Created (ET) ▲ |
Year |
DCN |
Rev |
Group |
Title |
Author (Affiliation) |
Uploaded (ET) |
Actions |
07-Jan-2008 ET |
2008 |
6 |
0 |
Security |
802_21_Security_PAR |
Yoshihiro Ohba (Toshiba) |
07-Jan-2008 07:56:31 ET |
Download |
07-Jan-2008 ET |
2008 |
7 |
0 |
Security |
802_21_Security_5C |
Yoshihiro Ohba (Toshiba) |
07-Jan-2008 08:07:54 ET |
Download |
07-Jan-2008 ET |
2008 |
11 |
0 |
Security |
MIH_Services_Security |
Michael G. Williams (Nokia) |
07-Jan-2008 18:11:18 ET |
Download |
09-Jan-2008 ET |
2008 |
12 |
0 |
Security |
MIH_Security_Technical_Report |
Marc Meylemans (Intel) |
09-Jan-2008 00:53:52 ET |
Download |
10-Jan-2008 ET |
2008 |
7 |
1 |
Security |
802_21_Security_5C |
Yoshihiro Ohba (Toshiba) |
10-Jan-2008 11:43:44 ET |
Download |
13-Jan-2008 ET |
2008 |
25 |
0 |
Security |
security_sg_minutes_2007_nov |
Yoshihiro Ohba (Toshiba) |
13-Jan-2008 17:33:55 ET |
Download |
13-Jan-2008 ET |
2008 |
25 |
1 |
Security |
security_sg_minutes_2007_nov |
Yoshihiro Ohba (Toshiba) |
13-Jan-2008 17:44:10 ET |
Download |
13-Jan-2008 ET |
2008 |
6 |
1 |
Security |
802_21_Security_PAR |
Yoshihiro Ohba (Toshiba) |
13-Jan-2008 19:17:15 ET |
Download |
15-Jan-2008 ET |
2008 |
6 |
2 |
Security |
802_21_Security_PAR |
Yoshihiro Ohba (Toshiba) |
15-Jan-2008 09:26:55 ET |
Download |
15-Jan-2008 ET |
2008 |
33 |
0 |
Security |
security_sg_opening_notes |
Yoshihiro Ohba (Toshiba) |
15-Jan-2008 19:48:08 ET |
Download |
15-Jan-2008 ET |
2008 |
34 |
0 |
Security |
security_sg_agenda |
Yoshihiro Ohba (Toshiba) |
15-Jan-2008 19:52:51 ET |
Download |
15-Jan-2008 ET |
2008 |
35 |
0 |
Security |
802_af_overview |
Yoshihiro Ohba (Toshiba) |
15-Jan-2008 20:46:01 ET |
Download |
15-Jan-2008 ET |
2008 |
6 |
3 |
Security |
802_21_Security_PAR |
Yoshihiro Ohba (Toshiba) |
15-Jan-2008 22:28:31 ET |
Download |
16-Jan-2008 ET |
2008 |
6 |
4 |
Security |
802_21_Security_PAR |
Yoshihiro Ohba (Toshiba) |
16-Jan-2008 20:13:00 ET |
Download |
17-Jan-2008 ET |
2008 |
6 |
5 |
Security |
802_21_Security_PAR |
Yoshihiro Ohba (Toshiba) |
17-Jan-2008 01:10:44 ET |
Download |
17-Jan-2008 ET |
2008 |
6 |
6 |
Security |
802_21_Security_PAR |
Yoshihiro Ohba (Toshiba) |
17-Jan-2008 04:42:58 ET |
Download |
17-Jan-2008 ET |
2008 |
44 |
0 |
Security |
security_sg_closing_notes |
Yoshihiro Ohba (Toshiba) |
17-Jan-2008 04:45:44 ET |
Download |
30-Jan-2008 ET |
2008 |
49 |
0 |
Security |
Januaray Meeting Minutes |
Y. Cheng (Telcordia) |
11-Feb-2008 06:30:23 ET |
Download |
10-Feb-2008 ET |
2008 |
54 |
0 |
Security |
mih-level-security-considerations |
Yoshihiro Ohba (Toshiba) |
10-Feb-2008 20:09:46 ET |
Download |
14-Feb-2008 ET |
