Created (ET) |
Year |
DCN |
Rev |
Group |
Title |
Author (Affiliation) ▲ |
Uploaded (ET) |
Actions |
24-Apr-2008 ET |
2008 |
120 |
0 |
802.21 Working Group |
Handover Diagrams for the Break before Make case |
Junghoon Jee (ETRI) |
24-Apr-2008 04:31:49 ET |
Download |
24-Apr-2008 ET |
2008 |
119 |
0 |
802.21 Working Group |
Handover Diagrams for Proxy Mobile IPv6 |
Junghoon Jee (ETRI) |
24-Apr-2008 04:31:00 ET |
Download |
24-Apr-2008 ET |
2008 |
118 |
0 |
802.21 Working Group |
Handover Diagrams between IEEE 802.16 and IEEE 802.11 |
Junghoon Jee (ETRI) |
24-Apr-2008 04:30:08 ET |
Download |
24-Apr-2008 ET |
2008 |
117 |
0 |
802.21 Working Group |
MIH Handover Diagrams |
Junghoon Jee (ETRI) |
24-Apr-2008 04:28:54 ET |
Download |
18-Apr-2008 ET |
2008 |
110 |
0 |
802.21 Working Group |
MIH_MN_HO_Commit Wrap-Up |
Junghoon Jee (ETRI) |
18-Apr-2008 02:03:22 ET |
Download |
14-Mar-2008 ET |
2008 |
69 |
1 |
Multi-Radio Power Mgmt |
Multi-Radio Power Management Analysis |
Junghoon Jee (ETRI) |
14-Mar-2008 01:19:08 ET |
Download |
14-Mar-2008 ET |
2008 |
69 |
0 |
Multi-Radio Power Mgmt |
Multi-Radio Power Management Analysis |
Junghoon Jee (ETRI) |
14-Mar-2008 01:15:16 ET |
Download |
10-Mar-2008 ET |
2008 |
66 |
0 |
Multi-Radio Power Mgmt |
MRPM January Meeting Minutes |
Junghoon Jee (ETRI) |
10-Mar-2008 23:18:14 ET |
Download |
10-Jan-2008 ET |
2008 |
18 |
0 |
802.21 Working Group |
Mutli-Radio Power Management Scenario Amendments |
Junghoon Jee (ETRI) |
10-Jan-2008 19:47:35 ET |
Download |
09-Oct-2009 ET |
2009 |
147 |
1 |
802.21 Working Group |
Summary of Multi-Radio Power Management |
Junghoon Jee (ETRI), Anthony (Huawei) |
09-Oct-2009 04:29:28 ET |
Download |
16-Jun-2008 ET |
2008 |
180 |
0 |
802.21 Working Group |
Revised Basic Schema |
Kenichi Taniuchi (Toshiba) |
16-Jun-2008 06:54:50 ET |
Download |
23-Apr-2008 ET |
2008 |
59 |
1 |
802.21 Working Group |
Basic_Schema_D9 |
Kenichi Taniuchi (Toshiba) |
23-Apr-2008 12:46:38 ET |
Download |
26-Feb-2008 ET |
2008 |
59 |
0 |
802.21 Working Group |
Basic_Schema_D9 |
Kenichi Taniuchi (Toshiba) |
26-Feb-2008 00:52:57 ET |
Download |
09-Jan-2008 ET |
2008 |
13 |
0 |
802.21 Working Group |
Basic_Schema |
Kenichi Taniuchi (Toshiba) |
09-Jan-2008 02:06:24 ET |
Download |
16-Jul-2008 ET |
2008 |
226 |
1 |
Multi-Radio Power Mgmt |
Market Need for MRPM |
Kevin A. Noll (Time Warner Cable) |
16-Jul-2008 16:15:57 ET |
Download |
16-Jul-2008 ET |
2008 |
226 |
0 |
Multi-Radio Power Mgmt |
Market Need for MRPM |
Kevin A. Noll (Time Warner Cable) |
16-Jul-2008 13:40:30 ET |
Download |
18-May-2016 ET |
2016 |
75 |
0 |
802.21 Working Group |
Load balancing in heterogeneous network use case |
Krzysztof Grochla (IITIS PAN) |
18-May-2016 21:12:04 ET |
Download |
13-Jul-2010 ET |
2010 |
144 |
2 |
802.21 Working Group |
Practical experiences with media-independent link control |
