:55 ET
Download
14-Feb-2008 ET
2007 357 0 Security Mih_security_sg_tr_contribution_instructions N/A
28-Sep-2007 09:22:39 ET
Download
14-Feb-2008 ET
2007 344 0 Security Security_sg_report N/A
20-Sep-2007 17:14:43 ET
Download
14-Feb-2008 ET
2007 343 1 Security Security_sg_notes N/A
19-Sep-2007 18:54:12 ET
Download
14-Feb-2008 ET
2007 343 0 Security Security_sg_notes N/A
19-Sep-2007 14:21:26 ET
Download
14-Feb-2008 ET
2007 301 1 Security Security_architecture N/A
20-Sep-2007 01:19:18 ET
Download
14-Feb-2008 ET
2007 301 0 Security Security_architecture N/A
14-Sep-2007 16:50:17 ET
Download
14-Feb-2008 ET
2007 299 0 Security Security Sg Scenarios N/A
14-Sep-2007 05:38:04 ET
Download
14-Feb-2008 ET
2007 291 0 Security Hokey Preauth Ps N/A
13-Sep-2007 20:13:34 ET
Download
02-Apr-2008 ET
2008 104 0 Security Minutes of April 2 2008 ad hoc Michael G. Williams (Nokia)
02-Apr-2008 21:25:15 ET
Download
07-Jan-2008 ET
2008 11 0 Security MIH_Services_Security Michael G. Williams (Nokia)
07-Jan-2008 18:11:18 ET
Download
15-May-2008 ET
2008 145 2 Security Security_TR_Issue_List michael glenn williams (nokia)
15-May-2008 14:56:35 ET
Download
03-Apr-2008 ET
2008 12 1 Security MIH_Security_Technical_Report Marc Meylemans (Intel)
03-Apr-2008 17:00:48 ET
Download
09-Jan-2008 ET
2008 12 0 Security MIH_Security_Technical_Report Marc Meylemans (Intel)
09-Jan-2008 00:53:52 ET
Download
02-Jul-2009 ET
2009 60 1 Security TGa_Proposal_Lily_Chen Lily (NIST)
02-Jul-2009 14:56:04 ET
Download
17-May-2011 ET
2011 89 1 Security Resolution for Comment #28 Lily Chen (NIST)
17-May-2011 12:28:11 ET
Download
17-May-2011 ET
2011 89 0 Security Resolution for Comment #28 Lily Chen (NIST)
17-May-2011 11:31:18 ET
Download
16-Mar-2011 ET
2011 26 2 Security Security TLVs Lily Chen (NIST)
16-Mar-2011 21:08:36 ET
Download
11-Mar-2011 ET
2011 26 1 Security Security TLVs Lily Chen (NIST)
11-Mar-2011 14:23:18 ET
Download
08-Mar-2011 ET
2011 27 0 Security Security protection and fragmentation Lily Chen (NIST)
08-Mar-2011 16:52:11 ET
Download
08-Mar-2011 ET
2011 26 0 Security Security TLVs Lily Chen (NIST)
08-Mar-2011 16:51:23 ET
Download
08-Mar-2011 ET
2011 25 0 Security Supported Ciphersuites Lily Chen (NIST)
08-Mar-2011 16:50:25 ET
Download
11-Jan-2011 ET
2011 2 1 Security AES-CCM Mode Lily Chen (NIST)
11-Jan-2011 20:46:18 ET
Download
07-Jan-2011 ET
2011 2 0 Security AES-CCM Mode Lily Chen (NIST)
07-Jan-2011 16:16:43 ET
Download
20-Sep-2010 ET
2010 203 0 Security KDFs in 802.21a Lily Chen (NIST)
20-Sep-2010 14:38:43 ET
Download
17-Aug-2010 ET
2010 170 0 Security Comments on Option ii work item 2 Lily Chen (NIST)
17-Aug-2010 00:39:30 ET
Download
12-Aug-2010 ET
2010 169 0 Security Options for Security IEs Lily Chen (NIST)
12-Aug-2010 14:27:50 ET
Download
15-Jul-2010 ET
2010 153 0 Security Presentation on draft 21a document proposal Lily Chen (NIST)
15-Jul-2010 13:23:51 ET
Download
14-Jul-2010 ET
2010 148 0 Security 21a draft standard proposal Lily Chen (NIST)
14-Jul-2010 17:49:24 ET
Download
14-Jul-2010 ET
2010 124 2 Security Presentation for Work Item 2 Option 1 Lily Chen (NIST)
14-Jul-2010 11:48:03 ET
Download
09-Jul-2010 ET
2010 124 1 Security Presentation for Work Item 2 Option 1 Lily Chen (NIST)
09-Jul-2010 16:13:07 ET
Download
28-Jun-2010 ET
2010 124 0 Security Presentation for Work Item 2 Option 1 Lily Chen (NIST)