2007 |
291 |
0 |
Security |
Hokey Preauth Ps |
N/A |
13-Sep-2007 20:13:34 ET |
Download |
14-Feb-2008 ET |
2007 |
301 |
1 |
Security |
Security_architecture |
N/A |
20-Sep-2007 01:19:18 ET |
Download |
14-Feb-2008 ET |
2007 |
301 |
0 |
Security |
Security_architecture |
N/A |
14-Sep-2007 16:50:17 ET |
Download |
14-Feb-2008 ET |
2007 |
299 |
0 |
Security |
Security Sg Scenarios |
N/A |
14-Sep-2007 05:38:04 ET |
Download |
14-Feb-2008 ET |
2007 |
344 |
0 |
Security |
Security_sg_report |
N/A |
20-Sep-2007 17:14:43 ET |
Download |
14-Feb-2008 ET |
2007 |
343 |
1 |
Security |
Security_sg_notes |
N/A |
19-Sep-2007 18:54:12 ET |
Download |
14-Feb-2008 ET |
2007 |
343 |
0 |
Security |
Security_sg_notes |
N/A |
19-Sep-2007 14:21:26 ET |
Download |
14-Feb-2008 ET |
2007 |
357 |
2 |
Security |
Mih_security_sg_tr_contribution_instructions |
N/A |
13-Oct-2007 02:43:20 ET |
Download |
14-Feb-2008 ET |
2007 |
357 |
1 |
Security |
Mih_security_sg_tr_contribution_instructions |
N/A |
01-Oct-2007 10:33:55 ET |
Download |
14-Feb-2008 ET |
2007 |
357 |
0 |
Security |
Mih_security_sg_tr_contribution_instructions |
N/A |
28-Sep-2007 09:22:39 ET |
Download |
14-Feb-2008 ET |
2007 |
386 |
0 |
Security |
802_21_security_sg_minutes_2007_sept_interim |
N/A |
01-Nov-2007 00:45:40 ET |
Download |
14-Feb-2008 ET |
2007 |
391 |
0 |
Security |
Use_case_scenario |
N/A |
15-Nov-2007 13:44:36 ET |
Download |
14-Feb-2008 ET |
2007 |
390 |
0 |
Security |
Mih_security_tr_use_case_scenarios |
N/A |
05-Nov-2007 21:34:07 ET |
Download |
14-Feb-2008 ET |
2007 |
392 |
2 |
Security |
Security_sg_agenda |
N/A |
13-Nov-2007 08:25:22 ET |
Download |
14-Feb-2008 ET |
2007 |
392 |
1 |
Security |
Security_sg_agenda |
N/A |
12-Nov-2007 15:26:22 ET |
Download |
14-Feb-2008 ET |
2007 |
392 |
0 |
Security |
Security_sg_agenda |
N/A |
11-Nov-2007 23:19:37 ET |
Download |
14-Feb-2008 ET |
2007 |
393 |
0 |
Security |
Security_sg_notes |
N/A |
11-Nov-2007 23:19:37 ET |
Download |
14-Feb-2008 ET |
2007 |
392 |
3 |
Security |
Security_sg_agenda |
N/A |
14-Nov-2007 13:09:22 ET |
Download |
14-Feb-2008 ET |
2007 |
398 |
0 |
Security |
Ssg_5c_discussion |
N/A |
15-Nov-2007 13:46:38 ET |
Download |
14-Feb-2008 ET |
2007 |
402 |
2 |
Security |
Mih_key_hierarchy_v2 |
N/A |
09-Nov-2007 13:10:30 ET |
Download |
14-Feb-2008 ET |
2007 |
402 |
0 |
Security |
Mih_key_hierarchy_v2 |
N/A |
05-Nov-2007 19:59:38 ET |
Download |
14-Feb-2008 ET |
2007 |
399 |
0 |
Security |
Ssg_closing_notes |
N/A |
15-Nov-2007 13:46:38 ET |
Download |
14-Feb-2008 ET |
2007 |
404 |
0 |
Security |
Nov06_teleconference_minutes |
N/A |
06-Nov-2007 23:25:25 ET |
Download |
