Created (ET) |
Year |
DCN |
Rev |
Group |
Title |
Author (Affiliation) ▲ |
Uploaded (ET) |
Actions |
13-Nov-2008 ET |
2008 |
292 |
2 |
Security |
CR for Security TR |
Ajay Rajkumar (Alcatel-Lucent) |
13-Nov-2008 09:59:50 ET |
Download |
22-Jan-2009 ET |
2009 |
24 |
0 |
Security |
January Meeting Minutes |
Alice Cheng (Telcordia) |
22-Jan-2009 11:27:05 ET |
Download |
19-Aug-2009 ET |
2009 |
137 |
0 |
Security |
Security proposal comments clarification |
Anirudh Bhatt (Samsung) |
19-Aug-2009 09:00:28 ET |
Download |
05-Jul-2009 ET |
2009 |
105 |
0 |
Security |
TGa_Proposal_Samsung |
Anirudh Bhatt (Samsung) |
06-Jul-2009 03:52:37 ET |
Download |
25-Feb-2009 ET |
2009 |
31 |
0 |
Security |
security Feb 25 teleconf minutes |
Anthony Chan (Huawei Technologies) |
25-Feb-2009 12:42:59 ET |
Download |
23-Feb-2009 ET |
2009 |
29 |
1 |
Security |
security Feb 11 teleconf minutes |
Anthony Chan (Huawei Technologies) |
23-Feb-2009 14:06:34 ET |
Download |
17-Feb-2009 ET |
2009 |
29 |
0 |
Security |
security Feb 11 teleconf minutes |
Anthony Chan (Huawei Technologies) |
17-Feb-2009 18:48:58 ET |
Download |
02-Jul-2009 ET |
2009 |
59 |
1 |
Security |
TGa_Proposal_Antonio_Izquierdo |
Antonio Izquierdo, NIST |
02-Jul-2009 14:14:20 ET |
Download |
02-May-2011 ET |
2011 |
68 |
0 |
Security |
Clause 9 |
Clause 9 |
17-May-2011 19:22:42 ET |
Download |
15-Apr-2010 ET |
2010 |
80 |
0 |
Security |
21-10-0000-00-0-sec-tga-proactive-authentication-option-A |
Dapeng |
15-Apr-2010 21:15:26 ET |
Download |
15-Apr-2010 ET |
2010 |
80 |
1 |
Security |
21-10-0000-00-0-sec-tga-proactive-authentication-option-A |
Dapeng(China Mobile) |
15-Apr-2010 21:21:13 ET |
Download |
13-Nov-2009 ET |
2009 |
170 |
0 |
Security |
Candidate authenticator discovery mechanism |
Dapeng Liu |
13-Nov-2009 16:35:58 ET |
Download |
03-May-2009 ET |
2009 |
63 |
0 |
Security |
TGa_Proposal_Dapeng_Liu |
Da-peng Liu (China Mobile) |
03-May-2009 13:25:51 ET |
Download |
13-Nov-2009 ET |
2009 |
169 |
0 |
Security |
comments on the proposals |
Dapeng Liu (China Mobile) |
13-Nov-2009 14:56:11 ET |
Download |
05-Jul-2009 ET |
2009 |
103 |
0 |
Security |
TGa_Proposal_Dapeng_Liu |
Dapeng Liu (China Mobile) |
05-Jul-2009 11:09:53 ET |
Download |
14-Sep-2010 ET |
2010 |
123 |
2 |
Security |
option-A-for-work-item-I |
Dapeng Liu(China Mobile) |
14-Sep-2010 23:15:56 ET |
Download |
06-Sep-2010 ET |
2010 |
123 |
1 |
Security |
option-A-for-work-item-I |
Dapeng Liu(China Mobile) |
06-Sep-2010 13:54:27 ET |
Download |
28-Jun-2010 ET |
2010 |
123 |
0 |
Security |
option-A-for-work-item-I |
Dapeng Liu(China Mobile) |
28-Jun-2010 09:33:52 ET |
Download |
04-May-2010 ET |
2010 |
82 |
0 |
Security |
Proactive Authentication Through EAP (MSA is the authenticator) |
Dapeng Liu(China Mobile) |
04-May-2010 09:04:57 ET |
Download |
13-May-2011 ET |
2011 |
77 |
0 |
Security |
PICS Proforma |
David Cypher (NIST) |
13-May-2011 11:13:31 ET |
Download |
