Created (ET) |
Year |
DCN |
Rev |
Group |
Title |
Author (Affiliation) ▼ |
Uploaded (ET) |
Actions |
18-Sep-2009 ET |
2009 |
148 |
1 |
Security |
A Study on IEEE 802.11r Approach |
Lily Chen (NIST) |
18-Sep-2009 15:28:56 ET |
Download |
18-Sep-2009 ET |
2009 |
148 |
0 |
Security |
A Study on IEEE 802.11r Approach |
Lily Chen (NIST) |
18-Sep-2009 15:27:17 ET |
Download |
02-Jul-2009 ET |
2009 |
60 |
2 |
Security |
TGa_Proposal_Lily_Chen |
Lily Chen (NIST) |
02-Jul-2009 14:58:28 ET |
Download |
13-May-2009 ET |
2009 |
85 |
0 |
Security |
Observations on 802.21a proposals |
Lily Chen (NIST) |
13-May-2009 15:08:56 ET |
Download |
10-Sep-2008 ET |
2008 |
253 |
1 |
Security |
A Study on 3GPP and 3GPP-WLAN Interworking |
Lily Chen (NIST) |
10-Sep-2008 14:50:44 ET |
Download |
04-Sep-2008 ET |
2008 |
253 |
0 |
Security |
A Study on 3GPP and 3GPP-WLAN Interworking |
Lily Chen (NIST) |
04-Sep-2008 18:35:54 ET |
Download |
11-Jul-2008 ET |
2008 |
181 |
2 |
Security |
MIH Security Use Case |
Lily Chen (NIST) |
11-Jul-2008 14:52:06 ET |
Download |
19-Jun-2008 ET |
2008 |
181 |
1 |
Security |
MIH Security Use Case |
Lily Chen (NIST) |
19-Jun-2008 08:45:56 ET |
Download |
16-Jun-2008 ET |
2008 |
181 |
0 |
Security |
MIH Security Use Case |
Lily Chen (NIST) |
16-Jun-2008 10:18:58 ET |
Download |
02-Jun-2008 ET |
2008 |
170 |
0 |
Security |
MIH Security Use Cases |
Lily Chen (NIST) |
02-Jun-2008 11:17:59 ET |
Download |
15-May-2008 ET |
2008 |
151 |
2 |
Security |
MIH Security Use Case Discussion |
Lily Chen (NIST) |
15-May-2008 18:17:03 ET |
Download |
15-May-2008 ET |
2008 |
151 |
1 |
Security |
MIH Security Use Case Discussion |
Lily Chen (NIST) |
15-May-2008 15:41:20 ET |
Download |
15-May-2008 ET |
2008 |
151 |
0 |
Security |
MIH Security Use Case Discussion |
Lily Chen (NIST) |
15-May-2008 14:32:43 ET |
Download |
12-May-2008 ET |
2008 |
129 |
1 |
Security |
MIH Security - Use Case Issue Discussions |
Lily Chen (NIST) |
12-May-2008 09:36:28 ET |
Download |
12-May-2008 ET |
2008 |
130 |
0 |
Security |
MIH Security Use Case Samples |
Lily Chen (NIST) |
12-May-2008 09:35:30 ET |
Download |
30-Apr-2008 ET |
2008 |
121 |
0 |
Security |
MIH Security Use Case Discussion Topics |
Lily Chen (NIST) |
30-Apr-2008 08:27:58 ET |
Download |
12-May-2008 ET |
2008 |
129 |
0 |
Security |
MIH Security - Use Case Issue Discussions |
Lily Chen |
12-May-2008 09:33:43 ET |
Download |
07-Jul-2009 ET |
2009 |
107 |
0 |
Security |
TGa_Proposal_Sumanta_Saha_Dmitrij |
Helsinki University of Technology |
07-Jul-2009 11:18:44 ET |
Download |
15-Dec-2009 ET |
2009 |
197 |
0 |
Security |
Security TG Nov 2009 minutes |
H Anthony Chan (Huawei Technologies) |
15-Dec-2009 12:34:27 ET |
Download |
18-Nov-2009 ET |
2009 |
184 |
0 |
Security |
Security TG September Interim minutes |
H Anthony Chan (Huawei Technologies) |
18-Nov-2009 14:39:49 ET |
Download |
11-Mar-2009 ET |
2009 |
42 |
2 |
Security |
March Meeting Minutes |
H Anthony Chan (Huawei Technologies) |
11-Mar-2009 20:47:03 ET |
Download |
13-Nov-2008 ET |
2008 |
301 |