14-Feb-2008 ET |
2007 |
435 |
0 |
Security |
Secure_handover_with_qos |
N/A |
14-Nov-2007 20:17:38 ET |
Download |
14-Feb-2008 ET |
2007 |
448 |
0 |
Security |
Jan2007_security_sg_tr_contribution_instructions |
N/A |
10-Dec-2007 19:19:35 ET |
Download |
14-Feb-2008 ET |
2007 |
446 |
0 |
Security |
Securty_sg_report |
N/A |
20-Nov-2007 20:10:20 ET |
Download |
14-Feb-2008 ET |
2007 |
463 |
0 |
Security |
Mih_protocol_security |
N/A |
25-Dec-2007 23:10:54 ET |
Download |
14-Feb-2008 ET |
2007 |
461 |
0 |
Security |
Dec13_teleconference_minutes |
N/A |
18-Dec-2007 14:40:02 ET |
Download |
15-Mar-2008 ET |
2008 |
70 |
0 |
Security |
Security SG Agenda |
Yoshihiro Ohba (Toshiba) |
15-Mar-2008 15:24:12 ET |
Download |
16-Mar-2008 ET |
2008 |
54 |
1 |
Security |
mih-level-security-considerations |
Yoshihiro Ohba (Toshiba) |
16-Mar-2008 22:50:32 ET |
Download |
16-Mar-2008 ET |
2008 |
70 |
1 |
Security |
Security SG Agenda |
Yoshihiro Ohba (Toshiba) |
16-Mar-2008 22:59:53 ET |
Download |
17-Mar-2008 ET |
2008 |
80 |
0 |
Security |
security signaling during handovers tutorial |
Yoshihiro Ohba (Toshiba) |
17-Mar-2008 15:43:42 ET |
Download |
17-Mar-2008 ET |
2008 |
80 |
1 |
Security |
security signaling during handovers tutorial |
Yoshihiro Ohba (Toshiba) |
17-Mar-2008 21:17:18 ET |
Download |
17-Mar-2008 ET |
2008 |
70 |
2 |
Security |
Security SG Agenda |
Yoshihiro Ohba (Toshiba) |
18-Mar-2008 04:59:14 ET |
Download |
18-Mar-2008 ET |
2008 |
82 |
0 |
Security |
security sg opening notes |
Yoshihiro Ohba (Toshiba) |
18-Mar-2008 05:00:23 ET |
Download |
18-Mar-2008 ET |
2008 |
83 |
0 |
Security |
802_1_Joint_Meeting |
Yoshihiro Ohba (Toshiba) |
18-Mar-2008 15:42:04 ET |
Download |
18-Mar-2008 ET |
2008 |
80 |
2 |
Security |
security signaling during handovers tutorial |
Yoshihiro Ohba (Toshiba) |
18-Mar-2008 19:39:42 ET |
Download |
20-Mar-2008 ET |
2008 |
95 |
0 |
Security |
MIH Security |
Subir Das (Telcordia) |
20-Mar-2008 12:28:44 ET |
Download |
20-Mar-2008 ET |
2008 |
70 |
3 |
Security |
Security SG Agenda |
Yoshihiro Ohba (Toshiba) |
20-Mar-2008 12:43:30 ET |
Download |
20-Mar-2008 ET |
2008 |
99 |
0 |
Security |
ssg closing notes |
Yoshihiro Ohba (Toshiba) |
20-Mar-2008 17:11:15 ET |
Download |
24-Mar-2008 ET |
2008 |
99 |
1 |
Security |
ssg closing notes |
Yoshihiro Ohba (Toshiba) |
24-Mar-2008 10:29:01 ET |
Download |
02-Apr-2008 ET |
2008 |
102 |
0 |
Security |
Common Use Cases and Threats |
Shubhranshu, Marc and Subir |
02-Apr-2008 09:45:22 ET |
Download |
02-Apr-2008 ET |
2008 |
99 |
2 |
Security |
ssg closing notes |
Yoshihiro Ohba (Toshiba) |
02-Apr-2008 18:49:53 ET |
Download |