18-May-2011 ET |
2011 |
77 |
1 |
Security |
PICS Proforma |
David Cypher (NIST), Lily Chen (NIST), Yoshihiro Ohba (Toshiba) |
18-May-2011 17:02:03 ET |
Download |
12-Jan-2010 ET |
2009 |
164 |
7 |
Security |
Detailed analysis on MIA/MSA architecture |
F. Bernal (UMU), R. Marin-Lopez(UMU) |
12-Jan-2010 18:02:43 ET |
Download |
05-Jan-2010 ET |
2009 |
164 |
6 |
Security |
Detailed analysis on MIA/MSA architecture |
F. Bernal (UMU), R. Marin-Lopez(UMU) |
05-Jan-2010 09:50:36 ET |
Download |
05-Jan-2010 ET |
2009 |
164 |
5 |
Security |
Detailed analysis on MIA/MSA architecture |
F. Bernal (UMU), R. Marin-Lopez(UMU) |
05-Jan-2010 09:15:16 ET |
Download |
31-Dec-2009 ET |
2009 |
164 |
4 |
Security |
Detailed analysis on MIA/MSA architecture |
F. Bernal (UMU), R. Marin-Lopez(UMU) |
31-Dec-2009 04:54:54 ET |
Download |
17-Nov-2009 ET |
2009 |
164 |
3 |
Security |
Detailed analysis on MIA/MSA architecture |
F. Bernal (UMU), R. Marin-Lopez(UMU) |
17-Nov-2009 10:17:35 ET |
Download |
13-Nov-2009 ET |
2009 |
164 |
2 |
Security |
Detailed analysis on MIA/MSA architecture |
F. Bernal (UMU), R. Marin-Lopez(UMU) |
13-Nov-2009 14:02:13 ET |
Download |
31-Aug-2010 ET |
2010 |
120 |
3 |
Security |
Option III presentation |
Fernando Bernal, Rafa Marin-Lopez |
31-Aug-2010 07:22:37 ET |
Download |
14-Jul-2010 ET |
2010 |
120 |
2 |
Security |
Option III presentation |
Fernando Bernal, Rafa Marin-Lopez |
14-Jul-2010 10:53:17 ET |
Download |
28-Jun-2010 ET |
2010 |
120 |
1 |
Security |
Option III presentation |
Fernando Bernal, Rafa Marin-Lopez |
28-Jun-2010 17:05:19 ET |
Download |
22-Jun-2010 ET |
2010 |
120 |
0 |
Security |
Option III presentation |
Fernando Bernal, Rafa Marin-Lopez |
22-Jun-2010 08:38:33 ET |
Download |
17-Oct-2011 ET |
2011 |
165 |
1 |
Security |
ERP proposal draft modifications |
Fernando Bernal (UMU), Rafa Marin-Lopez(UMU) |
17-Oct-2011 12:15:51 ET |
Download |
13-Oct-2011 ET |
2011 |
164 |
3 |
Security |
ERP proposal |
Fernando Bernal (UMU), Rafa Marin-Lopez(UMU) |
13-Oct-2011 11:58:35 ET |
Download |
12-Oct-2011 ET |
2011 |
164 |
2 |
Security |
ERP proposal |
Fernando Bernal (UMU), Rafa Marin-Lopez(UMU) |
12-Oct-2011 05:09:27 ET |
Download |
05-Oct-2011 ET |
2011 |
164 |
1 |
Security |
ERP proposal |
Fernando Bernal (UMU), Rafa Marin-Lopez(UMU) |
05-Oct-2011 12:51:13 ET |
Download |
28-Sep-2011 ET |
2011 |
165 |
0 |
Security |
ERP proposal draft modifications |
Fernando Bernal (UMU), Rafa Marin-Lopez(UMU) |
28-Sep-2011 08:39:18 ET |
Download |
28-Sep-2011 ET |
2011 |
164 |
0 |
Security |
ERP proposal |
Fernando Bernal (UMU), Rafa Marin-Lopez(UMU) |
28-Sep-2011 08:36:55 ET |
Download |
15-Mar-2011 ET |
2011 |
44 |
0 |
Security |
Sequence Number |
Fernando Bernal (UMU), Rafa Marin-Lopez(UMU) |
15-Mar-2011 12:20:53 ET |
Download |
01-Mar-2011 ET |
2011 |
22 |
0 |
Security |
Message Flows |
Fernando Bernal (UMU), Rafa Marin-Lopez(UMU) |
01-Mar-2011 07:19:31 ET |
Download |