2 |
Security |
Security SG Nov meeting minutes |
H Anthony Chan (Huawei Technologies) |
13-Nov-2008 10:23:02 ET |
Download |
12-Nov-2008 ET |
2008 |
301 |
1 |
Security |
Security SG Nov meeting minutes |
H Anthony Chan (Huawei Technologies) |
12-Nov-2008 11:30:41 ET |
Download |
24-Oct-2008 ET |
2008 |
286 |
0 |
Security |
Security SG Oct 23 teleconference minutes |
H Anthony Chan (Huawei Technologies) |
24-Oct-2008 11:22:31 ET |
Download |
11-Nov-2008 ET |
2008 |
301 |
0 |
Security |
Security SG Nov meeting minutes |
H |
11-Nov-2008 11:17:06 ET |
Download |
13-Sep-2009 ET |
2009 |
104 |
2 |
Security |
TGa_Proposal_Rafa_Marin |
Fernando Pereniguez (University of Murcia) |
13-Sep-2009 13:23:25 ET |
Download |
10-Mar-2009 ET |
2009 |
40 |
0 |
Security |
key distribution for fast access |
Fernando Garcia (Univ. of Murcia) |
10-Mar-2009 01:45:33 ET |
Download |
28-Sep-2010 ET |
2010 |
204 |
0 |
Security |
Option III: EAP to conduct service authentication and MIH packet protection: FLAGS and MIHS. |
Fernando Bernal(UMU), Rafa Marin-Lopez(UMU) |
28-Sep-2010 08:49:05 ET |
Download |
17-Oct-2011 ET |
2011 |
165 |
1 |
Security |
ERP proposal draft modifications |
Fernando Bernal (UMU), Rafa Marin-Lopez(UMU) |
17-Oct-2011 12:15:51 ET |
Download |
13-Oct-2011 ET |
2011 |
164 |
3 |
Security |
ERP proposal |
Fernando Bernal (UMU), Rafa Marin-Lopez(UMU) |
13-Oct-2011 11:58:35 ET |
Download |
12-Oct-2011 ET |
2011 |
164 |
2 |
Security |
ERP proposal |
Fernando Bernal (UMU), Rafa Marin-Lopez(UMU) |
12-Oct-2011 05:09:27 ET |
Download |
05-Oct-2011 ET |
2011 |
164 |
1 |
Security |
ERP proposal |
Fernando Bernal (UMU), Rafa Marin-Lopez(UMU) |
05-Oct-2011 12:51:13 ET |
Download |
28-Sep-2011 ET |
2011 |
165 |
0 |
Security |
ERP proposal draft modifications |
Fernando Bernal (UMU), Rafa Marin-Lopez(UMU) |
28-Sep-2011 08:39:18 ET |
Download |
28-Sep-2011 ET |
2011 |
164 |
0 |
Security |
ERP proposal |
Fernando Bernal (UMU), Rafa Marin-Lopez(UMU) |
28-Sep-2011 08:36:55 ET |
Download |
15-Mar-2011 ET |
2011 |
44 |
0 |
Security |
Sequence Number |
Fernando Bernal (UMU), Rafa Marin-Lopez(UMU) |
15-Mar-2011 12:20:53 ET |
Download |
01-Mar-2011 ET |
2011 |
22 |
0 |
Security |
Message Flows |
Fernando Bernal (UMU), Rafa Marin-Lopez(UMU) |
01-Mar-2011 07:19:31 ET |
Download |
22-Dec-2010 ET |
2010 |
255 |
0 |
Security |
LB comments |
Fernando Bernal (UMU), Rafa Marin-Lopez(UMU) |
22-Dec-2010 06:59:44 ET |
Download |
10-Nov-2010 ET |
2010 |
209 |
1 |
Security |
Option III Draft updates |
Fernando Bernal (UMU), Rafa Marin-Lopez(UMU) |
10-Nov-2010 06:33:47 ET |
Download |
05-Nov-2010 ET |
2010 |
209 |
0 |
Security |
Option III Draft updates |
Fernando Bernal (UMU), Rafa Marin-Lopez(UMU) |
05-Nov-2010 08:34:51 ET |
Download |
02-Nov-2010 ET |
2010 |
207 |
0 |
Security |
Option III: EAP to conduct service authentication and MIH packet protection: ISSUES |
Fernando Bernal (UMU), Rafa Marin-Lopez(UMU) |
02-Nov-2010 08:55:39 ET |
Download |
02-Nov-2010 ET |
2010 |
78 |
8 |
Security |
Option III: EAP over MIH service authentication |