02-Apr-2008 ET |
2008 |
104 |
0 |
Security |
Minutes of April 2 2008 ad hoc |
Michael G. Williams (Nokia) |
02-Apr-2008 21:25:15 ET |
Download |
03-Apr-2008 ET |
2008 |
105 |
0 |
Security |
March Meeting Minutes |
Y. Cheng (Telcordia) |
03-Apr-2008 09:48:29 ET |
Download |
03-Apr-2008 ET |
2008 |
12 |
1 |
Security |
MIH_Security_Technical_Report |
Marc Meylemans (Intel) |
03-Apr-2008 17:00:48 ET |
Download |
14-Apr-2008 ET |
2008 |
106 |
0 |
Security |
Threats: assumtion and use cases |
Subir, Shubhranshu. Marc |
16-Apr-2008 09:39:20 ET |
Download |
16-Apr-2008 ET |
2008 |
107 |
0 |
Security |
Threat Modeling and analysis for MIH Protocol Security |
Rahul, Shubhranshu, and et al... |
16-Apr-2008 09:53:20 ET |
Download |
17-Apr-2008 ET |
2008 |
108 |
0 |
Security |
April 16 Telconf Minutes |
Y. Cheng (Telcordia Technologies) |
17-Apr-2008 10:19:15 ET |
Download |
29-Apr-2008 ET |
2008 |
6 |
7 |
Security |
802_21_Security_PAR |
Yoshihiro Ohba (Toshiba) |
29-Apr-2008 18:46:41 ET |
Download |
30-Apr-2008 ET |
2008 |
121 |
0 |
Security |
MIH Security Use Case Discussion Topics |
Lily Chen (NIST) |
30-Apr-2008 08:27:58 ET |
Download |
02-May-2008 ET |
2008 |
122 |
0 |
Security |
April 30 Teleconference Minutes |
Y. Cheng (Telcordia) |
02-May-2008 10:13:43 ET |
Download |
06-May-2008 ET |
2008 |
125 |
0 |
Security |
Security_SG_Aganda |
yohba@tari.toshiba.com |
06-May-2008 11:24:27 ET |
Download |
06-May-2008 ET |
2008 |
6 |
8 |
Security |
802_21_Security_PAR |
Yoshihiro Ohba (Toshiba) |
06-May-2008 11:23:13 ET |
Download |
12-May-2008 ET |
2008 |
129 |
0 |
Security |
MIH Security - Use Case Issue Discussions |
Lily Chen |
12-May-2008 09:33:43 ET |
Download |
12-May-2008 ET |
2008 |
130 |
0 |
Security |
MIH Security Use Case Samples |
Lily Chen (NIST) |
12-May-2008 09:35:30 ET |
Download |
12-May-2008 ET |
2008 |
129 |
1 |
Security |
MIH Security - Use Case Issue Discussions |
Lily Chen (NIST) |
12-May-2008 09:36:28 ET |
Download |
12-May-2008 ET |
2008 |
134 |
0 |
Security |
Security_SG_Opeining_Notes |
Yoshihiro Ohba (Toshiba) |
13-May-2008 01:06:57 ET |
Download |
13-May-2008 ET |
2008 |
141 |
0 |
Security |
Change_Request_for_TR |
Shubhranshu (Samsung) |
13-May-2008 10:27:41 ET |
Download |
13-May-2008 ET |
2008 |
125 |
1 |
Security |
Security_SG_Aganda |
yohba@tari.toshiba.com |
13-May-2008 10:33:50 ET |
Download |
14-May-2008 ET |
2008 |
145 |
0 |
Security |
Security_TR_Issue_List |
Yoshihiro Ohba (Toshiba) |
14-May-2008 10:59:46 ET |
Download |
14-May-2008 ET |
2008 |
125 |
2 |
Security |
Security_SG_Aganda |
yohba@tari.toshiba.com |
14-May-2008 11:07:12 ET |
Download |
14-May-2008 ET |