22-Dec-2010 ET |
2010 |
255 |
0 |
Security |
LB comments |
Fernando Bernal (UMU), Rafa Marin-Lopez(UMU) |
22-Dec-2010 06:59:44 ET |
Download |
10-Nov-2010 ET |
2010 |
209 |
1 |
Security |
Option III Draft updates |
Fernando Bernal (UMU), Rafa Marin-Lopez(UMU) |
10-Nov-2010 06:33:47 ET |
Download |
05-Nov-2010 ET |
2010 |
209 |
0 |
Security |
Option III Draft updates |
Fernando Bernal (UMU), Rafa Marin-Lopez(UMU) |
05-Nov-2010 08:34:51 ET |
Download |
02-Nov-2010 ET |
2010 |
207 |
0 |
Security |
Option III: EAP to conduct service authentication and MIH packet protection: ISSUES |
Fernando Bernal (UMU), Rafa Marin-Lopez(UMU) |
02-Nov-2010 08:55:39 ET |
Download |
02-Nov-2010 ET |
2010 |
78 |
8 |
Security |
Option III: EAP over MIH service authentication |
Fernando Bernal (UMU), Rafa Marin-Lopez(UMU) |
02-Nov-2010 08:52:55 ET |
Download |
15-Sep-2010 ET |
2010 |
78 |
7 |
Security |
Option III: EAP over MIH service authentication |
Fernando Bernal (UMU), Rafa Marin-Lopez(UMU) |
15-Sep-2010 17:50:26 ET |
Download |
13-Sep-2010 ET |
2010 |
78 |
6 |
Security |
Option III: EAP over MIH service authentication |
Fernando Bernal (UMU), Rafa Marin-Lopez(UMU) |
13-Sep-2010 19:29:21 ET |
Download |
13-Sep-2010 ET |
2010 |
78 |
5 |
Security |
Option III: EAP over MIH service authentication |
Fernando Bernal (UMU), Rafa Marin-Lopez(UMU) |
13-Sep-2010 15:09:25 ET |
Download |
09-Sep-2010 ET |
2010 |
78 |
4 |
Security |
Option III: EAP over MIH service authentication |
Fernando Bernal (UMU), Rafa Marin-Lopez(UMU) |
09-Sep-2010 12:31:16 ET |
Download |
23-Aug-2010 ET |
2010 |
78 |
3 |
Security |
Option III: EAP over MIH service authentication |
Fernando Bernal (UMU), Rafa Marin-Lopez(UMU) |
23-Aug-2010 13:40:44 ET |
Download |
28-Jun-2010 ET |
2010 |
78 |
2 |
Security |
Option III: EAP over MIH service authentication |
Fernando Bernal (UMU), Rafa Marin-Lopez(UMU) |
28-Jun-2010 17:11:16 ET |
Download |
22-Jun-2010 ET |
2010 |
78 |
1 |
Security |
Option III: EAP over MIH service authentication |
Fernando Bernal (UMU), Rafa Marin-Lopez(UMU) |
22-Jun-2010 08:32:42 ET |
Download |
15-Apr-2010 ET |
2010 |
78 |
0 |
Security |
Option III: EAP over MIH service authentication |
Fernando Bernal (UMU), Rafa Marin-Lopez(UMU) |
15-Apr-2010 08:05:58 ET |
Download |
28-Sep-2010 ET |
2010 |
204 |
0 |
Security |
Option III: EAP to conduct service authentication and MIH packet protection: FLAGS and MIHS. |
Fernando Bernal(UMU), Rafa Marin-Lopez(UMU) |
28-Sep-2010 08:49:05 ET |
Download |
10-Mar-2009 ET |
2009 |
40 |
0 |
Security |
key distribution for fast access |
Fernando Garcia (Univ. of Murcia) |
10-Mar-2009 01:45:33 ET |
Download |
13-Sep-2009 ET |
2009 |
104 |
2 |
Security |
TGa_Proposal_Rafa_Marin |
Fernando Pereniguez (University of Murcia) |
13-Sep-2009 13:23:25 ET |
Download |
11-Nov-2008 ET |
2008 |
301 |
0 |
Security |
Security SG Nov meeting minutes |
H |
11-Nov-2008 11:17:06 ET |
Download |