Fernando Bernal (UMU), Rafa Marin-Lopez(UMU) |
02-Nov-2010 08:52:55 ET |
Download |
15-Sep-2010 ET |
2010 |
78 |
7 |
Security |
Option III: EAP over MIH service authentication |
Fernando Bernal (UMU), Rafa Marin-Lopez(UMU) |
15-Sep-2010 17:50:26 ET |
Download |
13-Sep-2010 ET |
2010 |
78 |
6 |
Security |
Option III: EAP over MIH service authentication |
Fernando Bernal (UMU), Rafa Marin-Lopez(UMU) |
13-Sep-2010 19:29:21 ET |
Download |
13-Sep-2010 ET |
2010 |
78 |
5 |
Security |
Option III: EAP over MIH service authentication |
Fernando Bernal (UMU), Rafa Marin-Lopez(UMU) |
13-Sep-2010 15:09:25 ET |
Download |
09-Sep-2010 ET |
2010 |
78 |
4 |
Security |
Option III: EAP over MIH service authentication |
Fernando Bernal (UMU), Rafa Marin-Lopez(UMU) |
09-Sep-2010 12:31:16 ET |
Download |
23-Aug-2010 ET |
2010 |
78 |
3 |
Security |
Option III: EAP over MIH service authentication |
Fernando Bernal (UMU), Rafa Marin-Lopez(UMU) |
23-Aug-2010 13:40:44 ET |
Download |
28-Jun-2010 ET |
2010 |
78 |
2 |
Security |
Option III: EAP over MIH service authentication |
Fernando Bernal (UMU), Rafa Marin-Lopez(UMU) |
28-Jun-2010 17:11:16 ET |
Download |
22-Jun-2010 ET |
2010 |
78 |
1 |
Security |
Option III: EAP over MIH service authentication |
Fernando Bernal (UMU), Rafa Marin-Lopez(UMU) |
22-Jun-2010 08:32:42 ET |
Download |
15-Apr-2010 ET |
2010 |
78 |
0 |
Security |
Option III: EAP over MIH service authentication |
Fernando Bernal (UMU), Rafa Marin-Lopez(UMU) |
15-Apr-2010 08:05:58 ET |
Download |
31-Aug-2010 ET |
2010 |
120 |
3 |
Security |
Option III presentation |
Fernando Bernal, Rafa Marin-Lopez |
31-Aug-2010 07:22:37 ET |
Download |
14-Jul-2010 ET |
2010 |
120 |
2 |
Security |
Option III presentation |
Fernando Bernal, Rafa Marin-Lopez |
14-Jul-2010 10:53:17 ET |
Download |
28-Jun-2010 ET |
2010 |
120 |
1 |
Security |
Option III presentation |
Fernando Bernal, Rafa Marin-Lopez |
28-Jun-2010 17:05:19 ET |
Download |
22-Jun-2010 ET |
2010 |
120 |
0 |
Security |
Option III presentation |
Fernando Bernal, Rafa Marin-Lopez |
22-Jun-2010 08:38:33 ET |
Download |
12-Jan-2010 ET |
2009 |
164 |
7 |
Security |
Detailed analysis on MIA/MSA architecture |
F. Bernal (UMU), R. Marin-Lopez(UMU) |
12-Jan-2010 18:02:43 ET |
Download |
05-Jan-2010 ET |
2009 |
164 |
6 |
Security |
Detailed analysis on MIA/MSA architecture |
F. Bernal (UMU), R. Marin-Lopez(UMU) |
05-Jan-2010 09:50:36 ET |
Download |
05-Jan-2010 ET |
2009 |
164 |
5 |
Security |
Detailed analysis on MIA/MSA architecture |
F. Bernal (UMU), R. Marin-Lopez(UMU) |
05-Jan-2010 09:15:16 ET |
Download |
31-Dec-2009 ET |
2009 |
164 |
4 |
Security |
Detailed analysis on MIA/MSA architecture |
F. Bernal (UMU), R. Marin-Lopez(UMU) |
31-Dec-2009 04:54:54 ET |
Download |
17-Nov-2009 ET |
2009 |
164 |
3 |
Security |
Detailed analysis on MIA/MSA architecture |
F. Bernal (UMU), R. Marin-Lopez(UMU) |
17-Nov-2009 10:17:35 ET |
Download |
13-Nov-2009 ET |
2009 |
164 |
2 |
Security |
Detailed analysis on MIA/MSA architecture |
F. Bernal (UMU), R. Marin-Lopez(UMU) |