Krzysztof Grochla, Walter Buga (Proximetry) |
13-Jul-2010 13:33:39 ET |
Download |
13-Jul-2010 ET |
2010 |
144 |
1 |
802.21 Working Group |
Practical experiences with media-independent link control |
Krzysztof Grochla, Walter Buga (Proximetry) |
13-Jul-2010 13:28:51 ET |
Download |
13-Jul-2010 ET |
2010 |
144 |
0 |
802.21 Working Group |
Practical experiences with media-independent link control |
Krzysztof Grochla, Walter Buga (Proximetry) |
13-Jul-2010 03:13:34 ET |
Download |
17-Sep-2012 ET |
2012 |
118 |
0 |
Multicast Group Management |
Availability Requirement Discussion |
Landis+Gyr |
17-Sep-2012 16:37:31 ET |
Download |
09-Sep-2008 ET |
2008 |
266 |
0 |
802.21 Working Group |
802.21 in IMT Advanced |
Les Eastwood (Motorola) |
09-Sep-2008 16:06:22 ET |
Download |
23-Feb-2016 ET |
2016 |
39 |
1 |
802.21 Services and Use cases |
Suggested text change for Remedy 1 |
Lidong Chen (NIST) |
23-Feb-2016 20:36:08 ET |
Download |
19-Feb-2016 ET |
2016 |
39 |
0 |
802.21 Services and Use cases |
Suggested text change for Remedy 1 |
Lidong Chen (NIST) |
19-Feb-2016 14:59:19 ET |
Download |
19-Feb-2016 ET |
2016 |
38 |
0 |
802.21 Services and Use cases |
Remedy 1 key points |
Lidong Chen (NIST) |
19-Feb-2016 14:58:31 ET |
Download |
05-Feb-2016 ET |
2016 |
29 |
0 |
802.21-2008 Revision Project |
CommentResolution106-109 |
Lidong Chen (NIST) |
05-Feb-2016 13:17:32 ET |
Download |
12-May-2008 ET |
2008 |
129 |
0 |
Security |
MIH Security - Use Case Issue Discussions |
Lily Chen |
12-May-2008 09:33:43 ET |
Download |
22-Nov-2013 ET |
2013 |
227 |
0 |
Multicast Group Management |
Restructure Cluase 9.4 |
Lily Chen (NIST) |
22-Nov-2013 13:28:48 ET |
Download |
13-Nov-2013 ET |
2013 |
214 |
0 |
Multicast Group Management |
Group manager, command center, and MNs |
Lily Chen (NIST) |
13-Nov-2013 09:06:56 ET |
Download |
09-Nov-2013 ET |
2013 |
200 |
0 |
Multicast Group Management |
Group Membership Indication |
Lily Chen (NIST) |
09-Nov-2013 09:36:42 ET |
Download |
09-Nov-2013 ET |
2013 |
199 |
0 |
Multicast Group Management |
Introduction of Device Keys |
Lily Chen (NIST) |
09-Nov-2013 09:35:38 ET |
Download |
16-Aug-2013 ET |
2013 |
146 |
3 |
Multicast Group Management |
Security text for Multicast Group Management |
Lily Chen (NIST) |
16-Aug-2013 14:50:40 ET |
Download |
01-Aug-2013 ET |
2013 |
146 |
2 |
Multicast Group Management |
Security text for Multicast Group Management |
Lily Chen (NIST) |
01-Aug-2013 08:39:34 ET |
Download |
20-Jun-2012 ET |
2012 |
78 |
0 |
Multicast Group Management |
June 14 Teleconference Minutes |
Lily Chen (NIST) |
20-Jun-2012 15:16:35 ET |
Download |
17-May-2011 ET |
2011 |
89 |
1 |
Security |
Resolution for Comment #28 |
Lily Chen (NIST) |
17-May-2011 12:28:11 ET |
Download |
17-May-2011 ET |
2011 |
89 |
0 |
Security |
Resolution for Comment #28 |
Lily Chen (NIST) |
17-May-2011 11:31:18 ET |
Download |