15-Dec-2009 ET |
2009 |
197 |
0 |
Security |
Security TG Nov 2009 minutes |
H Anthony Chan (Huawei Technologies) |
15-Dec-2009 12:34:27 ET |
Download |
18-Nov-2009 ET |
2009 |
184 |
0 |
Security |
Security TG September Interim minutes |
H Anthony Chan (Huawei Technologies) |
18-Nov-2009 14:39:49 ET |
Download |
11-Mar-2009 ET |
2009 |
42 |
2 |
Security |
March Meeting Minutes |
H Anthony Chan (Huawei Technologies) |
11-Mar-2009 20:47:03 ET |
Download |
13-Nov-2008 ET |
2008 |
301 |
2 |
Security |
Security SG Nov meeting minutes |
H Anthony Chan (Huawei Technologies) |
13-Nov-2008 10:23:02 ET |
Download |
12-Nov-2008 ET |
2008 |
301 |
1 |
Security |
Security SG Nov meeting minutes |
H Anthony Chan (Huawei Technologies) |
12-Nov-2008 11:30:41 ET |
Download |
24-Oct-2008 ET |
2008 |
286 |
0 |
Security |
Security SG Oct 23 teleconference minutes |
H Anthony Chan (Huawei Technologies) |
24-Oct-2008 11:22:31 ET |
Download |
07-Jul-2009 ET |
2009 |
107 |
0 |
Security |
TGa_Proposal_Sumanta_Saha_Dmitrij |
Helsinki University of Technology |
07-Jul-2009 11:18:44 ET |
Download |
12-May-2008 ET |
2008 |
129 |
0 |
Security |
MIH Security - Use Case Issue Discussions |
Lily Chen |
12-May-2008 09:33:43 ET |
Download |
17-May-2011 ET |
2011 |
89 |
1 |
Security |
Resolution for Comment #28 |
Lily Chen (NIST) |
17-May-2011 12:28:11 ET |
Download |
17-May-2011 ET |
2011 |
89 |
0 |
Security |
Resolution for Comment #28 |
Lily Chen (NIST) |
17-May-2011 11:31:18 ET |
Download |
16-Mar-2011 ET |
2011 |
26 |
2 |
Security |
Security TLVs |
Lily Chen (NIST) |
16-Mar-2011 21:08:36 ET |
Download |
11-Mar-2011 ET |
2011 |
26 |
1 |
Security |
Security TLVs |
Lily Chen (NIST) |
11-Mar-2011 14:23:18 ET |
Download |
08-Mar-2011 ET |
2011 |
27 |
0 |
Security |
Security protection and fragmentation |
Lily Chen (NIST) |
08-Mar-2011 16:52:11 ET |
Download |
08-Mar-2011 ET |
2011 |
26 |
0 |
Security |
Security TLVs |
Lily Chen (NIST) |
08-Mar-2011 16:51:23 ET |
Download |
08-Mar-2011 ET |
2011 |
25 |
0 |
Security |
Supported Ciphersuites |
Lily Chen (NIST) |
08-Mar-2011 16:50:25 ET |
Download |
11-Jan-2011 ET |
2011 |
2 |
1 |
Security |
AES-CCM Mode |
Lily Chen (NIST) |
11-Jan-2011 20:46:18 ET |
Download |
07-Jan-2011 ET |
2011 |
2 |
0 |
Security |
AES-CCM Mode |
Lily Chen (NIST) |
07-Jan-2011 16:16:43 ET |
Download |
20-Sep-2010 ET |
2010 |
203 |
0 |
Security |
KDFs in 802.21a |
Lily Chen (NIST) |
20-Sep-2010 14:38:43 ET |
Download |
17-Aug-2010 ET |
2010 |
170 |
0 |
Security |
Comments on Option ii work item 2 |
Lily Chen (NIST) |
17-Aug-2010 00:39:30 ET |
Download |
12-Aug-2010 ET |
2010 |
169 |
0 |
Security |
Options for Security IEs |
Lily Chen (NIST) |
12-Aug-2010 14:27:50 ET |
Download |
15-Jul-2010 ET |
2010 |
153 |
0 |
Security |
Presentation on draft 21a document proposal |
Lily Chen (NIST) |
15-Jul-2010 13:23:51 ET |
Download |
14-Jul-2010 ET |
2010 |
148 |
0 |
Security |
21a draft standard proposal |