2008 |
145 |
1 |
Security |
Security_TR_Issue_List |
Yoshihiro Ohba (Toshiba) |
14-May-2008 11:41:23 ET |
Download |
15-May-2008 ET |
2008 |
151 |
0 |
Security |
MIH Security Use Case Discussion |
Lily Chen (NIST) |
15-May-2008 14:32:43 ET |
Download |
15-May-2008 ET |
2008 |
145 |
2 |
Security |
Security_TR_Issue_List |
michael glenn williams (nokia) |
15-May-2008 14:56:35 ET |
Download |
15-May-2008 ET |
2008 |
151 |
1 |
Security |
MIH Security Use Case Discussion |
Lily Chen (NIST) |
15-May-2008 15:41:20 ET |
Download |
15-May-2008 ET |
2008 |
151 |
2 |
Security |
MIH Security Use Case Discussion |
Lily Chen (NIST) |
15-May-2008 18:17:03 ET |
Download |
15-May-2008 ET |
2008 |
145 |
3 |
Security |
Security_TR_Issue_List |
Yoshihiro Ohba (Toshiba) |
15-May-2008 23:12:08 ET |
Download |
16-May-2008 ET |
2008 |
155 |
0 |
Security |
Security_SG_Meeting_Report_May_2008 |
Yoshihiro Ohba (Toshiba) |
16-May-2008 01:07:35 ET |
Download |
02-Jun-2008 ET |
2008 |
170 |
0 |
Security |
MIH Security Use Cases |
Lily Chen (NIST) |
02-Jun-2008 11:17:59 ET |
Download |
02-Jun-2008 ET |
2008 |
172 |
0 |
Security |
21-08-0012-02-0sec-mih-security-technical-report |
Shubhranshu (Samsung) |
02-Jun-2008 14:44:04 ET |
Download |
02-Jun-2008 ET |
2008 |
173 |
0 |
Security |
May Meeting Minutes |
Y. Cheng (Telcordia) |
02-Jun-2008 17:54:11 ET |
Download |
05-Jun-2008 ET |
2008 |
107 |
1 |
Security |
Threat Modeling and analysis for MIH Protocol Security |
Shubhranshu (Samsung) |
05-Jun-2008 07:03:06 ET |
Download |
05-Jun-2008 ET |
2008 |
175 |
0 |
Security |
June 5 Teleconference Minutes |
Y. Cheng (Telcordia) |
05-Jun-2008 13:46:12 ET |
Download |
05-Jun-2008 ET |
2008 |
145 |
4 |
Security |
Security_TR_Issue_List |
Yoshihiro Ohba (Toshiba) |
05-Jun-2008 18:43:49 ET |
Download |
13-Jun-2008 ET |
2008 |
178 |
0 |
Security |
PAR for Security Extensions |
Vivek Gupta (Intel Corporation) |
13-Jun-2008 12:50:28 ET |
Download |
13-Jun-2008 ET |
2008 |
178 |
1 |
Security |
PAR for Security Extensions |
Vivek Gupta (Intel Corporation) |
13-Jun-2008 16:58:18 ET |
Download |
13-Jun-2008 ET |
2008 |
6 |
9 |
Security |
802_21_Security_PAR |
Yoshihiro Ohba (Toshiba) |
13-Jun-2008 14:52:32 ET |
Download |
16-Jun-2008 ET |
2008 |
181 |
0 |
Security |
MIH Security Use Case |
Lily Chen (NIST) |
16-Jun-2008 10:18:58 ET |
Download |
18-Jun-2008 ET |
2008 |
107 |
2 |
Security |
Threat Modeling and analysis for MIH Protocol Security |
Shubhranshu (Samsung) |
18-Jun-2008 05:26:58 ET |
Download |
18-Jun-2008 ET |
2008 |
183 |
0 |
Security |
Comments_on_21_08_0181 |
Yoshihiro Ohba (Toshiba) |
18-Jun-2008 17:17:45 ET |
Download |