16-Mar-2011 ET |
2011 |
26 |
2 |
Security |
Security TLVs |
Lily Chen (NIST) |
16-Mar-2011 21:08:36 ET |
Download |
11-Mar-2011 ET |
2011 |
26 |
1 |
Security |
Security TLVs |
Lily Chen (NIST) |
11-Mar-2011 14:23:18 ET |
Download |
08-Mar-2011 ET |
2011 |
27 |
0 |
Security |
Security protection and fragmentation |
Lily Chen (NIST) |
08-Mar-2011 16:52:11 ET |
Download |
08-Mar-2011 ET |
2011 |
26 |
0 |
Security |
Security TLVs |
Lily Chen (NIST) |
08-Mar-2011 16:51:23 ET |
Download |
08-Mar-2011 ET |
2011 |
25 |
0 |
Security |
Supported Ciphersuites |
Lily Chen (NIST) |
08-Mar-2011 16:50:25 ET |
Download |
11-Jan-2011 ET |
2011 |
2 |
1 |
Security |
AES-CCM Mode |
Lily Chen (NIST) |
11-Jan-2011 20:46:18 ET |
Download |
07-Jan-2011 ET |
2011 |
2 |
0 |
Security |
AES-CCM Mode |
Lily Chen (NIST) |
07-Jan-2011 16:16:43 ET |
Download |
20-Sep-2010 ET |
2010 |
203 |
0 |
Security |
KDFs in 802.21a |
Lily Chen (NIST) |
20-Sep-2010 14:38:43 ET |
Download |
17-Aug-2010 ET |
2010 |
170 |
0 |
Security |
Comments on Option ii work item 2 |
Lily Chen (NIST) |
17-Aug-2010 00:39:30 ET |
Download |
12-Aug-2010 ET |
2010 |
169 |
0 |
Security |
Options for Security IEs |
Lily Chen (NIST) |
12-Aug-2010 14:27:50 ET |
Download |
15-Jul-2010 ET |
2010 |
153 |
0 |
Security |
Presentation on draft 21a document proposal |
Lily Chen (NIST) |
15-Jul-2010 13:23:51 ET |
Download |
14-Jul-2010 ET |
2010 |
148 |
0 |
Security |
21a draft standard proposal |
Lily Chen (NIST) |
14-Jul-2010 17:49:24 ET |
Download |
14-Jul-2010 ET |
2010 |
124 |
2 |
Security |
Presentation for Work Item 2 Option 1 |
Lily Chen (NIST) |
14-Jul-2010 11:48:03 ET |
Download |
09-Jul-2010 ET |
2010 |
124 |
1 |
Security |
Presentation for Work Item 2 Option 1 |
Lily Chen (NIST) |
09-Jul-2010 16:13:07 ET |
Download |
28-Jun-2010 ET |
2010 |
124 |
0 |
Security |
Presentation for Work Item 2 Option 1 |
Lily Chen (NIST) |
28-Jun-2010 16:51:40 ET |
Download |
28-Jun-2010 ET |
2010 |
84 |
1 |
Security |
Option I for Work Item 2 |
Lily Chen (NIST) |
28-Jun-2010 16:49:41 ET |
Download |
28-Jun-2010 ET |
2010 |
122 |
0 |
Security |
Meeting Minutes of June 22 Teleconference |
Lily Chen (NIST) |
28-Jun-2010 08:26:02 ET |
Download |
28-Jun-2010 ET |
2010 |
121 |
1 |
Security |
Meeting Minutes of May 22 Teleconference |
Lily Chen (NIST) |
28-Jun-2010 08:24:33 ET |
Download |
25-Jun-2010 ET |
2010 |
121 |
0 |
Security |
Meeting Minutes of May 22 Teleconference |
Lily Chen (NIST) |
25-Jun-2010 15:35:00 ET |
Download |
16-Jun-2010 ET |
2010 |
119 |
0 |
Security |
Minutes of June 15 Teleconference |
Lily Chen (NIST) |
16-Jun-2010 17:06:14 ET |
Download |
12-May-2010 ET |
2010 |
100 |
2 |
Security |
Issue Summary |
Lily Chen (NIST) |
12-May-2010 06:06:12 ET |
Download |
12-May-2010 ET |
2010 |
100 |
1 |
Security |
Issue Summary |
Lily Chen (NIST) |
12-May-2010 03:14:06 ET |
Download |
11-May-2010 ET |