13-Nov-2009 14:02:13 ET |
Download |
18-May-2011 ET |
2011 |
77 |
1 |
Security |
PICS Proforma |
David Cypher (NIST), Lily Chen (NIST), Yoshihiro Ohba (Toshiba) |
18-May-2011 17:02:03 ET |
Download |
13-May-2011 ET |
2011 |
77 |
0 |
Security |
PICS Proforma |
David Cypher (NIST) |
13-May-2011 11:13:31 ET |
Download |
14-Sep-2010 ET |
2010 |
123 |
2 |
Security |
option-A-for-work-item-I |
Dapeng Liu(China Mobile) |
14-Sep-2010 23:15:56 ET |
Download |
06-Sep-2010 ET |
2010 |
123 |
1 |
Security |
option-A-for-work-item-I |
Dapeng Liu(China Mobile) |
06-Sep-2010 13:54:27 ET |
Download |
28-Jun-2010 ET |
2010 |
123 |
0 |
Security |
option-A-for-work-item-I |
Dapeng Liu(China Mobile) |
28-Jun-2010 09:33:52 ET |
Download |
04-May-2010 ET |
2010 |
82 |
0 |
Security |
Proactive Authentication Through EAP (MSA is the authenticator) |
Dapeng Liu(China Mobile) |
04-May-2010 09:04:57 ET |
Download |
13-Nov-2009 ET |
2009 |
169 |
0 |
Security |
comments on the proposals |
Dapeng Liu (China Mobile) |
13-Nov-2009 14:56:11 ET |
Download |
05-Jul-2009 ET |
2009 |
103 |
0 |
Security |
TGa_Proposal_Dapeng_Liu |
Dapeng Liu (China Mobile) |
05-Jul-2009 11:09:53 ET |
Download |
03-May-2009 ET |
2009 |
63 |
0 |
Security |
TGa_Proposal_Dapeng_Liu |
Da-peng Liu (China Mobile) |
03-May-2009 13:25:51 ET |
Download |
13-Nov-2009 ET |
2009 |
170 |
0 |
Security |
Candidate authenticator discovery mechanism |
Dapeng Liu |
13-Nov-2009 16:35:58 ET |
Download |
15-Apr-2010 ET |
2010 |
80 |
1 |
Security |
21-10-0000-00-0-sec-tga-proactive-authentication-option-A |
Dapeng(China Mobile) |
15-Apr-2010 21:21:13 ET |
Download |
15-Apr-2010 ET |
2010 |
80 |
0 |
Security |
21-10-0000-00-0-sec-tga-proactive-authentication-option-A |
Dapeng |
15-Apr-2010 21:15:26 ET |
Download |
02-May-2011 ET |
2011 |
68 |
0 |
Security |
Clause 9 |
Clause 9 |
17-May-2011 19:22:42 ET |
Download |
02-Jul-2009 ET |
2009 |
59 |
1 |
Security |
TGa_Proposal_Antonio_Izquierdo |
Antonio Izquierdo, NIST |
02-Jul-2009 14:14:20 ET |
Download |
25-Feb-2009 ET |
2009 |
31 |
0 |
Security |
security Feb 25 teleconf minutes |
Anthony Chan (Huawei Technologies) |
25-Feb-2009 12:42:59 ET |
Download |
23-Feb-2009 ET |
2009 |
29 |
1 |
Security |
security Feb 11 teleconf minutes |
Anthony Chan (Huawei Technologies) |
23-Feb-2009 14:06:34 ET |
Download |
17-Feb-2009 ET |
2009 |
29 |
0 |
Security |
security Feb 11 teleconf minutes |
Anthony Chan (Huawei Technologies) |
17-Feb-2009 18:48:58 ET |
Download |
19-Aug-2009 ET |
2009 |
137 |
0 |
Security |
Security proposal comments clarification |
Anirudh Bhatt (Samsung) |
19-Aug-2009 09:00:28 ET |
Download |
05-Jul-2009 ET |
2009 |
105 |
0 |
Security |
TGa_Proposal_Samsung |
Anirudh Bhatt (Samsung) |
06-Jul-2009 03:52:37 ET |
Download |
22-Jan-2009 ET |
2009 |
24 |
0 |
Security |
January Meeting Minutes |
Alice Cheng (Telcordia) |
22-Jan-2009 11:27:05 ET |
Download |
13-Nov-2008 ET |
2008 |
292 |
2 |
Security |
CR for Security TR |
Ajay Rajkumar (Alcatel-Lucent) |
13-Nov-2008 09:59:50 ET |
Download |