28-Jun-2010 16:51:40 ET
Download
28-Jun-2010 ET
2010 84 1 Security Option I for Work Item 2 Lily Chen (NIST)
28-Jun-2010 16:49:41 ET
Download
28-Jun-2010 ET
2010 122 0 Security Meeting Minutes of June 22 Teleconference Lily Chen (NIST)
28-Jun-2010 08:26:02 ET
Download
28-Jun-2010 ET
2010 121 1 Security Meeting Minutes of May 22 Teleconference Lily Chen (NIST)
28-Jun-2010 08:24:33 ET
Download
25-Jun-2010 ET
2010 121 0 Security Meeting Minutes of May 22 Teleconference Lily Chen (NIST)
25-Jun-2010 15:35:00 ET
Download
16-Jun-2010 ET
2010 119 0 Security Minutes of June 15 Teleconference Lily Chen (NIST)
16-Jun-2010 17:06:14 ET
Download
12-May-2010 ET
2010 100 2 Security Issue Summary Lily Chen (NIST)
12-May-2010 06:06:12 ET
Download
12-May-2010 ET
2010 100 1 Security Issue Summary Lily Chen (NIST)
12-May-2010 03:14:06 ET
Download
11-May-2010 ET
2010 100 0 Security Issue Summary Lily Chen (NIST)
11-May-2010 08:03:04 ET
Download
05-May-2010 ET
2010 84 0 Security Option I for Work Item 2 Lily Chen (NIST)
05-May-2010 17:15:17 ET
Download
04-May-2010 ET
2010 83 0 Security May 4 Telecon Minutes Lily Chen (NIST)
04-May-2010 13:57:19 ET
Download
16-Apr-2010 ET
2010 81 0 Security April 15 Telecon Minutes Lily Chen (NIST)
16-Apr-2010 08:44:24 ET
Download
18-Mar-2010 ET
2010 49 3 Security Proposal Summary Lily Chen (NIST)
18-Mar-2010 10:59:22 ET
Download
17-Mar-2010 ET
2010 49 2 Security Proposal Summary Lily Chen (NIST)
17-Mar-2010 09:24:56 ET
Download
12-Mar-2010 ET
2010 49 1 Security Proposal Summary Lily Chen (NIST)
12-Mar-2010 17:14:39 ET
Download
12-Mar-2010 ET
2010 49 0 Security Proposal Summary Lily Chen (NIST)
12-Mar-2010 13:31:44 ET
Download
02-Feb-2010 ET
2010 37 0 Security Key Hierarchy Issues Lily Chen (NIST)
02-Feb-2010 08:51:33 ET
Download
06-Jan-2010 ET
2010 2 0 Security Key Hierarchy Discussion Lily Chen (NIST)
06-Jan-2010 16:49:14 ET
Download
05-Jan-2010 ET
2009 199 3 Security The Role of a Media Independent Authenticator Lily Chen (NIST)
05-Jan-2010 13:09:41 ET
Download
05-Jan-2010 ET
2009 199 2 Security The Role of a Media Independent Authenticator Lily Chen (NIST)
05-Jan-2010 09:38:44 ET
Download
04-Jan-2010 ET
2009 199 1 Security The Role of a Media Independent Authenticator Lily Chen (NIST)
04-Jan-2010 14:26:52 ET
Download
30-Dec-2009 ET
2009 199 0 Security The Role of a Media Independent Authenticator Lily Chen (NIST)
30-Dec-2009 16:16:40 ET
Download
18-Nov-2009 ET
2009 179 1 Security Tentative IEEE 802.21a document structure Lily Chen (NIST)
18-Nov-2009 15:59:17 ET
Download
17-Nov-2009 ET
2009 179 0 Security Tentative IEEE 802.21a document structure Lily Chen (NIST)
17-Nov-2009 14:16:55 ET
Download
29-Oct-2009 ET
2009 165 1 Security Meida specific vs media independent Lily Chen (NIST)
29-Oct-2009 21:08:01 ET
Download
15-Oct-2009 ET
2009 165 0 Security Meida specific vs media independent Lily Chen (NIST)
15-Oct-2009 09:51:24 ET
Download
23-Sep-2009 ET
2009 155 1 Security Initiate an Exercise to Generate a 21a Document Lily Chen (NIST)
23-Sep-2009 18:05:38 ET
Download
23-Sep-2009 ET
2009 155 0 Security Initiate an Exercise to Generate a 21a Document Lily Chen (NIST)
23-Sep-2009 16:13:55 ET
Download
23-Sep-2009 ET
2009 148 2 Security A Study on IEEE 802.11r Approach Lily Chen (NIST)
23-Sep-2009 16:09:54 ET
Download