2010 |
100 |
0 |
Security |
Issue Summary |
Lily Chen (NIST) |
11-May-2010 08:03:04 ET |
Download |
05-May-2010 ET |
2010 |
84 |
0 |
Security |
Option I for Work Item 2 |
Lily Chen (NIST) |
05-May-2010 17:15:17 ET |
Download |
04-May-2010 ET |
2010 |
83 |
0 |
Security |
May 4 Telecon Minutes |
Lily Chen (NIST) |
04-May-2010 13:57:19 ET |
Download |
16-Apr-2010 ET |
2010 |
81 |
0 |
Security |
April 15 Telecon Minutes |
Lily Chen (NIST) |
16-Apr-2010 08:44:24 ET |
Download |
18-Mar-2010 ET |
2010 |
49 |
3 |
Security |
Proposal Summary |
Lily Chen (NIST) |
18-Mar-2010 10:59:22 ET |
Download |
17-Mar-2010 ET |
2010 |
49 |
2 |
Security |
Proposal Summary |
Lily Chen (NIST) |
17-Mar-2010 09:24:56 ET |
Download |
12-Mar-2010 ET |
2010 |
49 |
1 |
Security |
Proposal Summary |
Lily Chen (NIST) |
12-Mar-2010 17:14:39 ET |
Download |
12-Mar-2010 ET |
2010 |
49 |
0 |
Security |
Proposal Summary |
Lily Chen (NIST) |
12-Mar-2010 13:31:44 ET |
Download |
02-Feb-2010 ET |
2010 |
37 |
0 |
Security |
Key Hierarchy Issues |
Lily Chen (NIST) |
02-Feb-2010 08:51:33 ET |
Download |
06-Jan-2010 ET |
2010 |
2 |
0 |
Security |
Key Hierarchy Discussion |
Lily Chen (NIST) |
06-Jan-2010 16:49:14 ET |
Download |
05-Jan-2010 ET |
2009 |
199 |
3 |
Security |
The Role of a Media Independent Authenticator |
Lily Chen (NIST) |
05-Jan-2010 13:09:41 ET |
Download |
05-Jan-2010 ET |
2009 |
199 |
2 |
Security |
The Role of a Media Independent Authenticator |
Lily Chen (NIST) |
05-Jan-2010 09:38:44 ET |
Download |
04-Jan-2010 ET |
2009 |
199 |
1 |
Security |
The Role of a Media Independent Authenticator |
Lily Chen (NIST) |
04-Jan-2010 14:26:52 ET |
Download |
30-Dec-2009 ET |
2009 |
199 |
0 |
Security |
The Role of a Media Independent Authenticator |
Lily Chen (NIST) |
30-Dec-2009 16:16:40 ET |
Download |
18-Nov-2009 ET |
2009 |
179 |
1 |
Security |
Tentative IEEE 802.21a document structure |
Lily Chen (NIST) |
18-Nov-2009 15:59:17 ET |
Download |
17-Nov-2009 ET |
2009 |
179 |
0 |
Security |
Tentative IEEE 802.21a document structure |
Lily Chen (NIST) |
17-Nov-2009 14:16:55 ET |
Download |
29-Oct-2009 ET |
2009 |
165 |
1 |
Security |
Meida specific vs media independent |
Lily Chen (NIST) |
29-Oct-2009 21:08:01 ET |
Download |
15-Oct-2009 ET |
2009 |
165 |
0 |
Security |
Meida specific vs media independent |
Lily Chen (NIST) |
15-Oct-2009 09:51:24 ET |
Download |
23-Sep-2009 ET |
2009 |
155 |
1 |
Security |
Initiate an Exercise to Generate a 21a Document |
Lily Chen (NIST) |
23-Sep-2009 18:05:38 ET |
Download |
23-Sep-2009 ET |
2009 |
155 |
0 |
Security |
Initiate an Exercise to Generate a 21a Document |
Lily Chen (NIST) |
23-Sep-2009 16:13:55 ET |
Download |
23-Sep-2009 ET |
2009 |
148 |
2 |
Security |
A Study on IEEE 802.11r Approach |
Lily Chen (NIST) |
23-Sep-2009 16:09:54 ET |
Download |
18-Sep-2009 ET |
2009 |
148 |
1 |
Security |