Lily Chen (NIST) |
14-Jul-2010 17:49:24 ET |
Download |
14-Jul-2010 ET |
2010 |
124 |
2 |
Security |
Presentation for Work Item 2 Option 1 |
Lily Chen (NIST) |
14-Jul-2010 11:48:03 ET |
Download |
09-Jul-2010 ET |
2010 |
124 |
1 |
Security |
Presentation for Work Item 2 Option 1 |
Lily Chen (NIST) |
09-Jul-2010 16:13:07 ET |
Download |
28-Jun-2010 ET |
2010 |
124 |
0 |
Security |
Presentation for Work Item 2 Option 1 |
Lily Chen (NIST) |
28-Jun-2010 16:51:40 ET |
Download |
28-Jun-2010 ET |
2010 |
84 |
1 |
Security |
Option I for Work Item 2 |
Lily Chen (NIST) |
28-Jun-2010 16:49:41 ET |
Download |
28-Jun-2010 ET |
2010 |
122 |
0 |
Security |
Meeting Minutes of June 22 Teleconference |
Lily Chen (NIST) |
28-Jun-2010 08:26:02 ET |
Download |
28-Jun-2010 ET |
2010 |
121 |
1 |
Security |
Meeting Minutes of May 22 Teleconference |
Lily Chen (NIST) |
28-Jun-2010 08:24:33 ET |
Download |
25-Jun-2010 ET |
2010 |
121 |
0 |
Security |
Meeting Minutes of May 22 Teleconference |
Lily Chen (NIST) |
25-Jun-2010 15:35:00 ET |
Download |
16-Jun-2010 ET |
2010 |
119 |
0 |
Security |
Minutes of June 15 Teleconference |
Lily Chen (NIST) |
16-Jun-2010 17:06:14 ET |
Download |
12-May-2010 ET |
2010 |
100 |
2 |
Security |
Issue Summary |
Lily Chen (NIST) |
12-May-2010 06:06:12 ET |
Download |
12-May-2010 ET |
2010 |
100 |
1 |
Security |
Issue Summary |
Lily Chen (NIST) |
12-May-2010 03:14:06 ET |
Download |
11-May-2010 ET |
2010 |
100 |
0 |
Security |
Issue Summary |
Lily Chen (NIST) |
11-May-2010 08:03:04 ET |
Download |
05-May-2010 ET |
2010 |
84 |
0 |
Security |
Option I for Work Item 2 |
Lily Chen (NIST) |
05-May-2010 17:15:17 ET |
Download |
04-May-2010 ET |
2010 |
83 |
0 |
Security |
May 4 Telecon Minutes |
Lily Chen (NIST) |
04-May-2010 13:57:19 ET |
Download |
16-Apr-2010 ET |
2010 |
81 |
0 |
Security |
April 15 Telecon Minutes |
Lily Chen (NIST) |
16-Apr-2010 08:44:24 ET |
Download |
18-Mar-2010 ET |
2010 |
49 |
3 |
Security |
Proposal Summary |
Lily Chen (NIST) |
18-Mar-2010 10:59:22 ET |
Download |
17-Mar-2010 ET |
2010 |
49 |
2 |
Security |
Proposal Summary |
Lily Chen (NIST) |
17-Mar-2010 09:24:56 ET |
Download |
12-Mar-2010 ET |
2010 |
49 |
1 |
Security |
Proposal Summary |
Lily Chen (NIST) |
12-Mar-2010 17:14:39 ET |
Download |
12-Mar-2010 ET |
2010 |
49 |
0 |
Security |
Proposal Summary |
Lily Chen (NIST) |
12-Mar-2010 13:31:44 ET |
Download |
02-Feb-2010 ET |
2010 |
37 |
0 |
Security |
Key Hierarchy Issues |
Lily Chen (NIST) |
02-Feb-2010 08:51:33 ET |
Download |
06-Jan-2010 ET |
2010 |
2 |
0 |
Security |
Key Hierarchy Discussion |
Lily Chen (NIST) |
06-Jan-2010 16:49:14 ET |
Download |
05-Jan-2010 ET |
2009 |
199 |
3 |
Security |
The Role of a Media Independent Authenticator |
Lily Chen (NIST) |
05-Jan-2010 13:09:41 ET |
Download |
05-Jan-2010 ET |
2009 |
199 |
2 |
Security |
The Role of a Media Independent Authenticator |
Lily Chen (NIST) |
05-Jan-2010 09:38:44 ET |
Download |