A Study on IEEE 802.11r Approach |
Lily Chen (NIST) |
18-Sep-2009 15:28:56 ET |
Download |
18-Sep-2009 ET |
2009 |
148 |
0 |
Security |
A Study on IEEE 802.11r Approach |
Lily Chen (NIST) |
18-Sep-2009 15:27:17 ET |
Download |
02-Jul-2009 ET |
2009 |
60 |
2 |
Security |
TGa_Proposal_Lily_Chen |
Lily Chen (NIST) |
02-Jul-2009 14:58:28 ET |
Download |
13-May-2009 ET |
2009 |
85 |
0 |
Security |
Observations on 802.21a proposals |
Lily Chen (NIST) |
13-May-2009 15:08:56 ET |
Download |
10-Sep-2008 ET |
2008 |
253 |
1 |
Security |
A Study on 3GPP and 3GPP-WLAN Interworking |
Lily Chen (NIST) |
10-Sep-2008 14:50:44 ET |
Download |
04-Sep-2008 ET |
2008 |
253 |
0 |
Security |
A Study on 3GPP and 3GPP-WLAN Interworking |
Lily Chen (NIST) |
04-Sep-2008 18:35:54 ET |
Download |
11-Jul-2008 ET |
2008 |
181 |
2 |
Security |
MIH Security Use Case |
Lily Chen (NIST) |
11-Jul-2008 14:52:06 ET |
Download |
19-Jun-2008 ET |
2008 |
181 |
1 |
Security |
MIH Security Use Case |
Lily Chen (NIST) |
19-Jun-2008 08:45:56 ET |
Download |
16-Jun-2008 ET |
2008 |
181 |
0 |
Security |
MIH Security Use Case |
Lily Chen (NIST) |
16-Jun-2008 10:18:58 ET |
Download |
02-Jun-2008 ET |
2008 |
170 |
0 |
Security |
MIH Security Use Cases |
Lily Chen (NIST) |
02-Jun-2008 11:17:59 ET |
Download |
15-May-2008 ET |
2008 |
151 |
2 |
Security |
MIH Security Use Case Discussion |
Lily Chen (NIST) |
15-May-2008 18:17:03 ET |
Download |
15-May-2008 ET |
2008 |
151 |
1 |
Security |
MIH Security Use Case Discussion |
Lily Chen (NIST) |
15-May-2008 15:41:20 ET |
Download |
15-May-2008 ET |
2008 |
151 |
0 |
Security |
MIH Security Use Case Discussion |
Lily Chen (NIST) |
15-May-2008 14:32:43 ET |
Download |
12-May-2008 ET |
2008 |
129 |
1 |
Security |
MIH Security - Use Case Issue Discussions |
Lily Chen (NIST) |
12-May-2008 09:36:28 ET |
Download |
12-May-2008 ET |
2008 |
130 |
0 |
Security |
MIH Security Use Case Samples |
Lily Chen (NIST) |
12-May-2008 09:35:30 ET |
Download |
30-Apr-2008 ET |
2008 |
121 |
0 |
Security |
MIH Security Use Case Discussion Topics |
Lily Chen (NIST) |
30-Apr-2008 08:27:58 ET |
Download |
17-Jan-2014 ET |
2013 |
227 |
3 |
Multicast Group Management |
Restructure Cluase 9.4 |
Lily Chen (NIST), Antonio de la Oliva (UC3M) |
17-Jan-2014 10:33:58 ET |
Download |
17-Dec-2013 ET |
2013 |
227 |
2 |
Multicast Group Management |
Restructure Cluase 9.4 |
Lily Chen (NIST), Antonio de la Oliva (UC3M) |
17-Dec-2013 12:59:07 ET |
Download |
25-Nov-2013 ET |
2013 |
227 |
1 |
Multicast Group Management |
Restructure Cluase 9.4 |
Lily Chen (NIST), Antonio de la Oliva (UC3M) |
25-Nov-2013 02:58:07 ET |
Download |
02-Jul-2009 ET |
2009 |
60 |
1 |
Security |
TGa_Proposal_Lily_Chen |
Lily (NIST) |
02-Jul-2009 14:56:04 ET |
Download |
03-Apr-2008 ET |
2008 |
12 |
1 |
Security |
MIH_Security_Technical_Report |
Marc Meylemans (Intel) |
03-Apr-2008 17:00:48 ET |
Download |